Recently Added  - 

Other Security software Download now Security software and application for free . antivirus and antispyware
Asterisks Password Viewer 3.31

Asterisks Password Viewer 3.31  4945 

Asterisks Password Viewer is advanced password recovery tool that allows you to see the actual password behind the asterisks. Asterisks Password Viewer lets you see the actual password behind the asterisk. It recovers passwords to such programs as Microsoft Outlook, The BAT! and other e-mail clients, FTP clients such as CuteFTP, FlashFXP, etc. Asterisks Password Viewer also supports password recovery in Windows Internet Explorer.

CrococryptMirror Portable 1.43

CrococryptMirror Portable 1.43 Free version 4942 

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.

PDF Protector 1.0

PDF Protector 1.0  4941 

PDF Protector is an advanced software to protect PDF documents. This is a complete PDF locker that locks PDF efficiently with passwords and copy, print and edit PDF files. Download Free PDF Protector Software for checking software features and functions.

Terminator 8.1

Terminator 8.1  4941 

The Terminator system - to be more exact HSS (hardware-software system). Terminator consists of an external hardware controller (Terminator controller controller itself) pluggable into an USB port of a computer and the free Terminator program. The Terminator system was made by the best IT specialists of our organization. It combines the newest engineering solutions, ultimate control compliance, compactness and simplicity.

Mutilate File Wiper 2.97

Mutilate File Wiper 2.97  4941 

Delete your sensitive files permanently. Mutilate File Wiper is a file remover that prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrites. Mutilate supports complete folder and subfolder shredding. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files.

PC Activity Viewer 2.3.4.50

PC Activity Viewer 2.3.4.50  4940 

Watch and control all PCs & Macs in your LAN. You install the client on each computer you intend to monitor. With the server you can view all computers. You can also capture pictures, record video, and remotely control mouse and keyboard.

Hidden Disk 5.01

Hidden Disk 5.01 Free version 4938 

Within few seconds you can create additional disk for your secret folders and files, and within few seconds you can hide this disk entirely. To open the disk again you will need to enter your password. This is so easy and so useful! On this disk you can create hidden folders and store any secret files. The disk will be completely virtual, thus, it will not require any additional disk space, it will use free space from your existing hard disk.

Parental Control 5.4.1.1

Parental Control 5.4.1.1  4937 

Cost effective key logger software works invisibly on your computer and does not show desktop icon, program path and add remove list and not affect processor working speed. Parental Control Software provides convenient option to monitor entire system activities from start to shut down in hidden manner. Parental Control Software records overall system activities made by external user or family members with real date and time in reliable manner.

Paradox Password Recovery 1.9

Paradox Password Recovery 1.9  4937 

Paradox Recovery allow to find the lost password for Paradox tables. An application don't use any external libraries (no BDE, no ODBC, no ADO etc) and you may run this tool on any computer without any additional setup/install. You may customize the brute-force or dictionary search process for entire password with extended options. All versions of Paradox tables and all file kinds (data, indexes etc) supported.

BestCrypt Traveller 1.05.3

BestCrypt Traveller 1.05.3 Free version 4937 

BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller.exe), a standard BestCrypt icon appears in the Windows system tray from where commands can be run to mount or dismount container files and create new encrypted containers.

STOP P-O-R-N 8.9.9

STOP P-O-R-N 8.9.9  4937 

STOP P-O-R-N is a handy and easy to use application that can block the access to any pornographic material. It will protect your family or classroom from inappropriate material on the Internet. If inappropriate material is detected the web browser will instantaneously shutdown the program that is displaying inappropriate material.

11 from 1848

« First « Prev 1 2 ... 93 94 95 96 97 ... 167 168 Next » Last »

Best Apps for Other Security software From the Editors

There are currently no results