DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
Dekart Logon for Citrix ICA Client 2.02
Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. An easy to use and convenient way to making the login to Citrix MetaFrame Presentation Server sessions fast and secure. Biometrics enabled (optional). No passwords being lost, forgotten or stolen.
See also: Citrix login, user authentication, biometric authentication, security Citrix, security device
Data Stash 1.5
Data Stash is an award-winning clever little security tool that allows you to hide sensitive data files within other files. Select a large bitmap or database file (or any file you'd like to use) as a receptacle, then add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains FULLY functional. Password protection is also provided, using Blowfish encryption.
See also: file tools, security tools, security utilities, cryptography, steganography, hide files
VeriFinger Linux SDK 4.2
VeriFinger Linux SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports BiometriKa FX 2000 scanner, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.
See also: pattern recognition, access control, recognition, authentication, SDK, ridge, crime, scan, security, biometric, verification, matching, identification, recognition, fingerprint, criminalistics
Lock My PC 4.0
According to IT specialists reports, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Co-workers and even our spouses can easily recover any bit of information simply by looking at the screen of an unattended machine. Lock My PC acts like a guard on duty, protecting your PC from prying eyes. Try it today for FREE and actually relax!
See also: lock, computer, access, control, password, security, locker, locking, block, protect, stealth, screen, mouse, parental control, desktop
Password Protected Lock 2.92
Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like. You can have the program power down your monitor.
See also: screen saver, protect privacy, password protection, security computer lock, secure PC, restrict access
2X SecureRDP for Terminal Services 4.0
2X SecureRDP dramatically increases the security of your terminal servers by accepting/denying incoming RDP connections by IP, Mac address, computer name & more. Logon screen is only displayed if the connection is established from particular IPs or machines. Computers that do not meet the filter restrictions don't see the logon screen & won't get to try a brute force logon! Its an ideal FREEWARE tool for secure remote administration
See also: Terminal server, Microsoft Terminal Services, Windows Terminal services, RDP, security
AVIRA Antivirus for Linux Server 1.1.4
AVIRA Antivirus for Linux Server is an VB100 award-winning antivirus solution for Linux file servers with a real-time scanner and multifunctional performance features, designed to ensure complete protection against viruses and unwanted network programs, reducing the potential danger of virus infections that could lead to critical data loss and business high-risk exposure.
See also: server antivirus programs, linux antivirus, phishing, network virus protection, antivirus linux, network security, server antivirus, antivirus for linux, linux security, linux virus protection, computer network security
CHAOS Self Extractor 3.85
CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.
See also: source, cryptographic algorithms, programs, documents, folders, files, crypto, protecting, protect, safety, chaos, compress, security, code
CallerRM is not just a caller ID program. It lets you write memos, create file and folder shortcuts for each person. Next time when people call you again, you will not only know who's calling, but also find the memo and files immediately. If you use telephone a lot, download and try this program, and experience the convenience it brings you.
See also: information manager, notebook, telephone, caller ID, phone, PIM, CRM
TrayBarNotebook with EMail monitor 02.02
EMail monitor with wave and visual notification.
Cryptographic password saver.
The small size ~110KB.
Allows to keep operatively the text on ten pages.
The icon of a notebook after autostart is placed in TrayBar.
The call of a notebook is possible on a hot key.
Choice of page Ctrl+1, Ctrl+2, etc.
The startup together with boot Windows (the option).
Startup screensaver on keystroke PAUSE (the option).
See also: monitor, EMail, Notebook, Bar, Tray, password, saver
Ecora Documentor for Cisco 4.0.6157.17003
A Windows® application that collects configuration settings and documents them in HTML and Word file formats. Configuration settings collected from Windows, AD, Exchange, IIS, Citrix, Cisco routers, Oracle, Netware, Domino. Great for documentation. Eliminates the time-consuming and error prone manual process of data collection and ensures accurate, standardized reports for IT audits, security, disaster recovery, troubleshooting, and more.
See also: consolidations, mergers, troubleshooting, disaster recovery, IT security, IT compliance, configuration reporting, configuration documentation, IT documentation, Cisco
Data Retrieval Program 22.214.171.124
User easily affords trustworthy Data Retrieval Program for get back erased important official evidence from corrupted secondary storage media without facing any difficulty. www.simrecovery.org provides file revival tool uses advanced disk scanning mechanism to search and recover all formatted files from crashed HDD.
See also: File, restore, deleted, text, messages, excel, business, data, pen, drive, system, revival, application, recovers, corrupted, word, documents, database, records, folders, audio, video, clips, inaccessible, USB, media, notebook