DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
EventTracker manages event log of Windows NT/2000 workstations and server at central location. It displays all the events in real time and logs events into a database.It monitors event logs, security, processes and services, SNMP, Windows clusters. It supports Event notification. Remote viewers, Custom views, event filtering, powerful reporting, remote install, history viewer and many more features
See also: alerts and report, enterprise, syslog, event log monitoring, event log monitor, network monitoring, event management, Microsoft Exchange, content security, network monitoring software, SNMP devices, network security, port scanner, intrusion detection
Hide Secret Files 2.01
Hide Secret Files is a security product based on an unequalled data hiding method. It is an easy and user-friendly tool to hide and safely protect your private information from erasure and unauthorized access.
See also: delete, wipe, eraser, privacy, unhide, secure, private, erase, invisible, safe, secret, guard, folder, protect, security, file, folder guard, lock files, hide folders, lock folder, Folder Lock, hide, sensitive, disk, lock, evidence
Easy Email Encryption 5.72
Easy Email Encryption is for sending and receiving encrypted email messages (optionally with attached files up to 100 KB), and is designed to be both secure and easy to use. It works with any email program including Outlook Express. It uses a symmetric key method, and keys are maintained in an encrypted list of keys for easy access. It is bilingual, English/German, and works with text in languages other than English.
See also: easy email encryption, email, encryption, security, encipherment, encryption software, file encryption
PC Security Explorer 1
PC Security Explorer highly improves your computer's security. You get powerful tool
that monitors loaded programs and Internet traffic, and also cleans your computer up
from security threats and make backup of your documents.
"Computer Control" section provides four applications.
"Internet Security" section provides seven applications.
"Additional Tools" section provides four additional applications
See also: password, clean, popup, anti, analyzer, protection, blocking, optimize, optimizer, scanner, autostart, monitoring, whois, firewall, explorer, security
AVIRA Security Management Center 184.108.40.206
AVIRA SMC* beta version is a network-dedicated management application, which unites specific AVIRA antivirus products into a solid, safe and stable security solution. It provides administrators with advanced capabilities of centralized and remote management of AVIRA software. By means of a simple and very intuitive interface, the IT Manager is able to control, update or access antivirus protection commands at network level.
See also: computer security, phishing, anti virus, virus scan, network security, virus protection, trojan horse, antivirus, virus, antivirus software, virus removal, internet security, virus scanner
AVIRA Removal Tool for Windows 2.0.1
AVIRA Removal Tool for Windows v 2.0.1 is a free, easy-to-use disinfection tool, specifically designed to remove a series of security threats from your system, such as Worm.Sober.J/P/Y and W32.Stanit.A
Repairing function: it fixes infected files, only if not severely damaged by the malware's actions.
Simple operation: you simply have to unpack it and then start it by double click.
See also: virus removal, virus scanner, free tool, free, antivirus software, virus, antivirus, trojan horse, virus protection, virus scan, anti virus, phishing, computer security, internet security
PasswordGlue helps you to never forget forget a password again. Using PasswordGlue you can store all of your usernames, passwords, and related private information in a portable encrypted database. All of your information is protected by a single master password.
Your passwords can also be grouped into one or more categories, allowing flexible management of your private information.
See also: personal, private, hide, save, vault, redhotglue, security, encryption, keys, password
Windows Security Officer 220.127.116.11
Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources.
See also: internet, folder, file, guard, privacy, protect, lock, administration, securing, security, control, access, password
Intensive Care Utilities 4.20.040827
Intensive Care Utilities protects domains and servers by automatically capturing all security information (SAM) into human readable text files. Network administrators can quickly diagnose the health of their environment and make necessary changes, including a complete rebuild of all users, groups, passwords, shares, home directories and ACLs. These captures can also be used to migrate to upgraded domains/servers.
See also: 2003, 2000, LANICU, HIPAA, SOX, Security, Management, Pwdump, Passwords, Hash, Network Appliance, NAS, Migration, Home Directory, Share, ACL, SAM, Microsoft
Use NoteBook to store your important notes and passwords in an encrypted file. Includes a password option to keep your data protected from prying eyes.
See also: secure, notes, storage, encrypted, password, list, book, note, notebook
Art Clock 1.0
Free clock with Notebook, timer and system tool. Free simple timer, notebook, tool for restart & shut down. Save your contacts using the simple notebook clock. The program interface is quite simple so even if you are a beginner you can use it without any trouble.
See also: free download, clock, notebook, timer, system tool, free notebook, address, birthday, first name, timer
Public SyncTool 1.2
Synchronise your Outlook with your Notebook Public SyncTool provides a powerful synchronization, enabling consumers to keep all of their information, calendars, e-mail, contacts and tasks constantly up-to-date between a PC and a notebook. Includes conflict resolution feature if both items on the PC and notebook will be changed or if any items will be deleted. Support a synchronization between Exchange or Public ShareFolder and PST files.
See also: Outlook 2010, 2007, synchronization, sync, synchronisation, groupware, outlook, exchange, synchronise, synctool, pst, share, notebook, laptop, internet, email, contacts, address, calendar, dates, notes, server, office, microsoft, sharing, backup, offline, team, workgroup