G-Zapper helps you stay anonymous while searching Google by blocking and deleting the Google search cookie. Did you know that Google stores a unique identifier in a cookie on your PC, which allows them to track the keywords you search for? G-Zapper helps you protect your identity and search history by allowing you to view your Google ID, see how long your searches have been tracked, erase your searches, and block the Google search cookie.
OrgPassword provides a convenient system for storing different kinds of personal information. Using a set of templates, you can create a competently organized catalogues for your passwords, news, software, notes, private calendar, Outlook accounts. Access to all data is provided through a well encrypted password. The interface of the program is both intuitive and easy-to-use. With OrgPassword your personal information will always be at hand.
Do you want to protect private pictures, hide sensitive videos or lockdown documents ? Do you want to ensure your privacy by locking, hiding and encrypting sensitive data ? Then this free application is for you.Quick File Locker will quickly lock, hide and encrypt files, folders or USB drives to ensure your privacy. It is very easy to use.Lock files with a simple drag and drop or with a right click on them in Windows Explorer. Multilingual.
Easy-to-use file encryption software for high-level security. It lets you encrypt files of any type and size, on any kind of media or drive, with a single click. This data encryption software also includes a file shredder and a secure text editor that lets you encrypt anything to cypher text, so that you could even post encrypted messages to social networks, or use it for email encryption. Password protect files and folders with ease.
Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms (any of the following modern cryptographic algorithms can be used: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6), and takes place in real time without affecting computer performance. Cryptic Disk provides its use
Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
Cross-Database Comparator Pro is a single comprehensive and integrated enterprise working environment to compare database data and structure across any database types. Usually ODBC drivers delivered together with DBMS by the vendor, however there are companies developing high-quality ODBC drivers standalone.
It lets you password protect, hide, mask folders and encrypt all files in folders. Its main functional include: fast encryption, high density encryption, portable encryption, mask folder, hide folder, and wipe out folder. The unique of the soft lies in the ability to intelligent combinational encryption, which can keep your folders extremely security.
With this free program you can find all encrypted ZIP archives on a computer or laptop. The main advantage of the program is its high speed. The list of protected ZIP archives can be obtained in just a few seconds. The application has an intuitive and extremely simple interface. Use this software can users with any level of training.
Toms AD Object Recovery is a free Windows utility for querying your Active Directory for deleted computer, user, group, or other objects and restore them on-the-fly. SUPPORTED OBJECTS: * Computer Objects * User Objects * Group Objects * Organizational Units * Print Queues * Full volume Encryption Objects (BitLocker Recovery Keys) No domain controller downtime - Restore object attributes - Highlighted Search
Secure SQL Auditor (SQA) is State of the art software for risk assessment and management, it conducts security audit and security assessment for SQL database security within minutes, by using the most comprehensive SQL database security regulatory compliance tools.