Advertisements
 
 
  You'll find a complete list of Security Tools software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
space video webcam clipboard

Security Tools

PREVIOUS     NEXT

MMIP Anonymity - Hide IP Address  MMIP Anonymity - Hide IP Address

 Hide your IP address with this easy configurable tool that allows anonymous web surfing, by providing you with a fake IP address and country of origin.The software will run automatically and hide your IP address with no setup required other thanselecting your Browsers/programs .exe file. You can also manually override the automatic settings & configure yourself. Test the software and hide your IP address with ease with our free trial....

PrimaSoft Encryption - Service Edition  PrimaSoft Encryption - Service Edition

 Service Process: You can run scheduled auto-recurring encryption and decryption sessions as a service process. Encryption Scheduler: PrimaSoft Encryption utility comes with flexible scheduler. You can schedule auto recurring encryption sessions for any future date and time. Encryption algorithms: AES (US Advanced Encryption Standard) secret-key encryption algorithm known as Rijndael. Certified by National Institute of Standards and Technologies (NIST). AES is the new official US government standard for encryption of data. Twofish encryption algorithm, a runner-up candidate for AES. RSA encryption is a public-key encryption algorithm. Encryption compression and decompression: You can use the most popular ZIP archive file format within the Strong File Encryption / Decryption utility. You can define automatic compression and decompression of the encrypted or decrypted files. Encryption Log: Our software maintains a detailed Activity Log so you can easily find out which encryption sessions...

DeadLock  DeadLock

 "The program for enciphering any types of files, simple enough in use: it is necessary to create only the list of files and folders which is necessary for protecting. After that it is possible to cipher or decipher all files. Differs from others in the big speed (10 Gb of music in a format mp3 it is ciphered for one second) due to an opportunity of partial enciphering a file. Ideally approaches for protection against users and frequent enciphering. The confidential algorithm of enciphering is used. It is started only with the password. Continuation of use of the program after its removal and repeated installation without change of the password is possible. To buy the program it is possible only on a site of the developer: www.port256.net. Cost only $1.5"...

Passwords Active  Passwords Active

 Passwords Active is a way of generating identification in the form of powerful passwords. This is a fast, efficient and very powerful application to generate up to 9999 passwords and up to 9999 characters long. This is useful to not only the average user but also the more security conscious users, intensive users (word scramblers), administrators (network, database, system, etc), etc. Irrespective of the type of user, Passwords Active will meet your needs!...

HideFlash  HideFlash

 HideFlash is a security software to protect files and folders on USB flash drive from viewing them without your permission. Your files and folders are hidden and remain invisible on any computer to which you connect your USB flash drive. It is useful for anyone who wants to protect their private data. Features: - hides your files and folders from USB flash filesystem - no one but you can access your hidden files or folders - files and folders will remain invisible on another machine - your information is stored securly using the best ecnryption algorithms - you can add different sets of files for multiple users - the program doesn't need to be run every time you use your flash drive - you are free to install the program on up to 5 USB flash drives...

Hide My Folders  Hide My Folders

 Hide My Folders by Eltima Software allows hiding files and folders from viewing, accessing and searching completely, so that only you know that those files or folders exist. No matter how particular computer is accessed (over local network, from internet or directly), those folders stay invisible and safe. Once you hide files/folders, Hide My Folders will not reveal their presence in your system, and the files will be hidden until you unhide them. No one can find out if any of the files or folders are hidden. This is achieved by low-level file access which is reliable, robust and fail-safe. Hide My Folders launch is password-protected and you will be the only person to see and access your private info. In order to hide files with specific names and extensions Hide My Folders offers advanced pattern-matching approach. By specifying special string as a mask you may hide a group of files that comply with it. For instance, .doc would hide all MS Word files. This is convenient and useful op...

