ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

security auditing softAutomatic Securitysecurity protection
Web security servicebreak nsf file securitysecurity check
erase nsf server securitysecurity managerchange pdf security
Security Delegationbreak adobe pdf securityIIS security
soft phoneinternet security suite

   

ViewPoint 5.01

To avoid any suspicion about your secret your file, it is hidden inside another file (your file is encrypted by the most modern and strong cryptographic algorithms) and the encoding program is also hidden inside another absolutely neutral (but useful) program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets. The hidden pictures are viewed with the same speed and comfort as usual ones.

See also: double steganography, program and information hiding, file encryption, hide files, encryption software, encrypt files, viewpoint, encryption, security soft, AES, rijndael, secure files, private files, protect privacy, shred, total steganography

Download ViewPoint 5.01 (Size: 2080 KB)Buy ViewPoint 5.01 (only $29.00)


Webcam Surveyor 1.5.5

Webcam Surveyor is a utility that allows you to easy control your web cams. You worry for your home or office? Webcam Survayer will help to track safety and will inform you if something happen. Webcam Survayer?s motion detection feature to alert you immediately when activity is detected. Webcam Survayer support E-mail and FTP alerts or you can simply capture sequence of images with an interval of time of a second to 59 hours.

See also: webcam surveyor, webcam, soft, web cam, camera, motion detection, capture, surveyor, security cam, surveillance system, video surveillance, monitoring, AVI capture

Download Webcam Surveyor 1.5.5 (Size: 1602 KB)Buy Webcam Surveyor 1.5.5 (only $29.95)


Webcam Surveyor 1.7.0

Webcam Surveyor is optimal solution for you surveillance system. With intelligent motion detection algorithm you can easy monitoring your home or office. WebCam Surveyor even makes it possible to send out predefined E-mail with surveillance images attached or. This makes it possible for you to observe whatever activity your camera captures even when you are away from home.

See also: webcam surveyor, webcam, soft, web cam, camera, motion detection, capture, surveyor, security cam, surveillance system, video surveillance, monitoring, AVI capture

Download Webcam Surveyor 1.7.0 (Size: 2104 KB)Buy Webcam Surveyor 1.7.0 (only $29.95)


Files Cipher 2.0

Files Cipher is a special cryptographic tool that is easy to use and understand. The encryption algorithm with private key was specially developed by FC Soft and has been proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption. Due to a comfortable and intuitive interface, Files Cipher allows any user to protect data, even novices in information security.

See also: Files, Cipher, Utilitie, Soft, Security, Cryptography, Encoding, Encode, Decode, Decoding, Encrypt, Decrypt, RSA, DES, PGP, Password, Internet, ShareWare

Download Files Cipher 2.0 (Size: 1564 KB)Buy Files Cipher 2.0 (only $49.95)


Secure Cisco Auditor 3.0

The most advanced network security software in its domain which conducts security assessments and security auditing on Cisco firewalls, routers, and switches. This is accompanied with the most up-to-date Cisco auditing tools; it also helps in achieving network security regulatory compliance.

See also: cisco tools, cisco audit, router audit tool, firewall audit, network security, cisco security, audit tool, cisco security audit, auditing software, audit cisco, security software, cisco router, security audit, routers switches, security auditing soft

Download Secure Cisco Auditor 3.0 (Size: 318726 KB)Buy Secure Cisco Auditor 3.0 (only $30.00)


70-270 Demo Exam Questions 1.0

Pass-Guaranteed is the leader in IT Certifications that will Guarantee you will pass your 70-270 exam on Your First Try. Our exam questions are designed by highly experienced and certified trainer's that have put together the best online source for IT certifications with detailed question and answer explanations. For only $29.00, you can be rest assured of passing the 70-270 exam using Pass-Guaranteed, or Your Money Back!!!

