Recently Added  - 

Other Security software Download now Security software and application for free . antivirus and antispyware
Secure Archive 1.0.6.1

Secure Archive 1.0.6.1 Free version 4801 

Secure Archive is a powerful File Encryption and Compression tool which allows you to encrypt sensitive data and keep it away from unauthorized users while also compressing it so that it will occupy less space on your computer. In addition, the Secure Delete feature allows you to easily remove the original copies of your unencrypted data.

RogueKiller 64-bit 14.7.4.0

RogueKiller 64-bit 14.7.4.0 Free version 4800 

RogueKiller x64 offers multilingual support, uses low CPU and RAM, and carries out a scan job rapidly. We have not come across any issues throughout our evaluation, as the app did not hang or crash. Although it is not particularly intuitive or attractive, RogueKiller x64 proves to be a pretty powerful tool for detecting and removing suspicious activity from the system.

FoneEraser 1.0.26

FoneEraser 1.0.26  4800 

Aiseesoft FoneEraser is an exclusive eraser for iOS devices. It allows you to remove all data from your iPhone/iPad/iPod completely and permanently. Those data may be contacts, text messages, photo Albums, videos, music, settings, documents and so forth. And the erasing level is optional (Low level, Medium level and High level). In addition, it functions on two or more devices at the same time, which will save lots of time.

SX Hash Suite 2.5

SX Hash Suite 2.5 Free version 4800 

The Complete Hash Password Recovery and Verification Toolset

JRecoverer for Cassandra Passwords 1.0.0

JRecoverer for Cassandra Passwords 1.0.0  4800 

Audit and recovery of Cassandra passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

Secret Messager 1.0.0

Secret Messager 1.0.0 Free version 4799 

Secret messages is a software which is designed to encrypt your messages before you send them. If you would like to send message online, then you should not worry on how you can prevent unauthorized access to the messages. There are some people out there who are eager to hack your messaging account and read the information you are trying to send. The program generates encryption images which hide your message before you can send.

abylon SHREDDER 15.90.1

abylon SHREDDER 15.90.1  4799 

The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.

SplashID 8.1.1.925

SplashID 8.1.1.925  4799 

SplashID secures and backup your passwords, credit card numbers, registration codes and PINs. Never forget a username or password again. SplashID generates truly random passwords hackers cannot guess. Protect yourself from identity theft, keyloggers, and phishing.

XenArmor WiFi Password Recovery Pro 4.0

XenArmor WiFi Password Recovery Pro 4.0  4799 

WiFi Password Recovery Pro is the Enterprise Software to help you instantly Recover as well as Remove all the Wireless Passwords with just a click of button.

CrococryptMirror 1.42

CrococryptMirror 1.42 Free version 4798 

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.

Easy File Protector 5.134

Easy File Protector 5.134  4797 

Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un

11 from 1848

« First « Prev 1 2 ... 115 116 117 118 119 ... 167 168 Next » Last »

Best Apps for Other Security software From the Editors

There are currently no results