Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for safety ActiveQuality Iso 9000 Software 2.2 in OPEN MIND SOLUTIONS Open Mind Solutions provides the most flexible and adaptable standards management system software solutions for your business. Quality Management Software, Environmental Management Software, HACCP software, Health and Safety management software, 1 CFR Part 11 Compliant, Business process management software, Capa Software, Compliance Management Software, document management software, internal audit management software,AES Pro 5.5 in Safe Soft Corporation AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages.AES Pro 5.5 in Safe Soft Corporation AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages.USA Shield 2.15 in Safe Soft Corporation USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms.CHAOS Chameleon 3.8 in Security Resources Group CHAOS Chameleon allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. CHAOS Chameleon has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user friendly.CHAOS For Security 2.9 in Security Resources Group Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets.CHAOS Public Key 4.23 in Security Resources Group This product is a compact program for sending protected messages to friends, colleagues and bankers. It can encrypt both email messages and any attached files.CHAOS' Doors 3.7 in Security Resources Group Comprehensive privacy tools including file/folder encryption, e-mail encryption, file/folder shredder. The program is compact, efficient and user friendly.Email CHAOS 4.52 in Security Resources Group This product is a compact program for sending protected messages to friends, colleagues and bankers. It can encrypt both email messages and any attached files.Hiding CHAOS 5.6 in Security Resources Group Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image.Invisible CHAOS 5.1 in Security Resources Group Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image.S-Agent 1.01 in Network Research Lab, Ltd. S-Mail Agent is a one-step email encryption plug-in for any email software such as MS Outlook, Eudora, Mozilla, Outlook Express, Pegasus, TheBat!, Netscape Mail, etc. Email programs like Outlook are fast and easy-to-use, but they have one serious drawback - your messages are transmitted in plain text, over an open, insecure network and therefore can be read, changed and counterfeited. S-Mail Agent solves this problem! Get secure and handy email!Imaginary Telnet Server 1.0 in Whiz Kid Technomagic When your computer is connected to the Internet, it is opened up to attacks by anyone experienced with the Internet technology. One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system.Imaginary Web Server 1.0 in Whiz Kid Technomagic Every unprotected Windows computer connected to the Internet is in danger of being broken into by outside intruders who continuously scan the Internet for security holes. Many computers use a firewall to place a barrier in front of the scanner. Unfortunately, firewalls can be bypassed by clever attackers. The Imaginary Web Server makes the attackers think they have found a web server that is no longer active, sending them away forever.Word Safe 2.0 in Jons Computers and Electronics WordSafe 2.0 is a high security encrypted database used to store your login information passwords , user id's email addresses and password phrases . All data is encrypted using Rijndael 256 bit encryption the new AES standard. A high security windows interface is used to further secure and protect your data. If you have or frequently use different passwords user id's or email addresses then this software is for you.
|