DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
Secrets Protector Pro 2006 3.1
A three-in-one privacy protector built for those who like their personal stuff handled carefully. This product gives you the features of a folder locker, a secure eraser and a privacy manager. The Hide Secret File?s proud successor, enforced with strong encryption, secure file deletion technique and a smart built-in trace remover will help you to protect your secret data and online privacy better than ever.
See also: delete, eraser, wipe, privacy, unhide, private, erase, secure, safe, invisible, secret, guard, folder, protect, security, file, lock files, hide folders, lock folder, private file, hide, sensitive, disk, lock, evidence
Password Maintenance 2.06c
Manage all your passwords and websites with the ability to open websites and fill your information. You can automatically click and open any website in your list, and fill in the password and user id information. This also includes an option to store all your password data on diskette to better protect your data, as your password files will not even exist on your pc if you choose. You can also print a list of all your passwords and websites.
See also: save passwords, storing, store passwords, password manager, user ids, website, lock, protect, maintenance, safe, passwords, security, store, manage, manager, password, website passwords
SMSecurity Pro 1.1
With SMSecurity, any kind of big capacity file can be split into several small ones with appointed capacity.
See also: File split, file split, File Security, File security, Merge, Split, Security, merge, split, security, file merge, File Merge
Utility Phone 1.5
FREE Worldwide PC-to-PC communications using: voice, video, online/offline text messaging, text chat and file transfer, all secured using AES 256 bit encryption. Other features include activity notifications and privacy mode. For corporate V.O.I.P. peering solutions, UtilityPhone can supply a private contact server so that a corporation can limit communications within their own private group. Subscribers may fix/lock their User I.D..
See also: AES, security, secure, video conferencing, video, offline messaging, instant messaging, messaging, text chat, voice, voip, AES 256 bit, communicate, communications
Taceo secures your outbound email and attachments from unauthorized forwarding, copy, paste, print and screen capture. Integration with Outlook keeps you in access control of your contracts, proposals and internal data, with delivery to your intended recipient inbox only. Users can also apply encryption and access expiration times to email and documents, enabling completely private correspondence between you and your recipients.
See also: rights management, encryption, protection, document, secure, security, email, prevent forwarding, outlook
Audio Zone Trigger 1.2
Audio Zone Trigger was designed to do one thing: make the computer react to sound. This is quite simple, and can be used for many things: home security, house automation, games, experiments... It lets you set triggers on the sound. Triggers are filters that you put on the sound wave, they put thresholds on them, and perform the actions that you have selected when the thresholds are broken.
See also: sound capture, trigger, movement, house automation, monitoring, security, alarm, detection, motion, Microphone, spycam
VNC Scan Enterprise Console 2005.12.20
VNCScan allows you to remotely control and manage your workstations and servers. VNCScan is the legendary front end to VNC. With VNCScan, you can:
* Scan for and deploy VNC Remote Control on your network
* Search a network for a user login
* Deploy standard settings for all of your VNC servers
* Push scripts to remote computers
* Create custom commands for computers
* Access Terminal Servers
* audit who's logged in where
* Send WOL
See also: WOL, vnc manager, smartcode, security, scanner, pc anywhere, terminal server, vnc scan, vncscan, vnc manager, vnc, network
DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product.
See also: drivecrypt, securstar, encryption, encryption software, hard disk encryption, disk encryption, steganography, computer security, 256, data security, computer securitz
The Keys Program 3.1
The Keys Program is an easy to use database for businesses to keep track of keys for buildings, offices or vehicles that are issued to employees or others. The program will keep a complete and permanent record of exactly who had what keys and when they had them. It is intended to help prevent the accidental loss of keys by keeping key holders accountable, and to keep a record of who had access to locked spaces and vehicles for security.
See also: church keys, key functions, security, locker keys, employee keys, keys, keys program, key tracking software, key tracking, door locks, who has what keys, where are keys
ArtistScope CD 2.0
For copy protection of content distributed by email, download or on CD. ArtistScope CD produces an encrypted archive to prevent easy extraction of content. Viewable in all Windows browsers, ArtistScope CD is ideal for catalogue and portfolio distribution. Almost anything that you can run on your web site can be run on ArtistScope CD. Features include optional password protection and expiration of the archive.
See also: protect, secure, encryption, lock, security, safe, image, page, web, internet
Best Network Security 1.61
Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
See also: settings, supports, tweaks, well, administrator, control, options, patches, access, internet, workstations, security, network, secure, restrictions
Password Protect USB 3.6.1
Password Protect USB is a software program designed to protect an unlimited number of folders with your personal passwords. You can set a password on any folder containing your sensitive data. Install the program on your removable drive and protect/unprotect folders at any computers your drive is connected to. The program supports Windows XP, 98, 2000, NT, ME, Vista. Download Password Protect USB now.
See also: lock, secure, security, protection, folders, protect, password