ContraVirus is able to detect and protect against a verity of Spyware, Adware, Trojans and other Malware. After removing existing infections, it uses its SpyWall feature, which will protect against infections before they make their way into your PC.
See also: live monitor, Spam, Adware, Keystroke Monitors, System Monitors, Trojan Viruses, Security Disablers, Browser Hijackers, Page Hijackers, firewall, security breach, security vulnerability, trojan, virus, spyware, adware, spyware threat, spyware monitor
Rohos Welcome 1.3
Rohos establishes a new login way into Windows - by using a USB flash drive. It's just like carrying a key for your house. Whenever you temporarily steps away, you can lock the computer by simply unplugging the USB key. Advantages: Estimates work hours spent on the computer; Add or remove specific users to the welcome screen; personalizing login screen with your digital photos and caption text; Good for security and time save;
See also: flash drive authentication, USB flash authentication, USB flash drive authentication, flash drive login, USB flash login, USB flash drive login, network security, domain, access, usb flash drive, windows password, login, logon, welcome screen, shares, authentication, USB flash drive logon, USB flash logon, flash drive logon, Ctrl+Alt+Del
Mutilate File Wiper 2.92
Delete your sensitive files permanently. Mutilate File Wiper is a file remover that prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrites. Mutilate supports complete folder and subfolder shredding. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files.
See also: swapfile, swap file, washer, clean, purge, undelete, delete, unerase, eraser, erase, secure deletion, disk eraser, data recovery, removal, shredder, shred, file wiper, wipe, security, forensic
VeriFinger Standard SDK 4.2
VeriFinger Standard SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.
See also: fingerprint, identification, matching, verification, biometric, security, scan, crime, ridge, SDK, authentication, recognition, access control, recognition, pattern recognition, criminalistics
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week.
See also: access control, secure nt, port lock, smart security, cd lock, floppy lock, floplock, flock, protection, securent
Advanced Security Level 6.1
Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets and to running specific applications; hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar and much more.
See also: computer security, secure Internet, access control, password protection, privacy, restrict access, downloads, advanced security level
Idea crypting module for BestCrypt 7.20
Idea crypting driver for BestCrypt version 6.0b or newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The IDEA driver is installed simply enough - you need to place the driver's distributive in some directory, then run BestCrypt Service Manager from the BestCrypt Program Group and use the "Add.." button to add new encryption driver to the list of available drivers.
See also: Privacy, Encryption, file, security, module, Jetico, BestCrypt, IDEA
EmailObserver is a unique email monitoring software and surveillance tool created for a wide range of users either for ordinary home users or businessmen, corporations etc. With its help you can know the exact contents of email messages sent by your children, spouse or employees. After installation on the monitored computer it will invisibly copy all outgoing emails.
See also: smtp, invisible, redirector, stealth, interceptor, observer, spy, protection, security, mail, monitoring, email
Hide2Image Advanced 5.12
Hide2Image Advanced allows you to encrypt, compress and hide a file (for example: zip, rar, doc, xls, txt, exe, etc...) in BMP file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be recovered from BMP file when you need to get at it, hide and recovered is easy and fast
See also: security, privacy, hide file, encrypt bmp, file hide in bmp, encrypt, encryption tools
Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point
AutoSplit Plug-in for Adobe Acrobat 1.7
Adobe Acrobat plug-in that is designed for advanced splitting and content extraction from PDF documents. Split PDF documents into multiple files by bookmarks, page count, page text, blank pages, page ranges and content. Extract pages that match text patterns or contain specific elements such as forms, images and links. Apply security settings and watermarks to the output.
See also: page ranges, regular expressions, bookmarks, extract, Plug-in, Acrobat, PDF, Split, security, watermark
Uimix is a window transparency manager that secures the viewing of sensitive information by allowing you to adjust the transparency of a selected window, mixing it with its background. Therefore, the information remains viewable for your eyes only, vital in today's organizations which often have open working areas.
See also: Uimix window transparency manager tool utility secures sensitive information viewing background for your eyes only ui mix user interface mixing interface secure securing security wide open working areas work area hide hides hidden application
Create PDF files by simply clicking 'print' button from any application with PDF-Pro. ePapyrus PDF-Pro is an affordable and reliable tool for creating and securing high quality PDF files from virtually any documents in any application software. Features include Batch Converter, Batch Encryptor, PDF Merge & Split, Microsoft Office Integration, Bookmarks & Hyperlinks, Watermarks, E-Mail Attachments and more.
