最近追加された  - 

他のセキュリティ ソフトウェア 今セキュリティ ソフトウェアとアプリケーションを無料ダウンロードします。ウイルス対策およびスパイウェア対策
ATS CDR Analyzer 2.0.0.0

ATS CDR Analyzer 2.0.0.0  4924 

ATS Call Data Record analyzer can import and analyze CDR/Tower CDR Data from any service provider in India or Other Country and Its generates a comprehensive report of frequency statistics including service provider details and subscriber details.

Teslacrypt Decryption Tool 1.0

Teslacrypt Decryption Tool 1.0 フリー 4924 

TeslaCrypt malware encrypts the victim’s files such as photos, videos, documents, saved game files, and demands a ransom from the victim within a time limit. When the victim pays the ransom they can download a decryption key that will restore their files, otherwise the files are permanently lost.

Identity Protector 1.0

Identity Protector 1.0  4923 

Identity Protector Secures your Identity and Passwords so that you can think about the more important things in life.Identity Protector scans your computer for any traces of Personal Information and any saved passwords and locks them away in a Vault on your system that can only be accessed by a single Master Key password that you create. Even we don't know your password because it's encrypted on our servers.

PC Activity Viewer 2.3.4.50

PC Activity Viewer 2.3.4.50  4922 

Watch and control all PCs & Macs in your LAN. You install the client on each computer you intend to monitor. With the server you can view all computers. You can also capture pictures, record video, and remotely control mouse and keyboard.

USB WriteProtector 1.2

USB WriteProtector 1.2 フリー 4922 

USB WriteProtector enables or disables the write protection for all USB devices of the running system, e.g. USB sticks or external USB hard disks.

Asterisks Password Viewer 3.31

Asterisks Password Viewer 3.31  4921 

Asterisks Password Viewer is advanced password recovery tool that allows you to see the actual password behind the asterisks. Asterisks Password Viewer lets you see the actual password behind the asterisk. It recovers passwords to such programs as Microsoft Outlook, The BAT! and other e-mail clients, FTP clients such as CuteFTP, FlashFXP, etc. Asterisks Password Viewer also supports password recovery in Windows Internet Explorer.

Parental Control 5.4.1.1

Parental Control 5.4.1.1  4918 

Cost effective key logger software works invisibly on your computer and does not show desktop icon, program path and add remove list and not affect processor working speed. Parental Control Software provides convenient option to monitor entire system activities from start to shut down in hidden manner. Parental Control Software records overall system activities made by external user or family members with real date and time in reliable manner.

PDF Postman 2.5.403

PDF Postman 2.5.403  4918 

PDF Postman addon for MS Outlook gives ou an easy way to send private email messages and files in a PDF file encrypted with strong AES-256 encryption. Since nearly eveyrone already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. PDF Postman Works across devices and platforms. It's easy for recipients! No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.

STOP P-O-R-N 8.9.9

STOP P-O-R-N 8.9.9  4917 

STOP P-O-R-N is a handy and easy to use application that can block the access to any pornographic material. It will protect your family or classroom from inappropriate material on the Internet. If inappropriate material is detected the web browser will instantaneously shutdown the program that is displaying inappropriate material.

Keeper 14.12.5

Keeper 14.12.5  4915 

Keeper is a safe and secure way to store all of your secret passwords, notes, website logins and other top secret personal information on your laptop or desktop computer. Keeper's military-grade encryption (128-bit AES) allows data to be safely and securely stored on the hard drive of your computer, not online.

CrococryptMirror Portable 1.43

CrococryptMirror Portable 1.43 フリー 4914 

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.

11 from 1848

« First « Prev 1 2 ... 92 93 94 95 96 ... 167 168 Next » Last »

ためのベストアプリ 他のセキュリティ ソフトウェア 編集者から

結果もは現在ありません