DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
CleverCrypt Enhanced 1.7
Put yourself back in control of your confidential data with CleverCrypt Enhanced, the outstanding security product for Windows. Create an impenetrable encrypted virtual hard drive to store all of your confidential files in. CleverCrypt Enhanced provides more protection than ever before, with up to 1280 bit military grade encryption! Download your free 30 day trial today.
See also: secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, encrypt hard drive, secure hard drive
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
BT Watcher Pro 1.1
BT Watcher is dedicated mainly for business persons whose travel a lot with notebook. BT Watcher detect by bluetooth when you leave room and automatically lock computer. Program know if you are near computer because it watch your bluetooth enabled device, typically mobile phone. Immediately after installation you can assign your mobile with BT Watcher, and you can forget about locking screen: BT Watcher will do it every time you will go out.
See also: lock, secret, bluetooth, mobile, notebook, security
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, software, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, software, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
Spy Killer 4.0
Spy Killer is a revolutionary new spyware detection and removal application that offers around the clock protection to home and corporate users. Spy Killer offers maximum strength security and protects your home or networked environment from malicious spyware and keylogger applications that secretly record your online activity. Spy Killer was developed with all aspects of security in mind. Our detection routine is second to none and our database
See also: threat, ware, ad, spy, cookie, cleaner, spyware removal, virus, security, key logger, privacy, adbot, spybot, trojan, ad-ware, adware, malware, spyware, infection
SpyVest scans computers for existing spyware and adware programs. Scans include files and folders, registry, cookies, and application scans. Active Protection is provided for spyware applications that hijack web browsers. The Live Update feature keeps your computer safe from new adware and spyware programs. SpyVest takes customer feedback and updates the program and definition list to improve the product.
See also: malware, popups, security, utilities, spyware removal, spyware
DiskLogon adopts the latest authorization technology, allowing you to use memory card, USB Pen Drive or MP3 Player to log on to your computer.
- Completely simulating Smart Card functions
- Automatic logon and automatic VPN connection dial-up
- Supports Terminal Services and Terminal Web Services
- Completely integrates the Security Policy of Windows System
- Provides DiskLogon RunAs function
See also: SmartCard USBDisk Logon Login Log On in, Disk, Smart, USB, Card, Logon, Login, Mp3, iPod, Password.Remote, Notebook, Password, Remote
Reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services. R-Guard enables the user to control access rights to various file systems objects for users, for applications and system processes as well. R-Guard prevents data from disclosure, theft, modification, corruption, and deletion by another user or various malicious programs.
See also: Audit, Data Protection, File Encryption, Data Security, File Monitoring
Complete Cleanup 4.79
Complete Cleanup displays all your file statistics, improves pc performance, and cleans up all cookies, cache files, history files, ActiveX controls and java applets, search engine data and auto forms data, previous passwords and userid entries, index.dat files, and location URLs for all versions of IE, Netscape, AOL, Firefox, Mozilla, or MSN Explorer. This also performs many other disk cleanups including duplicate files.
See also: washer, space, security, privacy, cleaner, file, history, cache, cookies, delete files, remove files, cache cleaner, remove cookies, disk cleanup, cookie cleaner, cookie cleanup, disk, remover, cache, cookies, cleaner, cleanup, virus, remove
1st Email Security 2.81
When you send email messages, Internet Service Providers (ISP) usually store the messages on their mail servers before they try to deliver them. This can be a major risk for you because your relevant information can be viewed and printed on that end, and someday used against you. Email Security sends your email messages directly to recipient mailboxes without leaving any traces on the Internet.
See also: pop, download, remailer, security, smtp, mass, e-mail, email, mailing, mail
History Sweeper 2.74
History Sweeper can automatically clean up the history of your online activities and protect your privacy; remove intrusive devices from your PC and increase your online security; and save storage space and improve performance of your computer;and clean Firefox now!
See also: spyware, adware, protection, security, privacy
Easy SMTP Server 2.52
Send e-mail messages easily and securely from your portable PC while you are traveling around the world! Using this program instead of your ISP's SMTP server you will increase your e-mail security and privacy as well as get rid of annoying change of settings for your e-mail program. Easy SMTP Server is easy to configure!
See also: smtp, easy, server, program, send, pc, messages, portable, servers, security, purchase, privacy, multitude, isp, internet, instead, get, fast, download, different, connections, configure, concurrently, change, working, windows, version, user, try, traveling, tool, supports, support
XTempo Mover 2.51
Copy or move photos and files to one, two or three targets, with or without subfolders. Click a huge descriptive button instead of hunting for a tiny buried button. XTempo Mover (formerly XTempo Move It) can rename destination files by date and time, append a counter to avoid overwrite, set destination files to read-only, and more.
See also: backup, photo transfer, file transfer, laptop, notebook, camera, move, copy, digital photography, file transfer utility, photo transfer utility, file utility, software, shareware, file, photo, digicam
Comparing and synchronizing directories, including sub-directories and files. It is particularly useful on mobile computers, when installing new software and exchanging data.
See also: Synchronizer, Syncronizer, compare, comparing, files, directories, notebook