Recently Added  - 

Other Security software Download now Security software and application for free . antivirus and antispyware
Secret Messager 1.0.0

Secret Messager 1.0.0 Free version 4798 

Secret messages is a software which is designed to encrypt your messages before you send them. If you would like to send message online, then you should not worry on how you can prevent unauthorized access to the messages. There are some people out there who are eager to hack your messaging account and read the information you are trying to send. The program generates encryption images which hide your message before you can send.

SX Hash Suite 2.5

SX Hash Suite 2.5 Free version 4798 

The Complete Hash Password Recovery and Verification Toolset

CrococryptMirror 1.42

CrococryptMirror 1.42 Free version 4797 

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.

Secure Archive 1.0.6.1

Secure Archive 1.0.6.1 Free version 4797 

Secure Archive is a powerful File Encryption and Compression tool which allows you to encrypt sensitive data and keep it away from unauthorized users while also compressing it so that it will occupy less space on your computer. In addition, the Secure Delete feature allows you to easily remove the original copies of your unencrypted data.

FoneEraser 1.0.26

FoneEraser 1.0.26  4797 

Aiseesoft FoneEraser is an exclusive eraser for iOS devices. It allows you to remove all data from your iPhone/iPad/iPod completely and permanently. Those data may be contacts, text messages, photo Albums, videos, music, settings, documents and so forth. And the erasing level is optional (Low level, Medium level and High level). In addition, it functions on two or more devices at the same time, which will save lots of time.

abylon SHREDDER 15.90.1

abylon SHREDDER 15.90.1  4797 

The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.

Free EXE Lock 5.0.5

Free EXE Lock 5.0.5 Free version 4796 

Free EXE Lock provides optional encryption modes to lock your EXE programs: Speed priority - faster but not compressed; Security priority - slower mode, secure & compressed. It is able to lock executable programs on your computer to password-protect any executable file from non-authorized execution.

JRecoverer for Cassandra Passwords 1.0.0

JRecoverer for Cassandra Passwords 1.0.0  4796 

Audit and recovery of Cassandra passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

XenArmor WiFi Password Recovery Pro 4.0

XenArmor WiFi Password Recovery Pro 4.0  4795 

WiFi Password Recovery Pro is the Enterprise Software to help you instantly Recover as well as Remove all the Wireless Passwords with just a click of button.

fHash 1.8

fHash 1.8 Free version 4794 

A files hash calculator on Windows. fHash can calculate and verify MD5, SHA1, SHA256 and CRC32 digests of files. fHash supports drag and drop and can integrate into Explorer's context menu. Fast and easy to use. English and Chinese versions.

Easy File Protector 5.134

Easy File Protector 5.134  4794 

Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un

11 from 1848

« First « Prev 1 2 ... 115 116 117 118 119 ... 167 168 Next » Last »

Best Apps for Other Security software From the Editors

There are currently no results