PasswordDock  PasswordDock

 PasswordDock is a user-friendly utility program that safely stores your passwords and favorite file folders. When you passwords are saved to the database, the highly acclaimed Blowfish encryption algorithm is applied to scramble your important information. When adding passwords, you will also need to provide a title, user name, password (required), and a web site and notes (optional). PasswordDock does not automatically populate secure web forms with your information. You can however make sure PasswordDock is always 'On Top' of all other windows and reveal your passwords for easy manual entry or single-click on a cell to copy its contents to the clipboard and then simply paste the information into the web form. As a little bonus, you can also save your favorite file folders for instant access to often visited folders. The program initially docks to the right side of your screen and can be minimized to the taskbar. Minimizing PasswordDock will automatically lock the program, which requi...
 Advertisements

IE PassView  IE PassView

 Sie haben das Kennwort fur eine Access-Datenbank vergessen? Dann setzen Sie dieses Tool ein und lassen sich das hinter Sternchen versteckte Passwort im Klartext anzeigen. Hinweis: In Access 2000/XP klappt es nur, wenn das Passwort kurzer als 18 Zeichen ist. uvm....

SpyAnytime PC Spy  SpyAnytime PC Spy

 This is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include autostart monitoring, password protection, halt on idle, sorting and searching records, HTML report, screen snapshots playback, as well as a highly self-explanatory interface. SpyAnytime PC Spy works just like a combination of invisible keyLogger, screen snapshots captor, web Urls recorder, plus application and file/folder monitor. But not like other products sold them in split package, SpyAnytime PC Spy is a complete package with all above components! Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conver...

Mutilate File Wiper  Mutilate File Wiper

 Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file shredder or file eraser that securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. The program overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Choose from three security levels and a customizable level with up to 297 overwrite passes. Mutilate supports complete folder deletions including subfolders. With Mutilate's disk free space wiper, you can even use Mutilate as a file remover to destroy previously deleted files on ...

Outlook Lost Password Recovery Tool  Outlook Lost Password Recovery Tool

 Forgotten password recovery can recover account information, emails addresses, mail server addresses (pop3, http), usernames for email accounts, passwords to email. Outlook express password recovery program stores the retrieved passwords and login details at user define place. Outlook password reset tool can also recover password of various files like PST, MBX and DBX file. Breaker application for Outlook express password can also visualizes the settings of mail and news accounts. Outlook express password recovery software restore user logins and password from Microsoft outlook express 4.0, 5.0 or later version. Password restoration application tool easily runs on all Windows based operating systems including Windows 98, 2000, 2003, ME, XP, NT, Vista. Breaker utility unmasks email account secret hidden behind asterisks character (****) of any length and supports special characters. Tool can rescue passwords to web sites within minute time with multilingual password recovery support. Ut...

SecretsSaver Corporate Pro  SecretsSaver Corporate Pro

 The typical security software is absolutely useless in combating unauthorized data leakage caused by your employees' negligence or intentionally harmful actions. Firewalls and AV-based security systems cannot protect you from theft of your company's confidential information by employees that have authority to access that data freely due to their duties. A successful company's most trustworthy and devoted employees often become characters in attacks planned by your competitors; they are bribed, blackmailed, threatened. SecretsSaver is a fundamentally new system for guarding your confidential data from threats originating from your company's (once) most trustworthy and devoted employees. SecretsSaver will arm your company's security administration with these unique capabilities: ? Restrict IT department employees' access to confidential data. ? Classify data stored on employee workstations and corporate servers by its level of confidentiality. ? Assign each employee a personal access lev...

Hope Spoofers Tracking Cookie Trojan Horses Killer  Hope Spoofers Tracking Cookie Trojan Horses Killer

 Hope Spoofers Tracking Cookie Trojan Horses Killer scans for more than 70,000 components, fastest scanning mechanism. An average time of 5 minutes to scan complete hard disk, automatic incremental signature updates - 6 to 8 signature sets released every week, user friendly view for the detected Spyware showing severity, type, and description, option to schedule a scan at users convenience, and restore or permanently delete are some of AntiSpy features. Scan and remove malware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb. from your computer....

File Defender  File Defender

 File Defender is a powerful and easy-to-use software that allows you to protect your files from unauthorized access, viruses, hackers and spyware. When any file is protected it's impossible to get access to the file without knowing a password. The program has a built-in key generator that create absolutely unique combinations. You will find the application intuitively-clear due to its beautiful and comfortable interface....

