1Click Spyclean 1.4.9
1 Click Spy Clean protects computer by detecting and removing different kinds of Adware, Spyware and many other types of Malware that represent a great threat to your environment and security. It uses top notch detection algorithms and is based on the work of the best programmers and Malware analysts. Features such as deep scanning sustained by a constantly updated detection database to ensure maxium security for your PC
See also: exploit, worm, cleaner, hijacker, virus removal, anti hacker, anti trojan, anti-virus, security, free spyware removal, spyware remover, adware remover, snoops attack, flood, remove spyware, backdoor, protect, malware threat, parasites, trojans
1st Security Administrator 10.51
Protect PC, restrict access to Windows applications, password-protect boot, apply access restrictions to PC, protect your privacy, deny access to Control Panel, disable interruption boot keys, context menus, DOS, Registry editing, Internet and network access. Hide desktop icons, disk drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows, control Internet, spy on PC users.
See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download
Lock My PC 4.0
According to IT specialists reports, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Co-workers and even our spouses can easily recover any bit of information simply by looking at the screen of an unattended machine. Lock My PC acts like a guard on duty, protecting your PC from prying eyes. Try it today for FREE and actually relax!
See also: lock, computer, pc, access, control, password, security, locker, locking, block, protect, stealth, screen, mouse, parental control, utility, desktop
Advanced Encryption Package 2006 Professional 4.5.5
AEP2006 PRO most noteworthy feature may be its flexibility and military grade encryption: program includes 17 encryption algorithms (AES, TWOFISH, MARS, etc). 18 secure files erasure algorithms including: U.S. DoD 5200.28, GOST P50739-95 and others. Symmetric and RSA encryption using PKI infrastructure. USB Flash Drives as protected Passwords Storage support. Command Line Support. No special encryption knowledge is required to use this software!
See also: encrypt, encryptor, password, protect, blowfish, extracted, ecnrypted, shred, blowfish.zip, unzip, pkzip, winzip, twofish, blowfish, rijndael, cast, mars, serpent, tea, desx, gost, rc2
System Security 2006 4.0.0
System Security 2006 is the next generation of computer-security software. Software that enables you to protect your system from unauthorized use and unauthorized users. System Security 2006 includes new methods to secure and prevent unwanted use of your system. With this software, you can also disable feature of Windows to make your system even more secure.
See also: disable unauthorized, protect, protect pc, secure windows, windows security, restrict, secure, lock, lock pc, lock desktop, pc security, protection, system, security, system security, restrict access, limit access
CleverCrypt Enhanced 1.7
Put yourself back in control of your confidential data with CleverCrypt Enhanced, the outstanding security product for Windows. Create an impenetrable encrypted virtual hard drive to store all of your confidential files in. CleverCrypt Enhanced provides more protection than ever before, with up to 1280 bit military grade encryption! Download your free 30 day trial today.
See also: secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, encrypt hard drive, secure hard drive
.NET Reactor 1.2.0
.NET Reactor protects your intellectual property by mixing any pure .NET Assembly (written in C#, VB.NET, Delphi.NET, J#, MSIL...) with conventional native code. In detail, .NET Reactor builds a native wall between potential hackers and your .NET code. The result is a standard Windows based(non MSIL compatible) file. The original .NET code remains intact, well protected by native code and invisible for prying eyes.
See also: .net compiler decompiler disassembler obfuscation obfuscator protect protection protector reverse engineering anakrino dotfuscator obfuscate obfuscated obfuscating dotnet c# c++ visual basic studio msil cil
Secure Image 2.1 2.1
Copy protect the images on your web site using image encryption and domain lock. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. The applet viewer that sits on the page replacing the image. The encrypted image is unusable unless displayed from its viewer. Only the encrypted images that are uploaded to the server, so the images are safe from everyone, including your webmaster.
See also: protect, image, pics, photo, encrypt, safe, secure, copy, capture, print, screen
CDRom Watchdog 1.22
You can master the usage of the CDROM/DVDROM by using CDRom Watchdog. So that CDROM/DVDROM will be your loyal subordinate. All the disks or CD-ROM unaccepted by you are forbidden to use. You can prevent such things to happen by CDRom Watchdog, that your children play the games secretly(parent control) or anyone use your CDRom without your approval. If you have this series of software, anyone could not use your CD-ROM unauthorized.
See also: cdrom watchdog parent control access children secret protect
Protect your site from thiefs! Hide your PayPal links! Encrypt e-mail links and stop spam! Lock pages in your site! Automatically break your pages out of frames! Password protect any page! And more! The brand new HTML-Protector 2004 software will completely secure any Web site, no matter what sort of host you're using. Just launch the software, select the files you want to protect and how you'd like to protect them - and click!
