File Lock DLL Device Driver 1.0
FOBS based device driver designed primarily to hide or deny access to files, folders and registry keys on the Microsoft Windows family of operating systems (Windows NT-based systems, including Windows 2000 and Windows XP). It provides the ability to completely hide the presence of an application and discourage tampering. Allows you to create applications with components for desktop, CD or DVD PIRACY lock.
See also: registry tweaks, filelock, File Folder Security, File System Drivers XP, FAT Security, NTFS Security, fobs drivers, device drivers, norton, file lock, folder lock, file spy, folder spy
DiskInternals NTFS Recovery 1.4
If your drive is damaged or inaccessible, a disk volume has been re-formatted or even deleted, your files, unless physically destroyed or overwritten, can be recovered with DiskInternals NTFS Recovery. NTFS is an advanced disk formatting used by XP and other modern operating systems. DiskInternals NTFS Recovery is a tool that utilizes NTFS features allowing you to recover files from Disk volumes in case they were damaged.
See also: data storage devices, jaz, hard drive, hard drive repair, NTFS data recovery software, disk recovery software, file recovery tool, file recovery utility, easy recovery FAT, recovery utility, recover data, disk recovery tool, Disk recovery software, data recovery, archives, damaged, computer crime, computer forensics, corrupt data, corrupted, data confitentiality, data erasure, data recovery services, data recovery software, data recovery, data repair, data security, deleted, disaster recovery, disk doctor, disk recovery, disk, erase, computer eraser, experteraser, file recovery, files, hard disk recovery, hard disk repair, hard disks, hard drive recovery, lost data, lost, operating systems, professional diagnosis, recover file, recovery data, recovery service, repair, supports, undelete, unerase, unformat
DiskInternals FAT Recovery 1.5
DiskInternals FAT Recovery is a fully automatic utility that recovers data from damaged or formatted disks. The program scans the disk first and then restores the original structure of files and folders. Works for all occasions - formatted drive, inaccessible drive, drive not booting, missing or deleted file or directory, corrupted or damaged partition table. Files up to 64 KB are recovered by DiskInternals FAT Recovery absolutely free.
See also: data storage devices, jaz, hard drive, hard drive repair, FAT data recovery software, disk recovery software, file recovery tool, file recovery utility, easy recovery FAT, recovery utility, recover data, disk recovery tool, Disk recovery software, data recovery, archives, damaged, computer crime, computer forensics, corrupt data, corrupted, data confitentiality, data erasure, data recovery services, data recovery software, data recovery, data repair, data security, deleted, disaster recovery, disk doctor, disk recovery, disk, erase, computer eraser, experteraser, file recovery, files, hard disk recovery, hard disk repair, hard disks, hard drive recovery, lost data, lost, operating systems, professional diagnosis, recover file, recovery data, recovery service, repair, supports, undelete, unerase, unformat
CHAOS Self Extractor 3.85
CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.
See also: source, cryptographic algorithms, programs, documents, folders, files, crypto, protecting, protect, safety, chaos, compress, security, code
Import 1099 and W2 data from QuickBooks Data.
Print 1099 and W2 Forms on preprinted and plain paper.
Generate data file for submitting data to IRS and SSA via diskette or upload.
See also: TAX 1099 QUICKBOOKS W2 W-2 magnetic media IRS SSA social security
PDFBlackbox (VCL) 4.2
PDFBlackbox (VCL Edition) is a comprehensive collection of native components that help you compress, encrypt and sign PDF documents from your Delphi or Kylix applications. Both symmetric and certificate-based (X.509) encryption and signing is supported. VCL edition can be used with Delphi 4-7 and 2005-2006, C++Builder 4-6 and Kylix 2-3.
See also: VCL, Delphi, control, component, encryption, certificate, sign, compress, encrypt, security, PDF
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files
See also: cryptography, security, shredding, message digest, hashing, decryption, encryption, cipher
Program Selector Pro 2000/XP 4.9
Program Selector Pro provides access control and usage management. Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security, lock desktop
Whois Tool is a client utility that communicates with WHOIS servers located around the world to obtain domain registration information. Whois supports IP address queries and automatically selects the appropriate whois server for IP addresses. This tool will lookup information on a domain, IP address, or a domain registration information .