See also: 70-270 mircosoft certification, mcse 70-270 study guide, 70-270 exam questions, MCDBA, MCSA, MCSE, MCSE 2000 Security

Download 70-270 Demo Exam Questions 1.0 (Size: 1249 KB)Buy 70-270 Demo Exam Questions 1.0 (only $29.00)


Advanced Security for Outlook 1.3

Use Advanced Security for Outlook to learn what programs are trying to access Microsoft Outlook and permanently allow or deny access to the program the next time it requests access, the action you choose for this program will be automatically executed and Outlook Security will not annoy you with messages about trying to access e-mail addresses you have stored in Outlook. Works with Microsoft Outlook 2000, 2002/XP and 2003. Freeware.

See also: alert investigation, outlook object model security guard, program is trying to access, microsoft outlook, security alert, outlook security patch

Download Advanced Security for Outlook 1.3 (Size: 1244 KB)


Folder Guard Classic Edition 7.5

Folder Guard Classic Edition for Windows Me/98 - Powerful security and access control utility that lets you hide or password-protect files and folders, restrict access to Control Panel, and more. Makes folders invisible to any application, including Explorer, Office, command prompt. Highly customizable and user friendly. For personal systems or corporate networks. Evaluation version is fully functional. http://www.winability.com/

See also: access control, password protection, computer security, restrict access, hide folder

Download Folder Guard Classic Edition 7.5 (Size: 1211 KB)Buy Folder Guard Classic Edition 7.5 (only $39.95)


Active CHAOS 5.0

Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required.

See also: security, compress, chaos, safety, protect, protecting, crypto, files, folders, documents, programs, cryptographic algorithms, source, code

Download Active CHAOS 5.0 (Size: 1005 KB)


Mister Alibi Windows Cleaner 2.0

Cover your internet tracks! Delete cookies, typed URLs and more! The only software of its kind that lets you specify which cookies and Typed URLS should not be deleted!

See also: privacy, clean windows, clean ie, delete cookies, misteralibi, security

Download Mister Alibi Windows Cleaner 2.0 (Size: 3087 KB)Buy Mister Alibi Windows Cleaner 2.0 (only $24.95)


LSDTech PrivateDisk 1.32

PrivateDisk protects and hides your private and personal data by making them invisible and encrypted. You place your valuable files and folders into PrivateDisk virtual disk image file and no one can't even see what files (with what names, of what type) are there, all virtual disk image file contents is looking like a real garbage. To get access to actual data a password is required.

See also: LSDTECH, PRIVATEDISK, FILE, DISK, DRIVE, VIRTUAL, UTILITIES, ENCRYPTION, PROTECTION, SECURITY

Download LSDTech PrivateDisk 1.32 (Size: 1493 KB)Buy LSDTech PrivateDisk 1.32 (only $14.50)


Kremlin Encrypt (for Mac OS) 3.0

Kremlin builds a wall around your data, protecting your data from intruders. You can encrypt/decrypt files with RC4 and Blowfish in one click and securely delete files by dragging them to the Kremlin Secure Recycle Bin. The Kremlin Sentry schedules itself to secure your hard disk and memory to wipe all records of your activities. Kremlin Text is a secure word processor with encrypted e-mail capabilities.

See also: Mac, SDK, wipe, easy, suite, cryptographic, delete, secure, decryption, encryption, Kremlin, security

Download Kremlin Encrypt (for Mac OS) 3.0 (Size: 1076 KB)Buy Kremlin Encrypt (for Mac OS) 3.0 (only $35.00)


Puffer 4.02

Puffer is a general purpose 256-bit AES encryption utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions.

See also: steganography, stego, AES, public key, wipe, email, security, encryption, compression, archive, puffer

Download Puffer 4.02 (Size: 1056 KB)Buy Puffer 4.02 (only $34.95)


Tweaking Toolbox XP 1.60

The utility for any serious Windows tweaker! Change hundreds of registry settings from WinXP, improving appearance and performance. Prevent others from changing your settings, increase Windows security. Administer all (Windows) user accounts on your computer from your Admin. account! Lock down Control Panel applets, Internet Explorer options, even choose which applications can or can't be run on the computer! This powerful tool is a bargain!

