Free Tool to quickly Disable Windows Automatic Updates
The Metadata Interrogator (MI) is a portable, offline tool for quickly analysing EXIF, XMP, IPTC and other metadata from files. The goal is to try to scrape absolutely any metadata available from any type of file, and provide enhanced functionality for investigators and customer verification agents. Features: Graphical User Interface Timeline and file comparison tools Offline GPS resolving Passport MRZ resolver Flags items of interest
Anjav Antivirus is a lightweight security solution that can help you detect and remove malware components from your computer while also providing you with additional functions. It comes with a user-friendly interface and neatly organized functions, but some significant elements are bugged and accessing them efficiently is not possible whatsoever.
A port of the Firefox PasswordMaker plugin to a standalone Java application. The latest version is 0.6.0. A few of the wider screenshots below are blurry due to Google limiting the width of the page. The program itself does not blur.
Keeper is a safe and secure way to store all of your secret passwords, notes, website logins and other top secret personal information on your laptop or desktop computer. Keeper's military-grade encryption (128-bit AES) allows data to be safely and securely stored on the hard drive of your computer, not online.
Xor Binary data unprotector by A.S.L. You can unprotect games data files crypted with xor byte. Extra added ROL , SHL , ADD , NOT , NEG , OR , MUL , DIV and XOR with external file crypto algorithm. Internal detector for files : zip , rar , 7z , exe , jpg , mp3 , xml , mp4 , MS cab files. Analysed files with external detector. Work fast and save unprotected data to disk. Nice GUI interfeace. You can use this tool if you need crypt data.
BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller.exe), a standard BestCrypt icon appears in the Windows system tray from where commands can be run to mount or dismount container files and create new encrypted containers.
Identity Protector Secures your Identity and Passwords so that you can think about the more important things in life.Identity Protector scans your computer for any traces of Personal Information and any saved passwords and locks them away in a Vault on your system that can only be accessed by a single Master Key password that you create. Even we don't know your password because it's encrypted on our servers.
SWF to exe converter, Encrypt and convert swf to exe with password protected. the encrypted files can only be opened when an Open Password is provided (PC-binding or Non-PC-binding), Only you can create open password for your users. You can add playback progress bar, scale mode, stop or pause button into your swf files.
AVG Internet Security is ultimate protection for whatever you do online: shopping, banking, surfing, downloading, emailing, or social networking. And it's packed with features: File Shredder & Data Safe to help keep your private files safe, faster scanning, LinkScanner to identify dangerous links, Online Shield to scan files before you download them, Anti-Spyware to protect personal data, Anti-Spam, Firewall, free 24/7 support, and more.
Hijack Hunter is an application that thoroughly scans your computer and displays all the gathered data in a comprehensive way. To help the users to detect suspicious system behaviors, our product shows all the needed information in a report file, taking care of all details, on running processes, registry startups keys, drivers installed, windows hijacks, browser helper objects and much more.
Iperius バックアップは、最高の無料のバックアップ ソフトウェアは、それらを必要とする高度なバックアップ機能自分の会社のまた商業エディションでリリースします。Iperius バックアップのフリーウェア バージョンでは、NAS、外付け USB ハード ドライブ、RDX ドライブ、およびネットワーク上のコンピューターなど、大容量記憶装置デバイスにバックアップすることができます。包括的なスケジュールおよび電子メール送信機能があります。Zip…
カスペルスキー アンチ ウイルスは、それ以外の場合あなたから盗むとしていた知っているだろうフィッシングやマルウェアのサイトから守ります。それは前に見たされていない脅威を発見すると同時に、カスペルスキー セキュリティ ネットワーク コンピューター レポートにできます。すべての…