Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for Sec MacWasher X 1.1 in Webroot Software Webroot Software's MacWasher® X provides security on Macintosh OS X byallowing you to power-wash your activity history, protecting your privacy online & offline. The improved bleach feature gives you security that is more than 11 times stronger than the US Department of Defense requirements. Added features include cleaning for many popular chat programs, a much wider variety of browsers (including Safari), and a more robust Custom Wash feature.AnyWhere Pro 6.3 in Liquid Mirror Enterprises AnyWhere 6 Pro allows you to right click on files and folders to copy, move, zip, rename, and securely delete them. Copying filenames to the clipboard, replacing text within many files and making groups of files and folders writeable is just as easy. New features include a Recent Folders function, resizable window, secure file delete to keep prying eyes away from your sensitive data, and the ability to replace text in many files at once.Advanced Hide Folders 4.6 in Softbe Inc Advanced Hide Folders is security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. You can protect files or protect folders simply in one mouse click. What is more your hidden files can be locked. Lock folder feature allows to prevent access to confidential files via MRU feature (eg. list of Most Recently Used documents in MS Office)U-Wipe 2.7 in Network Research Lab, Ltd. U-Wipe is an easy-to-use privacy tool that cleans all your IE, MS Windows, MS Office tracks and blocks pop up ads. The "Boss key" feature hides sites that you are visiting from prying eyes and “Spy removing feature” eliminates spy proxy ad-ware, installed on your PC while your surf. It restores your normal system’s defaults with just one click!X-COM 2.75 in My PersonalSoftware Peer2Peer Secure Instant Messenger and Chat Your boss is spying you... YES! Every message/file you send on your lan can be intercepted by anyone... X-COM can offer you a minimun of privacy: every communications is encrypted using the Blowfish encryption algorithm. Features: - encrypted communications (Blowfish / 56 bit): - encrypted instant messenger - encrypted public chat - encrypted file transferSafeHouse Hard Drive Encryption 2.10 in PC Dynamics, Inc. SafeHouse provides transparent on-the-fly hard drive encryption for your PC. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. You can do anything with a SafeHouse virtual drive that you can do with a normal hard drive after supplying your password.1st Files Privacy Tool 2.4 in SSS Lab., Inc. 1st Files Privacy Tool can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : 'Hidden', 'Read Only', 'Full Control'. It works with any Windows platforms. 1st Files Privacy Tool can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) .TermiNET 2.0 in INFOTECS GmbH TermiNET is a Personal Firewall designed to keeps your personal data and privacy safe from Internet hackers and data thieves while connected to the Internet, browsing the web or accessing other internet.TermiNET - Personal Firewall 2.8.11 in INFOTECS GmbH TermiNET is a Personal Firewall designed to keeps your personal data and privacy safe from Internet hackers and data thieves while connected to the Internet, browsing the web or accessing other internet.AES Pro 5.5 in Safe Soft Corporation AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages.AES Pro 5.5 in Safe Soft Corporation AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages.VIDEOREG 3.0 in SARBASH Lab. This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in manual mode and conduct searching in slide show mode (pseudo-video) with given speed of cam shot change.VIDEOREG 3.0 in SARBASH Lab. This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in manual mode and conduct searching in slide show mode (pseudo-video) with given speed of cam shot change.ScreenLock Pro 2.0.41 in iJEN You can configure ScreenLock to prevent windows from starting without the proper answer, or quickly lock the screen if you must leave your PC running and unattended. Enjoy the peace of mind that your privacy is protected. Use ScreenLock as your default Windows Screen saver! This provides added protection when you leave your computer unattended and forget to lock your system.Password Safe and Repository 3.43 in MAFIS Systems GbR Password Safe is a professional and comfortable solution for managing your passwords and TAN-Block´s. Features: auto. password entry, macros, TAN administation, password generator, network and multiuser support, own categories, fields and dialogs, rights administration, usb key, client for Palm OS, form/dialog designer, and much more...
|