See also: Hyperlinks, Bookmarks, Merge and Split, Batch PDF Conversion, PDF Security, PDF Writer, PDF Creator
Web Camera Security System 1.0
Turn your WebCam into a Security Camera. No extra equipment needed. Just set the timer and leave the room. The camera will detect the first thing that moves and start recording. Can be set to record in intervals to assure the culprit is caught on tape. Can be used to detect motion even in dimly lit areas with the Night Detection feature.
See also: Security Camera
Harden-It 1.10 Windows Security Hardening Tool harden your TCP/IP Stack and Local System. Harden-It is a Network and System hardening tool for Windows, by hardening the IP stack your Network can sustain or completely twarth various sophisticated network attacks.
· Harden your server's TCP and IP stack
· Protect your servers from Denial of Service and other network based attacks
· Enable SYN flood protection when an attack is detected
See also: hardening, stack, tcp, denial of service, protect, harden, security, freeware
Data Nuker 184.108.40.206
Shreds sensitive files so they cannot be recovered or undeleted. Includes disk free space shredder - destroy previously deleted files on your hard drive. Shred Files, Folders, Recycle bin, drag & shred, DoD conform. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover the files! Also includes a scheduler & integrates with windows explorer for right click shred.
See also: tmp, swapfile, swap file, strong, stream cipher, source, ShredXP, shredding, Shredder, Shred, shareware, sensitive files, security, secure delete utility, secure, sanitize, sanitization, safety, remove, recursively, random, purge, protecting, protect, programs, privacy, permanent, perfect, password, paper, overwrite, numbers, number, NSA, microsoft, magnetic, line, kill, key, hard drive, generator, freeware, free, forensic, folders, folder, files, file wiper, file utility, file, Expert, Evidence Eliminator, evidence, EugeneSoft, Eugene, eraser, erase, encryption system, encrypt, eliminator, editor, edit, drive protect, drive, DOD-5220.22M, DOD 5220.22-M, documents, document, disk, directory, destroy, Deletor, delete, data wiper, data recovery, data, cryptography, cryptographic algorithms, crypto, compress, command, code, clean, chaos, cache, business, BRAUN, batch, Basta, backup, appz, application, app, undelete, unerase, warez, washer, win32, windoez, wipe, wipe disk, wipe files, word
Secret Explorer 6.6.1471
Find hidden data, such as IE form autocomplete data, passwords to protected websites, account and identity passwords, and much more with this new system inspection tool. Secret Explorer is designed to reveal hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you.
See also: security, Protected Storage, password, internet passwords
Admin PC 1.4
Admin PC is a registry tool allowing you to configure your PC in a way you desire. It includes hundreds of restrictions you could apply to your system and/or your applications. These restrictions will stop others from tampering with your PC. The utility itself could be password protected. You could restrict access to Control Panel, Network Settings, Desktop, and others. You could control programs that start automatically when Windows start.
See also: restrict, privacy, free, control, internet, ui enhancements, secure access, password protection, network, administrator, security, admin, pc administrator, screen, individual, users, restrictions, protected, help administer
Antrasoft Secure Messenger 2.15
The E-mail program for communication 100% securely. The program generates security certificates (public & private 1024 bit keys) , automatically exchanging public keys and install them into Windows to make your own personal 'circle of trust' between your partners. The program enables users to encrypt and digitally sign their e-mails or voice messages, ensuring a high level of confidentiality for your personal information.
See also: digital signature, security certificates generation, encrypt emails, S/MIME, voice message, SSL Security, 1024 byte SSL, certificates management, security email program, encrypto voice
Internet Lock 5.0
Internet Lock is an access control and password protection software for your Internet programs, it can deny or password protect any program and connection from accessing the Internet. Internet Lock works with the "Rules" mode: you can add one or more rules to control programs and internet connections. A rule normally has such format: [Allow/Deny/Password Protect] [Program] on [Port].
See also: password protect, password protection, internet lock, internet access, internet access control, deny, allow, secure, security, access control, intranet, denied