1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
HB Crypt Source DLL features 12 cryptographic algo's, compiled in C++. viz. Blowfish, Twofish, Rijndael, Skipjack, Serpent, Gost, RC4, TEA, DES, ARA, AES, RODTHA. This compact C++ DLL saves many ma...
|
|
Jammer's powerful protection gives you peace of mind. Its unrivaled multi-barrier system blocks every step an intruder takes with sophisticated counter-measures that protect the Registry, monitor a...
|
|
Shred File 2002 is an all-encompassing file deletion utility used for removing sensitive documents and files. Shred File 2002 will actually encrypt the selected file repeatedly with a random, self-...
|
|
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the ...
|
|
EVeil is a simple, yet effective tool for the security conscioususer. Eveil can be used to protect personal, private, or sensitive patient/client information from the casual onlooker. Eveil is idea...
|
|
Text decoder - WIN,KOI,ISO,ALT,MAC,Russkaja Latinica, 7bit encoding (like=C2=EE=F2, %C2%EE%F2, \c2\ee\f2), UTF7, UTF8, Unicode, Base64, BinHex 4.0,Uuencode / Uudecode. Hand-operated and automatic m...
|
|
The StealthNetWall(TM) firewall is a true IP Packet filter. It will prevent PINGS and Trace Routes to your computer. It is simple to install, and there is no complicated configuration needed to pro...
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails auto...
|
|
Ardamax Keylogger is a small, easy-to-use keylogger that captures users activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happen...
|
|
Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent an...
|
|
eDock Desktop is secure personal storage that will protect your privacy from being compromised. Using the latest SQL file storage technology, eDock Desktop can secure all files with encryption and ...
|
|
The complete solution for the background control and logging the users activity.This software allows to record actions of the user (users) of a computer on start the applications, opening documents...
|
|
Email Spy is email monitoring software and surveillance tool designed for consumers and businesses. If you positively need to know EXACTLY what your children, spouse or employees are sending by ema...
|
|
Visual Zip Password Recovery Processor is a professional tool for recovering zip archive passwords. It features a nice GUI interface and a number of exclusive attacks to beat zip passwords. Real
|
|
CRYPTOCAT 3.0 is a new version of our encrypting product:Updated release features:1. MUCH MORE STRONGER encryption algorithm is implemented;2. Completely re-designed interface and new program optio...
|
|
Lock down your system like never before. Exercize total control over your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcu...
|
|
Advanced File Encryptor uses the AES 256-bit encryption algorithm to encrypt your files. It installs onto the context menus in Windows making it easily accessible for all files and folders. In addi...
|
|
The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent altern...
|
|
Advanced CheckSum Verifier is an handy and fast utility for verifying integrity of files by using the SFV or MD5 checksum calculation algorithm.It will allow you to verify the accuracy of your data...
|
|
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Once ...
|
|
Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote co...
|
|
Every keystroke and click you make is registered by Windows!• The most widely used web browsers, such as Internet Explorer®, Netscape®, or Mozilla® store al...
|
|
The mass media and the Internet are full of stories about used computers being sold with hard disk drives containing confidential data ?banking account information, credit card numbers, social se ...
|
|
The IBM ThinkPad 755CV, 755CDV Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 755CV, 755CDV BIOS passwords. The package includes instructions. This package include...
|
|
Password Reminder is easy to install and easy to use. All you need to do to recover a password is just drag the magnifying glass from Password Reminder over the "****" field.It can reveal almost an...
|
|