Advertisements
 
 
  You'll find a complete list of Security Tools software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
cds time tree restore

Security Tools

PREVIOUS     NEXT

Paradox Password  Paradox Password

 Paradox Password allows you to recover passwords which Paradox databases (tables, indexes) are protected with. Program works with all version and types of Paradox (tables, indexes) files: .DB; .PX; .Xnn; .XGn; .YGn... This is very powerful tool to sysadmins security officers and all who have problems with Paradox passwords....

Advanced PDF Password Recovery  Advanced PDF Password Recovery

 Wer sein Passwort zum Offnen einer Kennwort geschutzter Adobe Acrobat PDF-Dateien (alle Sicherheitsstufen) vergessen hat, dem hilft dieses Utility der russichen Softwareschmiede Elcomsoft weiter. Mit Hilfe von Advanced PDF Password Recovery lassen sich beliebige Passworter ermitteln (Brute-Force Attack, Key Search Attack, Dictionary Attack). Die Software arbeitet mit allen nationalen Versionen von Acrobat PDF-Dateien zusammen. Die vorliegende Testversion verarbeitet zu Testzwecken nur kurze Passworter. Wer die Software registriert, kommt rasch wieder an seine Daten heran....

AK-Discovery  AK-Discovery

 New logic to monitor (16bit-32bit-64bit applications, non-device driver service, device driver service). Monitor executable .exe file (all events). creating, changing, renaming, and deleting. Release the following: operating system error, operating system deleting file errors, operating system renaming file errors, operating system changing file errors, operating system running application errors, operating system desktop graphic errors, operating system CD-R freezing errors, and operating system floppy-disk freezing error. Garbage collection (with search engine). To delete the following temporary files: temporary shortcut, temporary files, temporary Internet files, and cookies...

Prodos  Prodos

 Prodos - Professional Document Security is a cutting edge document protection and management application, designed to protect any files and documents by placing these items in an electronic "safe".Prodos handles passive and active data security, trace elimination as you work and anti-spy protection, regardless of the system you work on, of regardless the programs you work with, and your degree of expertise in IT....

Product Key Explorer  Product Key Explorer

 Product Key Explorer displays product key for Windows, MS Office, Exchange Server, SQL Server, Adobe Acrobat, Adobe CS and 500 other software products installed on your local or remote network computers. In order to install or reinstall Microsoft Office, Windows, or other commercial software, you must have access to a product key (CD Key) for that product. Product Key Explorer retrieves product keys from network computers and allows to protect your company from having pirated software on your network. With this software you will be able to track the number of software licenses installed in your business, find and recover a lost or forgotten product keys. You can backup product keys to Registry File (.reg), save as Tab Delimited Txt File (.txt), CSV Comma Delimited (.csv), Excel Workbook (.xls), Access Database (.mdb), Web Page (.html) or XML Data (.xml) file, print key list or copy all to clipboard. This utility can be useful if you lost the product key and you want to reinstall it....

BT Watcher  BT Watcher

 Detect when you leave office and automatically lock computer. Program determines if you are present by testing connection with your bluetooth enabled mobile phone. Immediately after installation you can assign your mobile with BT Watcher, and you can forget about locking screen: BT Watcher will do it every time you will leave the computer's nearby. To get more security, you can protect BT Watcher by password, if set, password will be needed to deactivate BT Watcher. BT Watcher show only small icon in system tray and balloons about important events, so is almost invisible in work. You can define time after which BT Watcher will show warning message, and separately time after BT Watcher will lock your screen. You can define custom command to execute to, such command could be executed separately from locking screen. Program is best for business persons, or professionals whose travel a lot with notebook BT Watcher can also shutdown your computer, or start other task defined by you....

