ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

break access securitysecurity removerremove nsf local security
pdf security breakerLenovo Notebooksql security audit
security devicesocial securitysecurity web cam software
security remover pdfsecurity eventsremoving pdf security
computer network securityremove pdf print security

   

DCPP 3.0

DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up. DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.

See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk

Download DCPP 3.0 (Size: 5576 KB)Buy DCPP 3.0 (only $99.95)


CleverCrypt Lite (Freeware) 1.5

Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!

See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware

Download CleverCrypt Lite (Freeware) 1.5 (Size: 3730 KB)


BT Watcher 1.2

Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.

See also: security, notebook, mobile, bluetooth, secret, lock

Download BT Watcher 1.2 (Size: 1568 KB)Buy BT Watcher 1.2 (only $20.00)


Inspice Trace 3.2

Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.

See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction

Download Inspice Trace 3.2 (Size: 151 KB)Buy Inspice Trace 3.2 (only $29.95)


BT Watcher Pro 1.4

Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.

See also: lock, secret, bluetooth, mobile, notebook, security, office

Download BT Watcher Pro 1.4 (Size: 3196 KB)Buy BT Watcher Pro 1.4 (only $19.99)


BT Watcher 1.4.3

Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.

See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic

Download BT Watcher 1.4.3 (Size: 3661 KB)Buy BT Watcher 1.4.3 (only $14.95)


Notebak Anti-Theft 1.0.14

One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.

See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel

Download Notebak Anti-Theft 1.0.14 (Size: 3091 KB)Buy Notebak Anti-Theft 1.0.14 (only $2.95)


Notebak Alarm 1.0.10

One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.

See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found

Download Notebak Alarm 1.0.10 (Size: 2651 KB)Buy Notebak Alarm 1.0.10 (only $9.95)


Dekart Logon for Citrix ICA Client 2.02

Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. An easy to use and convenient way to making the login to Citrix MetaFrame Presentation Server sessions fast and secure. Biometrics enabled (optional). No passwords being lost, forgotten or stolen.

See also: Citrix login, user authentication, biometric authentication, security Citrix, security device

Download Dekart Logon for Citrix ICA Client 2.02 (Size: 1486 KB)Buy Dekart Logon for Citrix ICA Client 2.02 (only $39.00)


Data Stash 1.5

Data Stash is an award-winning clever little security tool that allows you to hide sensitive data files within other files. Select a large bitmap or database file (or any file you'd like to use) as a receptacle, then add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains FULLY functional. Password protection is also provided, using Blowfish encryption.

See also: file tools, security tools, security utilities, cryptography, steganography, hide files

Download Data Stash 1.5 (Size: 384 KB)Buy Data Stash 1.5 (only $19.95)


VeriFinger Linux SDK 4.2

VeriFinger Linux SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports BiometriKa FX 2000 scanner, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.

See also: pattern recognition, access control, recognition, authentication, SDK, ridge, crime, scan, security, biometric, verification, matching, identification, recognition, fingerprint, criminalistics

Download VeriFinger Linux SDK 4.2 (Size: 198 KB)Buy VeriFinger Linux SDK 4.2 (only $449.00)


Lock My PC 4.0

According to IT specialists reports, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Co-workers and even our spouses can easily recover any bit of information simply by looking at the screen of an unattended machine. Lock My PC acts like a guard on duty, protecting your PC from prying eyes. Try it today for FREE and actually relax!

See also: lock, computer, access, control, password, security, locker, locking, block, protect, stealth, screen, mouse, parental control, desktop

Download Lock My PC 4.0 (Size: 1259 KB)Buy Lock My PC 4.0 (only $19.95)


Password Protected Lock 2.92

Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like. You can have the program power down your monitor.