System Protect  System Protect

 System & Program Files Protection - System Protect prevents deletion of important system files whose loss could cause your operating system to crash. These files could be attacked by viruses or accidentally deleted by you or your kids. Multilanguage Support - To make System Protect availability more widespread, we’ve translated it into more languages. Automatic Updates - System Protect automatically updates itself and the file database to ensure the most effective protection for your computer. Protection of Selected Files - System Protect allows you to pick files and folders that you want to protect from deletion such as important documents, your favorite music, photos from your vacation, movies or any other files that you do not want to lose. Stable Operating System - System Protect guards essential system files to keep your operating system stable. User-friendly Program - System Protect’s user interface is so easy to use that even a novice is able to setup and use the program to ...

ChristmasStory Block Rootkit Web Bug Joke  ChristmasStory Block Rootkit Web Bug Joke

 ChristmasStory Block Rootkit Web Bug Joke finds and removes spying and advert-displaying programs from your computer.AntiSpy scans system memory, registry, hard drives for a variety of spyware like annoying Ad-wares, data-mining scum-ware, Key-loggers, Trojans, premium number dialers, browser hijackers, surveillance programs, Tracking cookies, Worms, Malware, P2P, Nukers, Browser helper objects, Toolbars, Downloaders and other tracking components that gather information about you. Scan for and remove spyware and other aggressive malware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb from deep within your system....

Armor2net Personal Firewall  Armor2net Personal Firewall

 Armor2net personal firewall stops hackers, data thieves and protects your PC from Internet-borne threats. Armor2net can meet all your requirements for Internet security and Internet privacy. This PC firewall monitors all Internet connections to and from your computer to ensure that only legitimate traffic is allowed and alerts you to attempted intrusions. You have the option to grant and deny access to Internet on a per-application basis, thus preventing worm, Trojan horse and spyware programs from hurting your computer. Armor2net shows the currently active connections and the details of these connections. You can shut off any unsafe connection. Block the dangerous internet sites. More features. Pop-up stopper: Armor2net stops browsers' pop-up ads windows. You can also customize it on each individual web site. Spyware remover: Detect your memory, registry and hard drives for known spywares components and remove spyware safely. Armor2net's interface is easy to use and amiable. It will b...

Multimedia Trojans Killer  Multimedia Trojans Killer

 Multimedia Trojans Killer - Easily remove over 100,000 pests such as SpyLocked, WinFixer, SpyAxe, SpyFalcon, or SpywareQuake. Repair broken Internet connections, desktops, registry editing with a unique repair system. Scheduled scan and automatic updates keep you protected against zero-day threats. Dedicated threat research team scours the Web for new threats and provides daily definition updates. Complete support for Windows Vista.detection and removal. Delete malware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb. on your PC....

KGB Free Keylogger  KGB Free Keylogger

 Information...priceless! Modern programs do their best to protect you from data loss. Text editors create backup copies of documents, web browsers remember login info that you enter on Web pages. Password managers help you manage your passwords, backup managers help you backup virtually everything. Yet, how is it that you still spend hours or even days restoring pieces of precious information? How is it that you lose your info again and again? Is there a solution? I was happily surprised to find a freeware program that does exactly what I need. This program is called Free Keylogger King. Despite its funny name, the program has nothing to do with spying. It simply logs all applications that you start on your own PC, the titles of their windows, all your keystrokes, and more. How can it help you? Imagine you are writing a long e-mail message. Then you click a wrong button or your e-mail client hangs and you have to write the same text from scratch. Sound familiar? With KGB Free Keylogger...

Multimedia Remove Zombie Rootkit Unwanted Toolbars  Multimedia Remove Zombie Rootkit Unwanted Toolbars

 Multimedia Remove Zombie Rootkit Unwanted Toolbars scans for more than 70,000 components, fastest scanning mechanism. An average time of 5 minutes to scan complete hard disk, automatic incremental signature updates - 6 to 8 signature sets released every week, user friendly view for the detected Spyware showing severity, type, and description, option to schedule a scan at users convenience, and restore or permanently delete are some of AntiSpy features. Detect and remove malware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb manually....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>