See also: protect HTML, encrypt HTML, HTML Protector, hide HTML
Data Nuker 126.96.36.199
Shreds sensitive files so they cannot be recovered or undeleted. Includes disk free space shredder - destroy previously deleted files on your hard drive. Shred Files, Folders, Recycle bin, drag & shred, DoD conform. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover the files! Also includes a scheduler & integrates with windows explorer for right click shred.
See also: tmp, swapfile, swap file, strong, stream cipher, source, software, ShredXP, shredding, Shredder, Shred, shareware, sensitive files, security, secure delete utility, secure, sanitize, sanitization, safety, remove, recursively, random, purge, protecting, protect, programs, program, privacy, permanent, perfect, password, paper, overwrite, numbers, number, NSA, microsoft, magnetic, line, kill, key, hard drive, generator, freeware, free, forensic, folders, folder, files, file wiper, file utility, file, Expert, Evidence Eliminator, evidence, EugeneSoft, Eugene, eraser, erase, encryption system, encrypt, eliminator, editor, edit, drive protect, drive, DOD-5220.22M, DOD 5220.22-M, documents, document, disk, directory, destroy, Deletor, delete, data wiper, data recovery, data, cryptography, cryptographic algorithms, crypto, compress, command, code, clean, chaos, cache, business, BRAUN, batch, Basta, backup, appz, application, app, TOOL, tools, undelete, unerase, utility, warez, washer, win32, windoez, windows, wipe, wipe disk, wipe files, word
HOW ON 100 % TO PROTECT THE COMPUTER 2.0.09
E-book. HOW ON 100 % TO PROTECT THE COMPUTER FROM CRASHS OF WINDOWS, VIRUSES, TROJANS, FRIENDS AND RELATIVES. In the book programs and the methods of their use allowing practically on 100 % to protect the computer are described. The offered method does not demand neither time, nor deep special knowledge, but using it any person completely will be capable to supervise a status of the computer and quickly to liquidate quickly any problems.
See also: book, technique, e-book, book, problem, Trojan, virus, method, crash, protection, protect
PDF Encrypt COM/SDK Unlimited License 2.3
PDF Encrypt software is a very flexible and powerful program, PDF Encrypt software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it.
See also: PDF Protection, PDF Protector, PDF Protect, PDF Security, PDF Secure, PDF Encryption, Encrypt PDF, PDF Encrypt, Adobe pdf file, Acrobat
Folder Security Guard 3.0
Folder Security Guard allow You safe protect folders and data inside folders on your drives.
You can hide folders completely making it invisible and inaccessible for people using your computer.
Folder Security Guard allow You restrict access to the folders that contain your sensitive data over local or shared computers.
See also: protect, hide, folder, folder password, folder protection, lock folder, hide folder, encript, safe protect.
Active CHAOS 5.0
Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required.
See also: security, compress, chaos, tools, safety, protect, protecting, crypto, files, folders, documents, programs, cryptographic algorithms, source, code, software
SafeBit Disk Encryption 1.4
SafeBit Disk Encryption is the perfect electronic vault you need for your privacy. It features military strength on-the-fly encryption, by creating virtual disk drives, where you can hide files and folders, keep them encrypted all them time, but still work with these files just like you work with normal files. SafeBit is the last line of defense if your current security system fails against viruses, trojans or hacker attacks.Protect yourself now!
See also: privacy, esafe, safe, electronic, security, disk, virtual, pc, protect, file, strong, computer, password, protect, folder, protect, password, rijndael, aes, 256, data, file, disk, software, encryption, folder, hide, drive encryption, disk encryption, safebit, data, encrypted
CD-DVD Lock 2.11
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
See also: CD, DVD, Hard drive, password, security, administrator, access, control, protect, files, privacy, restrict, lock, screen, free, download
Locker from kids 1.0
Protect your computer and internet connection with Lock computer from kids tools. Scheduler computer work. Schedule Internet connection. Are tou parent? Do you want to admin time of computer work? This tools include a network version. It controll an Internet connection. It control of attempts on chargeable phone services. Spend 15 dollars, and save much more money.
See also: lock computer, kids tools, protect your PC, protect your computer, advanced power management
Security Desktop Tool 188.8.131.52
Security Desktop is a security utility that allows you to restrict access to Windows important resources. This utility limits kids time they spend in internet and playing games. It provides folders and files protection.
See also: security, desktop, file, protect, folder, access, restriction, password, administrator, lock, limit, time
Go Instant LOCK 1.20
Once you lock your folders with instant Lock they will stay completely secure and invisible . Even when you boot from Safe Mode/Another Operating System or from a Bootable System Disk.
Unique Instant Lock technology came to life, after a long R&D period. It is not a toy, like its predecessors. It is powerful but it's also safe and foolproof. Thanks to instant Lock, now you can enjoy using your computer, with a peace of mind.
See also: instant lock your folders, completely secure and invisible, file protect