Ashampoo Magical Security  Ashampoo Magical Security

 Ashampoo Magical Security 2 encodes files with sensitive contents so that instead of text and numbers they simply contain an incomprehensible mix of letters. The algorithm is so strong that it isn`t possible for anyone to crack the code in a justifiable time period. With Ashampoo Magical Security 2, converting an encoded file back to its readable format naturally poses no problems. Ashampoo Magical Security 2 integrates fully into the File Manager, which means it can be activated using the Explorer. Lone files or several files can be gathered in the program window, where they can be encoded and then saved on the hard disk or burned onto a CD or DVD. Once saved onto disk, the encoded files are safe and can be optimally transported. It is also possible to store the files in a self-extracting EXE archive which can then be forwarded to friends or work colleagues. The recipients simply have to activate the files. After entering the correct password, the archives then extract and decode them...
 Advertisements

Speed Unwanted Toolbars Trojans Bot Reporter  Speed Unwanted Toolbars Trojans Bot Reporter

 Speed Unwanted Toolbars Trojans Bot Reporter includes HIPS and anti trojan/virus/worm. Effectively remove spyware, adware, worms,viruses,trojans, keyloggers, home page hijackers and other malware threats ,even dangerous threats like WinFixer, SpyAxe, Movieland, SpyFalcon,ViKing,Worm.Bagle. Protect your PC from harmful threats such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

East-Tec DisposeSecure 2007 Enterprise  East-Tec DisposeSecure 2007 Enterprise

 Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure 2008 Enterprise however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. East-Tec DisposeSecure 2008 Enterprise can be operated either from a bootable media (floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. ...

Hope Rootkit Viking Joke Removal  Hope Rootkit Viking Joke Removal

 Hope Rootkit Viking Joke Removalis a service that detects and rapidly disables Internet Phishing or Spoofing attacks designed to steal critical financial data. Hope Rootkit Viking Joke Removal utilizes the collective observations of Internet users plus a very rapid submission and update system to short-circuit new scams. Hope Rootkit Viking Joke Removal works with Microsoft Internet Explorer to warn before you visit a known malicious site. Remove spyware from your PC and immunize it to block future spyware threats such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit....

DeepCoder  DeepCoder

 With DeepCoder you can protect your privacy when you are sending confidential e-mails and/or files over the internet and when you are storing private files on your computer. DeepCoder is a program to encrypt, decrypt and/or digitally sign e-mails and files using secret keys (passwords) or public keys. It can be used with any e-mail program or wordprocessor program. No plug-ins are required. DeepCoder in a nutshell: - Very easy to use and very straightforward! - DeepCoder works with any POP3 e-mail client (like Outlook, Outlook Express, Eudora, Pegasus, ...) or a browser for webmail (Yahoo! mail, Hotmail, ...) to encrypt and decrypt e-mails. - DeepCoder works with any wordprocessing program to encrypt and decrypt (parts of) text. - DeepCoder can encrypt and decrypt files. - DeepCoder can create encrypted and compressed archives with multiple files and an optional textmessage. - DeepCoder uses secret key encryption (AES/Rijndael) and public key encryption (RSA). - Digital signatures: Dee...

Multimedia Destroy Web Bug Keylogger Unwanted Toolbars  Multimedia Destroy Web Bug Keylogger Unwanted Toolbars

 Multimedia Destroy Web Bug Keylogger Unwanted Toolbars is an antispyware, antimalware, antispam software that quickly and securely removes spyware and other Internet infections, including spyware, adware, malware, home-page hijackers, remote administration tools, dialers, and keyloggers. Detect and stop Spoofing attacks and Internet Phishing from stealing your financial data. Detect and eliminate such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus....

ZipWorx SecureEXE  ZipWorx SecureEXE

 ZipWorx SecureEXE is an Advanced Protection Program System for Executables. The intended audience for ZipWorx SecureEXE is software developers, distributors and others who distribute software to commercial clients. A Protected and Secured Program by ZipWorx SecureEXE can be set to be executed: -For a Limited Number of Times -For a Limited Number of Days -Until a Given DATE/Time -For an UnLimited Time...

Easy Password Storage  Easy Password Storage

 Tired of trying to remember all your different passwords? Sick of Internet Explorer's built in password saving that lets anyone using your computer access your password protected accounts? Now you can store all your passwords for easy access in one secure, encrypted location. Saves all your usernames, passwords and the locations they are used at. Password protected, now you only have to remember one password instead of hundreds! All information is encrypted and secure. Copy your username or password with the click of a button. Quicklinks take you directly to the website or location where your password is used. Sortable lists makes it easy to find what youre looking for. Does not Contain any Adware, Spyware, or other Third Party Software. A brandable (a.k.a. Private Label) version of this software, with full resell rights, is available at www.rebrandsoftware.com....

