DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up.
DCPP is the fastest and most feature-rich real-time encryption system available. DCPP is the only software on the market able to hide the entire operating system inside another one.
See also: hidden operating system, encryption, securstar gmbh, securestar, notebook protection, rainbow, usb token, steganography, disk encryption, hard disk encryption, full disk encryption, SecurStar, Plus Pack, security, DriveCrypt Plus Pack, DriveCrypt, DCPP, wilfried hafner, disk
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
BT Watcher 1.2
Immediately upon installation, you can assign your mobile with BT Watcher,
and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: security, notebook, mobile, bluetooth, secret, lock
Inspice Trace 3.2
Inspice Trace is a location tracking program that emails you the precise location of your stolen or lost laptop. Also, it lets you unrecoverably destroy your sensitive data in the laptop in order to protect your data. Accurate and worldwide tracking. US Department of Defense DOD 5220.22-M compliant technology. 100% privacy safe. Tamper-proof. Innovative fault-tolerant and privacy-safe tracking technology. Stealth operation.
See also: email, tamper proof, data protection, security, protection, tracking, location, laptop, notebook, stolen, lost, recovery, department of defense, sensitive data, fault-tolerant, privacy-safe, stealth, data destruction
BT Watcher Pro 1.4
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.BT Watcher Pro features advanced security options: authorization by pin and encryption.
See also: lock, secret, bluetooth, mobile, notebook, security, office
BT Watcher 1.4.3
Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.
See also: lock, secret, bluetooth, mobile, notebook, security, cell, phone, password, launch, automatic
Notebak Anti-Theft 1.0.14
One of the most popular anti-theft applications that is highly recommended by PC Magazine. Get SMS or email alerts if a computer is under attack! Get webcam image of the intruder by email. Anti-theft alarm with sound on attempts to steal a computer. Off-line protection. GEO Fence and WiFi GEO tracking. Recover and delete private data from a stolen or missing computer and much more. Digital Label - assistance to recover a stolen computer.
See also: antitheft, anti-theft, notebook, netbook, tablet, laptop, security, prevention, mobile, computer, tracking, identity theft, stolen, compliance, protection, recovery, data, privacy, webcam, alert, alarm, geofence, foundel
Notebak Alarm 1.0.10
One of the most popular easy to use anti-theft and Identity Theft Protection applications with free options. Sound alerts if a computer is under attack! Get a webcam image of the intruder when away. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.
See also: antitheft, anti-theft, notebook, netbook, laptop, security, prevention, mobile, computer, identity theft, stolen, protection, recovery, data, privacy, webcam, alert, alarm, sound, lost, found
Webcam Zone Trigger 1.7
Zone Trigger is an innovative, intelligent motion detection software that gives you full control over the area being monitored. Because of its user-friendly, object-oriented interface, Zone Trigger is hands-down the easiest motion detection software to use.
See also: Webcam, motion, detection, alarm, security, monitoring, house automation, movement, hot spot, capture, spycam
Dynasoft Cybercafe SurfShop Free 1.28
Why pay for your cybercafe programme? Cybercafe SurfShop Free is the world s first real cybercafe freeware. It offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe freeware.
See also: cyber, center, game, taxiphone, téléphonique, cabine, locutório, caffe, téléboutique, console, game, LAN, Wake, cyberkaffe, callshop, telecom, gratis, phoneshop, telecommunications, skins, monitoring, network, security, cyber, cybercafe, freeware, billing, manager, time, internetcafe, access, restrict, club, cafe, business, ecafe
Text2PDF Pilot 1.40
Text2PDF Pilot converts RTF and text documents into PDF files. The program supports different PDF security options, password protection mode (using 40-bit and 128-bit encryption keys), fonts embedding, and different compression modes. Using batch conversion mode, you can convert several documents simultaneously. Command line support is also featured. The program is easy to use and has Explorer-like interface.
See also: security, protection, password, rtf, text, convert, pdf
This is a software toolkit that allow any developer to protect its developed software against piracy and illegal copies in one single row of code!
See also: evalutation, limitazione, protezione, protection, freeware, splash, limited, shareware, trial, info2000, security, protect, form, visual basic, valutazione
IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer and reads all information from the history file on your computer, displays the list of all URLs that you have visited. It also allows you to clear history, delete cookies and temporary internet files. The tool is designed with a user-friendly interface and is easy to use.
See also: computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, explorer, network tool, enterprise security, information security, internet scanner, freeware
pcInternet Patrol 3.2.3
if you are looking for a Personal Firewall, but do not have security expertise to use it effectively
if you need strong security, but are not prepared to bear the restricted choice of applications to run
if you want protection against fast-spreading malicious programs before they are detectable by existing Antivirus software
See also: personal firewall, patrol, security, firewalls, firewall
Network Security Map Poster 2006
All in one chart displays the network security risks in association with specific protocols, the most up-to-date security technologies and protocols, and the product solutions such as AAA solutions, firewalls, IDS/IPS, VPNs, as well as Anti-Virus Anti-Spyware/Anti-Adware Anti-Spam/Anti-Phishing systems. All security problems, technologies and solutions are well illustrated in the OSI 7-layers model and TCP/IP 4 Layers model.
See also: network vulnerability, network security, computer security, internet security, information security
1st Password Protector 1.0
1st Password Protector will help you manage your passwords securely. You can put all your passwords in one database which is locked with one master key or a key file so you only have to remember one password or use a key file to unlock the database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). You may also copy the database into USB Disk and put it in your pocket.
See also: twofish, AES, security, password
WebCam Anti-Theft System for Net Bar 184.108.40.206
WebCam Anti-Theft System for Net Bar is a set of anti-theft system specifically used for the net bar facility (Webcam), and it can find the loss of computer facility timely. When the computer facility (Webcam) is pulled out, it can sound the alarm, and at the same time the server administration end can be informed immediately which reminds the net bar administrator to prevent the facility from being stolen.
See also: WebCam, Anti-Theft, Security System, Network, Net Bar
ShadowSurfer eliminates new spyware, viruses and worms, cookies, internet history, cyberjunk and malware before it is permanently written to your PC. You can start a ShadowMode session, install trialware, games or surf the internet and discard those changes at the end of your session, keeping your PC in a clean and optimal state at all times.
See also: mp3, games, virtual PC, disaster recovery, data protection, computer privacy, internet privacy, online privacy, anti virus software, anti virus, adware, anti spyware, spyware remover, security, spyware removal, spyware
Ecora Documentor for Domino 4.0.6157.17003
A Windows® application that collects configuration settings and documents them in HTML and Word file formats. Configuration settings collected from Windows, AD, Exchange, IIS, Citrix, Cisco routers, Oracle, Netware, Domino. Great for documentation. Eliminates the time-consuming and error prone manual process of data collection and ensures accurate, standardized reports for IT audits, security, disaster recovery, troubleshooting, and more.
See also: consolidations, mergers, troubleshooting, disaster recovery, IT security, IT compliance, configuration reporting, configuration documentation, IT documentation, Lotus Domino
Private Data Protector 1.0
The Private Data Protector scans your HDD and shows you all hidden information in your documents. If you are sending files via Internet the Private Data Protector will help you to wash document before sending.
See also: home security, private data remove, confidential info delete, secure, internet privacy, disk wipe, doc, rtf, pdf, xls, ppt