DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
Document Trace Remover 3.1
Metadata can get you into trouble! Whenever an MS Office document is created it is complemented with such properties as the author, corporate name, document changes, editing time and other metadata. All this makes the private information available to a third party that may put your company at financial risk and/or an embarrassing situation. Document Trace Remover shall advise you of this information and prevent its unauthorized disclosure.
See also: Document Trace Remover, Document Security, MS Office Metadata, Document Integrity
PDF DLL BasePack 1.0
The function library package with the modules (dll) PDFinternals, PDFdocuments, PDFlayout and PDFsecurity for your own (batch-)application. Here bundled for a lower price! You can use the dlls with your commercial applications without paying any further fees - It's royalty free! The dlls are tested with delphi and vba/visual basic... but there should be no problems with any other main programming language, too. Read more on the product pages.
See also: DLL Delphi Visual Basic VBA pdf function Acrobat password document layout security Adobe properties batch library
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
CD-DVD Lock 2.11
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, Hard drive, DVD, download
Encryption Workshop 3.2 Build 060220
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer.
See also: security, encryption, encrypt/decrypt folder, encrypt/decrypt file
Access Denied XP 1.1
Security program that request username and password on Windows load-up and fast lock your desktop by one mouse click . All unwanted people are getting away from your computer. It is stronger what Windows XP security. You can see and manage easily user privileges within colored list of users. Empty password users now can be fast detected too. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time.
See also: access, denied, boot, lock, screen, protect, privileges, safe, guard, password, security
AVIRA Antivirus for Linux Desktop 1.1.5
AVIRA Antivirus for Linux Desktop offers permanent antivirus protection by smoothly monitoring your system's active processes and blocking malware (viruses, Trojans, backdoors, worms etc) from damaging your most valuable data. You can make your decisions and set the type of action on the infected files: isolate, disinfect, remove. It provides frequent updates via Intranet/Internet Update Wizard to efficiently update program files in the network.
See also: anti virus, virus scan, antivirus for linux, antivirus software, antivirus linux, virus, antivirus, linux antivirus, trojan horse, phishing, linux security, linux virus protection, network security, computer security, virus removal, internet security, virus scanner
Chaos Mash 2.0.001
Choose from 45 types of encryption methods. Use these methods with keys you create to keep your data safe. Encrypt any sort of file on your computer. If you need it to be confidential simply "mash" it. Chaos Mash does not require installation, simply copy it to the hard drive or a removable USB device and run it from that location.
See also: privacy, encrypt data, file encryption, encryption utility, security, hide data
SecurityPlus is a powerful encryption and decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on the fly encryption, decryption. SecurityPlus is very fast and will not take long to encrypt, decrypt even large files including files on CD-ROM. Current passwords (keys) can be quickly cleared and files can be safely deleted (shredded
See also: securityplus, plus, confidential, data, protect, protection, key, show, slide, slideshow, shred, shredded, option, JPG, file, password, viewer, CRC, thumbnails, files, secure, security, decrypt, encrypt, decryption, encryption, softbyte, folder
Directors NoteBook 2 Pro 2.f
Directors NoteBook software, is a FileMaker Pro template that functions as a digital "project notebook" for TV commercial director's. It organizes all the information a director needs access to during pre-production, production, and post. From imported storyboard images, efx plate images, location and set photos, casting specs, to all shot specific details like; action, camera directions, lenses and frame rates, screen time, blocking, script, etc
See also: final cut, iMovie, iLife, director, Film director, TV director, Directors NotePad, Directors NoteBook, DGA, Movie Making, TV Commercials
Clock & Notebook 1.0
Free clock with Notebook. Free simple notebook. Save your contacts using the simple notebook clock. The program interface is quite simple so even if you are a beginner you can use it without any trouble.
See also: free download, clock & notebook, free notebook, tell, address, birthday, first name, last name, clock
Lenovo Notebook WiFi Router 4.2
Lenovo notebook WiFi Router is a software-based WiFi routing utility that turns your Lenovo notebook into a wireless router. Designed specially for Lenovo brand notebooks for sharing the Lenovo notebook's Internet with other WiFi-enabled devices.
See also: WiFi Hotspot, Wireless Router, Wireless Connection, WiFi, Hotspot, Wireless, Lenovo Notebook