Recently Added  - 

Other Security software Download now Security software and application for free . antivirus and antispyware
DLL Magic 1.0

DLL Magic 1.0 Free version 3753 

Command-line Tool to Hide DLL in a Windows Process

Xleaner 4.28.1368

Xleaner 4.28.1368 Free version 3753 

Xleaner is a free privacy and clean-up utility that allows you to get rid of junk files with ease. With Xleaner you can eliminate all these tracks that result from browsing the web on your computer, such as internet history, cookies, cache, autocomplete memory etc. of your browser, and window's temp folders, run history, search history, open/save history, recent documents and more.

Chrome History Manager 3.0

Chrome History Manager 3.0 Free version 3752 

Chrome History Manager is the free software to easily view or delete browsing history of Google Chrome

Internet Clean 1.4

Internet Clean 1.4  3752 

Internet Clean is a handy and reliable utility designed to scan and remove cache files from your Internet browsing history. Internet Clean is able to detect hidden history files and to delete them in a second. It also features a screenshot utility that enables you to watch your kid's computer activity.

Mini Keylogger 2.13

Mini Keylogger 2.13  3751 

Mini Keylogger is the best solution for anyone who wants to monitor their computers. Whether you're an employer, a parent or just an individual, there are many situations when you have to use a keylogger. Mini Keylogger can record all user activities while being completely stealth! Mini Keylogger lets you know everything that was typed, online user names and passwords, browsing, e-mails, convos, programs used etc. More info: www.minikeylogger.com

Cryptic Disk 5.2.2

Cryptic Disk 5.2.2  3751 

Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms (any of the following modern cryptographic algorithms can be used: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6), and takes place in real time without affecting computer performance. Cryptic Disk provides its use

O&O SafeErase Server 15.3 B62

O&O SafeErase Server 15.3 B62  3751 

Your company’s servers are the places where all internal information such as customer data and the figures for the sales and bookkeeping departments are gathered. That also goes for the backups containing vital information collected over years. If you ever decide to replace a single disk or an entire server with a new one, the information contained on your old material can quickly turn into a major security risk.

WiFi Security Guard 3.0

WiFi Security Guard 3.0 Free version 3750 

WiFi Security Guard is the free command-line tool to monitor and shield your Wireless Network from hackers and unauthorised users.

Sign PE 1.0.0.7

Sign PE 1.0.0.7  3750 

When trying to convince customers to choose your products over those belonging to the competition, you need to differentiate yourself by building trust, aside from coming up with a reliable output. Sign PE is a piece of software that offers to help you in this regard since it can associate your programs with a digital certificate so that users acknowledge that your app is legitimate and they become more open to running it. (Michael Haephrati)

ZoneAlarm Security Suite 2010 9.3.037.000

ZoneAlarm Security Suite 2010 9.3.037.000  3750 

ZoneAlarm Security Suite is the easy-to-use, comprehensive security solution that is based on the world's best firewall to keep out hackers, viruses, worms, and other threats. It combines the most popular firewall with antivirus protection, web site filtering, privacy protection, and instant-messaging security to provide the best overall protection of any PC-security suite.

Batch File Encrypt Free 5.0.71

Batch File Encrypt Free 5.0.71 Free version 3749 

Encrypt and decrypt whole files or their parts using AES, Triple-DES (3DES), RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic keys (vectors) instead. You can change key bit length for better protection. You can select specifically which bytes in a file should be encrypted/decrypted, though by default the whole file is processed.

11 from 1848

« First « Prev 1 2 ... 119 120 121 122 123 ... 167 168 Next » Last »

Best Apps for Other Security software From the Editors

There are currently no results