ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

security auditing softusb drive securityPortable Security
Complete Desktop Securitysecurity guard systemsmcafee internet security
security softwareExcel Security DRMsmart security
AD Security Reportssecurity breachinternet security 2011
browser securitylotus security

   

ViewPoint 5.01

To avoid any suspicion about your secret your file, it is hidden inside another file (your file is encrypted by the most modern and strong cryptographic algorithms) and the encoding program is also hidden inside another absolutely neutral (but useful) program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets. The hidden pictures are viewed with the same speed and comfort as usual ones.

See also: double steganography, program and information hiding, file encryption, hide files, encryption software, encrypt files, viewpoint, encryption, security soft, AES, rijndael, secure files, private files, protect privacy, shred, total steganography

Download ViewPoint 5.01 (Size: 2080 KB)Buy ViewPoint 5.01 (only $29.00)


Webcam Surveyor 1.5.5

Webcam Surveyor is a utility that allows you to easy control your web cams. You worry for your home or office? Webcam Survayer will help to track safety and will inform you if something happen. Webcam Survayer?s motion detection feature to alert you immediately when activity is detected. Webcam Survayer support E-mail and FTP alerts or you can simply capture sequence of images with an interval of time of a second to 59 hours.

See also: webcam surveyor, webcam, soft, web cam, camera, motion detection, capture, surveyor, security cam, surveillance system, video surveillance, monitoring, AVI capture

Download Webcam Surveyor 1.5.5 (Size: 1602 KB)Buy Webcam Surveyor 1.5.5 (only $29.95)


Webcam Surveyor 1.7.0

Webcam Surveyor is optimal solution for you surveillance system. With intelligent motion detection algorithm you can easy monitoring your home or office. WebCam Surveyor even makes it possible to send out predefined E-mail with surveillance images attached or. This makes it possible for you to observe whatever activity your camera captures even when you are away from home.

See also: webcam surveyor, webcam, soft, web cam, camera, motion detection, capture, surveyor, security cam, surveillance system, video surveillance, monitoring, AVI capture

Download Webcam Surveyor 1.7.0 (Size: 2104 KB)Buy Webcam Surveyor 1.7.0 (only $29.95)


Files Cipher 2.0

Files Cipher is a special cryptographic tool that is easy to use and understand. The encryption algorithm with private key was specially developed by FC Soft and has been proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption. Due to a comfortable and intuitive interface, Files Cipher allows any user to protect data, even novices in information security.

See also: Files, Cipher, Utilitie, Soft, Security, Cryptography, Encoding, Encode, Decode, Decoding, Encrypt, Decrypt, RSA, DES, PGP, Password, Internet, ShareWare

Download Files Cipher 2.0 (Size: 1564 KB)Buy Files Cipher 2.0 (only $49.95)


Secure Cisco Auditor 3.0

The most advanced network security software in its domain which conducts security assessments and security auditing on Cisco firewalls, routers, and switches. This is accompanied with the most up-to-date Cisco auditing tools; it also helps in achieving network security regulatory compliance.

See also: cisco tools, cisco audit, router audit tool, firewall audit, network security, cisco security, audit tool, cisco security audit, auditing software, audit cisco, security software, cisco router, security audit, routers switches, security auditing soft

Download Secure Cisco Auditor 3.0 (Size: 318726 KB)Buy Secure Cisco Auditor 3.0 (only $30.00)


Rohos Welcome 1.3

Rohos establishes a new login way into Windows - by using a USB flash drive. It's just like carrying a key for your house. Whenever you temporarily steps away, you can lock the computer by simply unplugging the USB key. Advantages: Estimates work hours spent on the computer; Add or remove specific users to the welcome screen; personalizing login screen with your digital photos and caption text; Good for security and time save;

See also: flash drive authentication, USB flash authentication, USB flash drive authentication, flash drive login, USB flash login, USB flash drive login, network security, domain, access, usb flash drive, windows password, login, logon, welcome screen, shares, authentication, USB flash drive logon, USB flash logon, flash drive logon, Ctrl+Alt+Del

Download Rohos Welcome 1.3 (Size: 870 KB)Buy Rohos Welcome 1.3 (only $25.00)


Mutilate File Wiper 2.92

Delete your sensitive files permanently. Mutilate File Wiper is a file remover that prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrites. Mutilate supports complete folder and subfolder shredding. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files.

See also: swapfile, swap file, washer, clean, purge, undelete, delete, unerase, eraser, erase, secure deletion, disk eraser, data recovery, removal, shredder, shred, file wiper, wipe, security, forensic

Download Mutilate File Wiper 2.92 (Size: 823 KB)Buy Mutilate File Wiper 2.92 (only $20.00)


VeriFinger Standard SDK 4.2

VeriFinger Standard SDK is intended for most biometric system developers. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners, AuthenTec AES4000 EntrePad and AF-S2 FingerLoc sensors.

See also: fingerprint, identification, matching, verification, biometric, security, scan, crime, ridge, SDK, authentication, recognition, access control, recognition, pattern recognition, criminalistics

Download VeriFinger Standard SDK 4.2 (Size: 3948 KB)Buy VeriFinger Standard SDK 4.2 (only $439.00)


DeviceLock 5.72

DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week.

See also: access control, secure nt, port lock, smart security, cd lock, floppy lock, floplock, flock, protection, securent

Download DeviceLock 5.72 (Size: 6632 KB)Buy DeviceLock 5.72 (only $35.00)


Advanced Security Level 6.1

Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets and to running specific applications; hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar and much more.