See also: information security, enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, network tool, whois, internet scanner, internet security, security software, freeware
Advanced Netstat 1.0
Did you ever wonder what program opened that strange port that suddenly appeard in netstat ? Then Advanced Netstat is what you need ! Many trojans,backdoors,viruses and worms open ports on your system to allow an attacker to access your system and remotely control it. Advanced Netstat helps you to spot such applications. It shows you exactly which applications listen on the network for connections. It is the perfect tool for Administrators but al
See also: protocol, port, udp, tcp, status, network, win, secure, groundzero, monitor, monitoring, trojans, trojan, worm, virus, process, network, security, netstat, advanced
SPAM Shredder 3.1
SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control under incoming emails, thus helping to save your time and money! Applying the SPAM Shredder allows to determine up to 99.9% of spam emails.
See also: express, safe, client, encrypt, spam, protect, mail, e-mail, email, spam, public key, security
Web Padlock 3.2
Web Padlock gives you control over what Web pages can be viewed on your computer. Once installed, it blocks other Web browsers ( Internet Explorer, etc.) from running, leaving Web Padlock as the only Web browser. Only Web sites on the password-protected user-defined authorized list can be visited.
See also: Web security, Web browser, Internet, access control, Internet security
My System Optimizer 2.0
My System Optimizer is an ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. It provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance.
See also: pc control, system security, control pc, system optimizer, system utility
Trustix Enterprise Firewall 4.6
Trustix? Enterprise Firewall, protects assets and business transactions by ensuring fast, secure connections with the Internet and networks. It enables fast, controlled connectivity, providing strong protection against unwanted intrusion without slowing the flow of approved traffic. Supports businesses with highly sophisticated networks and also those just requiring basic email, Web browsing. An essential security component for today's ebusiness
See also: Free Firewall Download, Network Security Software, Enterprise Firewall
SilentVault Personal 1.0.5
A special encryption vault named "SilentVault" is created. User opens / locks this vault by simple log-in and log-out controls. When data is saved to this vault, the industry-standard strongest AES 256 encryption hides this data for ultimate security. When this vault is locked, the files within it are invisible in Windows Explorer and cannot be made visible using any tool. High performance encryption, for disks, laptop, computer, and PC security!
See also: Folder Lock, Hide, AES, Prevent Information Theft, Secured Data Storage, OTFE, On The Fly Encryption, Data, Information, Disk, Folder, File, Privacy, Protection, Encryption, Security, Laptop, Computer, High Risk, Security Environment
Encryption Software designed to protect all your files safely and securely with strong and secure encryption algorithms. Aimed at those with large amounts of pictures, photographs, images video or movie clips that they wish to keep private and secure. These encrypted files can be safely viewed within the PSYB Encrypter viewer by decrypting them to a temporary file within the application path.
See also: Movie, image, Photos, photography, Video, picture, encryption, file, decrypt, image, privacy, secure, password, security, encryption
Drive Vaccine HNM 2.0
The Drive Vaccine HNM is a software console that allows an administrator access to all installations of Drive Vaccine (PC and Mac) from a central location. With Network Control Manager, Technicians are allowed to enable/disable the protection and broadcast updates, applications or new images. The Network Control Manager also keeps track of how many licenses are purchased, used, and available for use with Drive Vaccine.
See also: hdd sheriff, lock down, lockdown, registry mechanic, evidence eliminator, internet eraser, internet erase, workstation protection, classroom computer, desktop security, reboot, restore, hard drive, recovery genius, public access, computer maintenance
ActMon PWL Password Finder (WASP) 2.03
WASP displays all passwords of the currently logged in user that are stored in the Microsoft PWL file password database. It allows the convenient management (i. e. supervision and /or deletion) of this file to improve the security / privacy of your PC. It is also very useful for educational purposes about computer security.
See also: privacy, security, manage, pwl, microsoft, delete, supervise, decrypt, display, list, recovery, passwords, Pwl
SRC Corp--Network Security Software 1.21
SRC Corp Removes and blocks spyware, adware, key-loggers and other malware, remote access to any computer on the network, Remotely turn on or off your client machines, computer trouble shooting and reporting, software management, software deployment, policy compliant with master accounts, and a network chat system. All of these features and more from a single integrated management console. Try SRC Corp Free for 30 Days.
See also: Networks, Computer, Business, Internet, Spyware, Antivirus, Business Software, Network Security
Ecora Documentor for Cisco 4.0.6157.17003
A Windows® application that collects configuration settings and documents them in HTML and Word file formats. Configuration settings collected from Windows, AD, Exchange, IIS, Citrix, Cisco routers, Oracle, Netware, Domino. Great for documentation. Eliminates the time-consuming and error prone manual process of data collection and ensures accurate, standardized reports for IT audits, security, disaster recovery, troubleshooting, and more.
See also: consolidations, mergers, troubleshooting, disaster recovery, IT security, IT compliance, configuration reporting, configuration documentation, IT documentation, Cisco