Identity Protector Secures your Identity and Passwords so that you can think about the more important things in life.Identity Protector scans your computer for any traces of Personal Information and any saved passwords and locks them away in a Vault on your system that can only be accessed by a single Master Key password that you create. Even we don't know your password because it's encrypted on our servers.
TDSSKiller is a utility that was created in order to provide you with a simple means of disinfecting any system that suffers from an infection from the malware family Rootkit.Win32.TDSS. For Windows operating systems, the term rootkit stands for a program that infiltrates the system and hooks system functions (Windows API).
CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
Encrypt Care is an easy to use, but powerful encryption software which allows user to encrypt or decrypt text and files in batch mode, generate, verify and export ckecksums. Encrypt Care allows you to protect your data using the most powerful encryption algorithms, as well as protect your messages. Flexible options will help you to encrypt and decrypt your data in a matter of seconds.
Locklizard Secure PDF viewer with PDF DRM copy, print, and expiry controls. View encrypted PDF documents (PDC files) protected with Locklizard PDF Security. No useless PDF passwords to enter in order to view secured PDF files. Free DRM download to view secure PDF files. Note that publishers of secure PDF files may have implemented PDF controls to stop PDF copying and printing, and other DRM measures to protect copyright and prevent IPR theft.
Toms Hash Explorer is a fast multi-threaded cryptographic hash calculation suite with an innovative Explorer-like user interface. This free Windows utility allows you to easily calculate cryptographic hash values for single files or entire folders to verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512.
The Terminator system - to be more exact HSS (hardware-software system). Terminator consists of an external hardware controller (Terminator controller controller itself) pluggable into an USB port of a computer and the free Terminator program. The Terminator system was made by the best IT specialists of our organization. It combines the newest engineering solutions, ultimate control compliance, compactness and simplicity.
WiFi Password Decryptor is the FREE software to instantly recover Wireless account passwords stored on your system
The SDL Threat Modeling Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle. The SDL Threat Modeling Tool version 3.1.6 Beta supports Visio 2010. Additional improvements in this version include UI improvements and bug fixes from the previous 3.1 release.
Recover zip password is designed to let you search for passwords of protected ZIP files. This program guarantees the most complicated Zip passwords recovery.Recover zip password allows to search for the password of the protected zip files using Brute Force algorithm
Scans, detects, and removes viruses, spyware, Trojan horses, worms, bots, and more. ZoneAlarm Antivirus includes both Antivirus and the award-winning Firewall. It prevents and disables most recent and sophisticated viruses and PC attacks.
Iperius バックアップは、最高の無料のバックアップ ソフトウェアは、それらを必要とする高度なバックアップ機能自分の会社のまた商業エディションでリリースします。Iperius バックアップのフリーウェア バージョンでは、NAS、外付け USB ハード ドライブ、RDX ドライブ、およびネットワーク上のコンピューターなど、大容量記憶装置デバイスにバックアップすることができます。包括的なスケジュールおよび電子メール送信機能があります。Zip…
カスペルスキー アンチ ウイルスは、それ以外の場合あなたから盗むとしていた知っているだろうフィッシングやマルウェアのサイトから守ります。それは前に見たされていない脅威を発見すると同時に、カスペルスキー セキュリティ ネットワーク コンピューター レポートにできます。すべての…