See also: tweaking, start menu, control panel, security, changes, registry, windowsxp, tweak, tweakxp, tweakui

Download Tweaking Toolbox XP 1.60 (Size: 953 KB)Buy Tweaking Toolbox XP 1.60 (only $29.95)


1st Evidence Remover 2.21

When you work with your PC, all activity information is stored in various files and in the Windows registry. All pictures you have seen on the Internet, all passwords and bank accounts you use and other detailed information can be easily extracted from your PC by any person with a minimal computer knowledge. This program lets you destroy all hidden needless activity information that may potentially contain evidence and endanger you needlessly

See also: password, security, administrator, remover, control, protect, privacy, restrict, lock, free, download

Download 1st Evidence Remover 2.21 (Size: 1177 KB)Buy 1st Evidence Remover 2.21 (only $59.00)


East-Tec DisposeSecure 3.4

Don't give away sensitive information with the old computers that you or your company resells, donates or removes from operation. Deleting all the files, formatting the hard disk or using FDISK is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure however removes all traces of data from the computer hard disk by overwriting and destroying beyond recovery every sector and bit of information.

See also: Eraser, erase, wipe, delete, disk, drive, data, destroy, DoD, NAVSO, sanitize, security, sensitive, privacy, secrets, overwrite, destroy, beyond, recovery

Download East-Tec DisposeSecure 3.4 (Size: 2665 KB)Buy East-Tec DisposeSecure 3.4 (only $9.95)


1 Privacy Eraser 1.5

1 Privacy Cleaner is the no. 1 privacy protection tool on the Web! With features such as: rapid erase, configurable hotkeys, configurable options, scheduler, plugins, junk cleaner, memory optimizer, space cleaner, file shredder, Windows tweaking and browser cleaning, 1 Privacy Cleaner makes sure your privacy is the most important thing to keep!

See also: Security, Protection, Performance, Enhancement, Safety

Download 1 Privacy Eraser 1.5 (Size: 1184 KB)Buy 1 Privacy Eraser 1.5 (only $27.00)


CamShot Monitoring Software 2.2.0

CamShot monitoring software is a simple and easy-to-use surveillance software. It can capture the WebCam images and deliver the capture via Internet, you can receive the screen capture image at any time and any where. CamShot has two monitoring modes Schedule Mode and Motion Detect Mode. CamShot allows to plug with four web cams, you can always get the latest picture.

See also: cam, video, shot, snapshot, web cam, monitoring, security

Download CamShot Monitoring Software 2.2.0 (Size: 16570 KB)Buy CamShot Monitoring Software 2.2.0 (only $12.55)


BT Watcher 1.2

Immediately upon installation, you can assign your mobile with BT Watcher, and you can forget about locking your PC: BT Watcher will do it every time you will leave the vicinity of the computer.

See also: security, notebook, mobile, bluetooth, secret, lock

Download BT Watcher 1.2 (Size: 1568 KB)Buy BT Watcher 1.2 (only $20.00)


Ecora Auditor Lite for Windows 4.0.6157.17003

A Windows® application that collects configuration settings and documents them in HTML and Word file formats. Configuration settings collected from Windows, AD, Exchange, IIS, Citrix, Cisco routers, Oracle, Netware, Domino. Great for documentation. Eliminates the time-consuming and error prone manual process of data collection and ensures accurate, standardized reports for IT audits, security, disaster recovery, troubleshooting, and more.

See also: consolidations, mergers, troubleshooting, disaster recovery, IT security, IT compliance, configuration reporting, configuration documentation, IT documentation, Microsoft Windows

Download Ecora Auditor Lite for Windows 4.0.6157.17003 (Size: 55296 KB)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us