See also: computer security, secure Internet, access control, password protection, privacy, restrict access, downloads, advanced security level

Download Advanced Security Level 6.1 (Size: 1065 KB)Buy Advanced Security Level 6.1 (only $49.00)


Idea crypting module for BestCrypt 7.20

Idea crypting driver for BestCrypt version 6.0b or newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The IDEA driver is installed simply enough - you need to place the driver's distributive in some directory, then run BestCrypt Service Manager from the BestCrypt Program Group and use the "Add.." button to add new encryption driver to the list of available drivers.

See also: Privacy, Encryption, file, security, module, Jetico, BestCrypt, IDEA

Download Idea crypting module for BestCrypt 7.20 (Size: 61 KB)


EmailObserver 5.2.3

EmailObserver is a unique email monitoring software and surveillance tool created for a wide range of users either for ordinary home users or businessmen, corporations etc. With its help you can know the exact contents of email messages sent by your children, spouse or employees. After installation on the monitored computer it will invisibly copy all outgoing emails.

See also: smtp, invisible, redirector, stealth, interceptor, observer, spy, protection, security, mail, monitoring, email

Download EmailObserver 5.2.3 (Size: 739 KB)Buy EmailObserver 5.2.3 (only $59.95)


Hide2Image Advanced 5.12

Hide2Image Advanced allows you to encrypt, compress and hide a file (for example: zip, rar, doc, xls, txt, exe, etc...) in BMP file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be recovered from BMP file when you need to get at it, hide and recovered is easy and fast

See also: security, privacy, hide file, encrypt bmp, file hide in bmp, encrypt, encryption tools

Download Hide2Image Advanced 5.12 (Size: 996 KB)Buy Hide2Image Advanced 5.12 (only $29.95)


Deskman Pro 5.5

Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.

See also: system protection, security manager, desktop manager, user control, security software, access control, desktop restrictions, desktop security, easy security, access point

Download Deskman Pro 5.5 (Size: 1258 KB)Buy Deskman Pro 5.5 (only $85.00)


AutoSplit Plug-in for Adobe Acrobat 1.7

Adobe Acrobat plug-in that is designed for advanced splitting and content extraction from PDF documents. Split PDF documents into multiple files by bookmarks, page count, page text, blank pages, page ranges and content. Extract pages that match text patterns or contain specific elements such as forms, images and links. Apply security settings and watermarks to the output.

See also: page ranges, regular expressions, bookmarks, extract, Plug-in, Acrobat, PDF, Split, security, watermark

Download AutoSplit Plug-in for Adobe Acrobat 1.7 (Size: 428 KB)Buy AutoSplit Plug-in for Adobe Acrobat 1.7 (only $69.00)


Uimix 1.0

Uimix is a window transparency manager that secures the viewing of sensitive information by allowing you to adjust the transparency of a selected window, mixing it with its background. Therefore, the information remains viewable for your eyes only, vital in today's organizations which often have open working areas.

See also: Uimix window transparency manager tool utility secures sensitive information viewing background for your eyes only ui mix user interface mixing interface secure securing security wide open working areas work area hide hides hidden application

Download Uimix 1.0 (Size: 262 KB)Buy Uimix 1.0 (only $19.95)


PDF-Pro 2.5

Create PDF files by simply clicking 'print' button from any application with PDF-Pro. ePapyrus PDF-Pro is an affordable and reliable tool for creating and securing high quality PDF files from virtually any documents in any application software. Features include Batch Converter, Batch Encryptor, PDF Merge & Split, Microsoft Office Integration, Bookmarks & Hyperlinks, Watermarks, E-Mail Attachments and more.

See also: Hyperlinks, Bookmarks, Merge and Split, Batch PDF Conversion, PDF Security, PDF Writer, PDF Creator

Download PDF-Pro 2.5 (Size: 13283 KB)Buy PDF-Pro 2.5 (only $84.95)


Web Camera Security System 1.0

Turn your WebCam into a Security Camera. No extra equipment needed. Just set the timer and leave the room. The camera will detect the first thing that moves and start recording. Can be set to record in intervals to assure the culprit is caught on tape. Can be used to detect motion even in dimly lit areas with the Night Detection feature.

See also: Security Camera

Download Web Camera Security System 1.0 (Size: 1293 KB)Buy Web Camera Security System 1.0 (only $9.95)


Antrasoft Secure Messenger 2.15

The E-mail program for communication 100% securely. The program generates security certificates (public & private 1024 bit keys) , automatically exchanging public keys and install them into Windows to make your own personal 'circle of trust' between your partners. The program enables users to encrypt and digitally sign their e-mails or voice messages, ensuring a high level of confidentiality for your personal information.

See also: digital signature, security certificates generation, encrypt emails, S/MIME, voice message, SSL Security, 1024 byte SSL, certificates management, security email program, encrypto voice

Download Antrasoft Secure Messenger 2.15 (Size: 661 KB)Buy Antrasoft Secure Messenger 2.15 (only $35.00)


Internet Lock 5.0

Internet Lock is an access control and password protection software for your Internet programs, it can deny or password protect any program and connection from accessing the Internet. Internet Lock works with the "Rules" mode: you can add one or more rules to control programs and internet connections. A rule normally has such format: [Allow/Deny/Password Protect] [Program] on [Port].

See also: password protect, password protection, internet lock, internet access, internet access control, deny, allow, secure, security, access control, intranet, denied

Download Internet Lock 5.0 (Size: 495 KB)Buy Internet Lock 5.0 (only $29.95)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us