East-Tec Eraser 2007  East-Tec Eraser 2007

 Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2008. Eraser goes beyond the U.S. Department of Defense standards for the permanent erasure of digital information and removes every trace of sensitive data from your computer, including Internet history, Web pages, pictures, unwanted cookies, chat room conversations, and all traces of files, confidential documents, e-mails deleted in the past, or entire drives, floppy disks, CDs/DVDs, USB flash drives. East-Tec Eraser 2008 cleans away evidence from the latest versions of the most popular Internet browsers (Internet Explorer, Mozilla Firefox, AOL, MSN Explorer, Netscape, Opera) and hundreds of popular programs (Yahoo Messenger, MSN Messenger, AOL Messenger, ICQ, Outlook and Outlook Express, Mozilla Thunderbird, Eudora, Limewire, Morpheus, Windows Media Player, RealPlayer, Winamp, Google Toolbar and many more). East-Tec Eraser 2008 features an intuitive interface and wizards, ...

Hope Remove Web Bug Popups Binder  Hope Remove Web Bug Popups Binder

 Hope Remove Web Bug Popups Binder is a Host Intrusion Prevention System that advances PC security by utilizing an integrated set of unique defense features including desktop firewall, URL/domain filter, system and application anomaly detection and process monitoring components. Hope Remove Web Bug Popups Binder also evaluates WinAPI calls, analyzes a comprehensive list of system variables and monitors security-sensitive registry entries to advise and alert users of virus and spyware infection and intrusion attempts. Identify and remove spyware, keyloggers, and other trackware componentssuch as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

Special Agent PC Secure  Special Agent PC Secure

 Special Agent PC Secure is your Total Internet Security System. It can protect you and your personal information, from Phishers, Hijackers, Trojans, Spyware, Adware, key loggers and even other users of your PC. Protects you from: Internet Intruders with its' configureable Firewall. Spyware, Adware, Hijackers, and Trojans, being downloaded to your machine Phishing and back door sites, with its' Phishing Detector, Tells you when you are on a site that is known to download malware onto your computer. PC Secure has a fool proof Phishing Browser, verifies the IP address, IP owner, URL Aliases Tells you who owns the Domain, the IP address, andthe country the site you're currently visiting is in. Hackers, Spies, and Key loggers stealing your passwords, with its encryption tools. Protects your private files by hiding them and encrypting them. Even you will not  be able to find them until PC Secure unencrypts and unhides them for you. Protects your privacy by shredding files instead of putting ...

ServerDefender AI  ServerDefender AI

 ServerDefender Artificial Intelligence (AI) Web application firewall is designed to provide IMMEDIATE PROTECTION...

MySecurityVault  MySecurityVault

 Securely manage and encrypt passwords, files, and personal information. MySecurityVault provides unparalleled security for your most confidential information. Fill out Internet forms with your secure information. Scan your computer for sensitive information to prevent identity theft. What is MySecurityVault? 1. A Password Manager: MySecurityVault is a customizable, secure place to store your passwords and most confidential information. 2. A Secure, Automatic Form Filler: Automatically fill out common Internet forms that require repetitive information (such as billing and shipping addresses) using personal identities stored in your vault. 3. An Internet Explorer Toolbar Plugin: Quickly gain access to personal information stored in your vault from MySecurityVault's Microsoft Internet Explorer toolbar plugin. 4. A Secure Site Login Manager: Automatically log into Internet sites using your personal login data stored in your vault. 5. A Security Scanner: The unique MySecurityVault Identity ...

PC Locker Pro  PC Locker Pro

 PC Locker Pro V1.2 Copyright(c) Silver Eagle Software,Inc. All Rights Reserved. http://www.SilverEagleSoft.com http://www.cute-cd-dvd-burner.com Email: contact@silvereaglesoft.com Introduction PC Locker Pro is a software that lock and protect your computer when you leave. It has a pretty and friendly interface. ( The interface is the style of WindowsXP. ) It is a powerful software and easy to use. You can lock you computer just by clicking one button in the system tray or using custom hotkey.Then PC Locker Pro will display a lock screen and protected your computer. The windows hotkey and mouse will be disabled. You only need to enter the password to unlock the computer. PC Locker Pro will lock the computer after incorrect shutdown. Features: 1.Lock and protect your computer when you leave. 2.Display a lock screen. ( custom color or custom image ) 3.Lock computer after incorrect shutdown. 4.Record unsuccessful attempts. 5.Pretty and friendly interface. ( It is the style of WindowsXP ) 6...

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>