DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
LifeNumbers PalmOS 3.0
Under password protection and data encryption, track all the secret numbers of your life:
Charge card numbers, expiration dates, PINs, credit limits/remaining credit, current balances
Vehicle VINs, maintenance schedule, insurance information
Bugler alarm activation codes
Product serial numbers and purchase information
Web site URLs, usernames, passwords
See also: store, numbers, pin, security, password, URL, credit, card, serial
Traffic IQ Basic 1
Traffic IQ Basic is a simple to use testing tool for security and network devices. It has an easy to use windows GUI and contains a library of stateful traffic files including attacks and normal network sessions which can be replayed to test network and security devices such as firewalls intrusion detection (IDS) and intrusion prevention (IPS) devices as well as routers and switches. It is ideal for easily generating network traffic as required.
See also: switch, idp, ids, firewall, audit, packet, network, recognition, security, karalon
Kiwi Secure Tunnel 1
Free Secure Tunnel Service for use with Kiwi Syslog Daemon (or compatible). It receives, compresses, and securely transports syslog messages from distributed network devices to a Kiwi Syslog Daemon.With Kiwi Secure Tunnel it is possible to securely and reliably transport your syslog data across any potentially insecure network, such as the Internet. It can monitor files and send any new information from these files as syslog messages.
See also: Unix type Syslog messages, Syslog Daemon, Message Encryption, Secure Message Transport, Internet Security, TCP Syslog messages, Network Utilities
Hide & Protect any Drives 2.1
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
See also: free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password, Hard Drive, DVD, lock
Registrar Registry Manager 5.01
Registrar Registry Manager is a complete registry management solution with a wealth of powerful features. It is intended as a complete and safe solution for administrators and power users for maintaining the registry on both the desktop as well as remote computers on the network and has great features for cleaning your registry.
See also: reg search, registry editor, registry security, regedt32, regedit, restore, registry manager, backup, registry search, reg file, reg replace
FTP Scheduler Pro 6.9r.6.5
This FTP utility was engineered with automation in mind. Strictly for businesses that require ftp'ng of files on a regular basis and requiring an audit trail to ensure data was Sent/Received as perceived. The utility can be used as middleware which is common place in business world when two or more products/applications are on different platforms.
Introductory price $50 expiring July 30th 2005. New price $100 Starting August 1st 2005.
See also: FTP Scheduling Utility Security SSL SSH protocol secure zip service
East-Tec DisposeSecure 2006 Enterprise 3.5
Don't give away sensitive information with the old computers that you or your company resells, donates or removes from operation. Deleting all files, formatting the hard disk or using FDISK is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure 2006 Enterprise removes all traces of data from the computer hard disk by overwriting and destroying beyond recovery every sector and bit of information.
See also: Eraser, erase, wipe, delete, disk, drive, data, destroy, DoD, NAVSO, sanitize, security, sensitive, privacy, secrets, overwrite, destroy, beyond, recovery
Blancco - Pro 4.4
Blancco - Pro is the powerful data erasure solution for the server environment and RAID systems. Extensive server support guarantees high-speed, simultaneous data wipe up to 16 hard disks of any size per computer server.
Once the hard disk(s) are cleaned, the software automatically generates a detailed erasure report with Hardware Asset Management information. Blancco ? Pro covers all recognized international erasure standards.
See also: removal, security, partition, DoD, overwrite, secure, data, delete, erasure, eraser, erase, wipe, cleaner, clean, drive, disc, disk, hard, blancco
HTML2PDF Pilot 2.10
HTML2PDF Pilot converts HTML documents to PDF files. The program supports different PDF security options, password protection mode (using 40-bit and 128-bit encryption keys), fonts embedding, and different compression modes. Using batch conversion mode, you can convert several documents simultaneously. Command line support is also featured. The program is easy to use and has Explorer-like interface.
See also: pdf, convert, html, password, protection, security
Create PDF files by simply clicking 'print' button from any application with PDF-Pro. ePapyrus PDF-Pro is an affordable and reliable tool for creating and securing high quality PDF files from virtually any documents in any application software. Features include Batch Converter, Batch Encryptor, PDF Merge & Split, Microsoft Office Integration, Bookmarks & Hyperlinks, Watermarks, E-Mail Attachments and more.
See also: Hyperlinks, Bookmarks, Merge and Split, Batch PDF Conversion, PDF Security, PDF Writer, PDF Creator
XTempo Mover 2.51
Copy or move photos and files to one, two or three targets, with or without subfolders. Click a huge descriptive button instead of hunting for a tiny buried button. XTempo Mover (formerly XTempo Move It) can rename destination files by date and time, append a counter to avoid overwrite, set destination files to read-only, and more.
See also: backup, photo transfer, file transfer, laptop, notebook, camera, move, copy, digital photography, file transfer utility, photo transfer utility, file utility, shareware, file, photo, digicam
Trilent FTP Proxy 1.4
This firewall-friendly FTP proxy allows multiple computers on your network to share Internet access via FTP in a secure environment. It offers "install-and-forget" operation and superior stability (it carries the "Designed for Windows" logo.) The reverse-proxy mode makes internal FTP servers on firewall-protected networks accessible from the Internet.
Note: To run the program you will need a free trial registration key from publisher's Website.
See also: FTP, proxy, firewall, network, security