See also: screen saver, protect privacy, password protection, security computer lock, secure PC, restrict access

Download Password Protected Lock 2.92 (Size: 724 KB)Buy Password Protected Lock 2.92 (only $20.00)


2X SecureRDP for Terminal Services 4.0

2X SecureRDP dramatically increases the security of your terminal servers by accepting/denying incoming RDP connections by IP, Mac address, computer name & more. Logon screen is only displayed if the connection is established from particular IPs or machines. Computers that do not meet the filter restrictions don't see the logon screen & won't get to try a brute force logon! Its an ideal FREEWARE tool for secure remote administration

See also: Terminal server, Microsoft Terminal Services, Windows Terminal services, RDP, security

Download 2X SecureRDP for Terminal Services 4.0 (Size: 1372 KB)


AVIRA Antivirus for Linux Server 1.1.4

AVIRA Antivirus for Linux Server is an VB100 award-winning antivirus solution for Linux file servers with a real-time scanner and multifunctional performance features, designed to ensure complete protection against viruses and unwanted network programs, reducing the potential danger of virus infections that could lead to critical data loss and business high-risk exposure.

See also: server antivirus programs, linux antivirus, phishing, network virus protection, antivirus linux, network security, server antivirus, antivirus for linux, linux security, linux virus protection, computer network security

Download AVIRA Antivirus for Linux Server 1.1.4 (Size: 4687 KB)Buy AVIRA Antivirus for Linux Server 1.1.4 (only $118.00)


CHAOS Self Extractor 3.85

CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.

See also: source, cryptographic algorithms, programs, documents, folders, files, crypto, protecting, protect, safety, chaos, compress, security, code

Download CHAOS Self Extractor 3.85 (Size: 531 KB)


CallerRM 1.2.1

CallerRM is not just a caller ID program. It lets you write memos, create file and folder shortcuts for each person. Next time when people call you again, you will not only know who's calling, but also find the memo and files immediately. If you use telephone a lot, download and try this program, and experience the convenience it brings you.

See also: information manager, notebook, telephone, caller ID, phone, PIM, CRM

Download CallerRM 1.2.1 (Size: 1583 KB)Buy CallerRM 1.2.1 (only $24.95)


TrayBarNotebook with EMail monitor 02.02

EMail monitor with wave and visual notification. Operative notebook. Cryptographic password saver. The small size ~110KB. Allows to keep operatively the text on ten pages. The icon of a notebook after autostart is placed in TrayBar. The call of a notebook is possible on a hot key. Choice of page Ctrl+1, Ctrl+2, etc. The startup together with boot Windows (the option). Startup screensaver on keystroke PAUSE (the option).

See also: monitor, EMail, Notebook, Bar, Tray, password, saver

Download TrayBarNotebook with EMail monitor 02.02 (Size: 107 KB)Buy TrayBarNotebook with EMail monitor 02.02 (only $14.00)


Ecora Documentor for Cisco 4.0.6157.17003

A Windows® application that collects configuration settings and documents them in HTML and Word file formats. Configuration settings collected from Windows, AD, Exchange, IIS, Citrix, Cisco routers, Oracle, Netware, Domino. Great for documentation. Eliminates the time-consuming and error prone manual process of data collection and ensures accurate, standardized reports for IT audits, security, disaster recovery, troubleshooting, and more.

See also: consolidations, mergers, troubleshooting, disaster recovery, IT security, IT compliance, configuration reporting, configuration documentation, IT documentation, Cisco

Download Ecora Documentor for Cisco 4.0.6157.17003 (Size: 55296 KB)


Data Retrieval Program 5.8.4.1

User easily affords trustworthy Data Retrieval Program for get back erased important official evidence from corrupted secondary storage media without facing any difficulty. www.simrecovery.org provides file revival tool uses advanced disk scanning mechanism to search and recover all formatted files from crashed HDD.

See also: File, restore, deleted, text, messages, excel, business, data, pen, drive, system, revival, application, recovers, corrupted, word, documents, database, records, folders, audio, video, clips, inaccessible, USB, media, notebook

Download Data Retrieval Program 5.8.4.1 (Size: 1925 KB)Buy Data Retrieval Program 5.8.4.1 (only $99.00)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us