Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protection
Display: short descriptions | full descriptions
  • RegRun Security Suite is a complete computer security software. RegRun Platinum includes 24 system utilities for computer protection against Rootkits/Trojans/Adware/Spyware/browser redirecting/hijacking. It increases the speed of Windows boot-up process, making the computer management easier. RegRun Suite is compatible with all known antiviral software and may be used to improve computer security.
  • Word Password is advanced and extremely fast password recovery tool for MS Word 97-2016 documents and templates (new .docx, .dotx and old .doc, .dot). Several attacks can be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Instant Write and Document Protection password recovery or removal. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization.
  • Proactive anti-malware program to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adware and worms. It uses a triple-layer prevention engine: Surf Protection, Real-time File Guard and Behavior Blocker. This triple-layer blocks access to fraudulent and dangerous websites , scans for malware in real-time and catches zero-day threats for the ultimate protection.
  • Imagine yourself as a driver of a "skins" huge, humanoid armored vehicle. Save the city from an out-of-control protection system and destroy all the turrets in the neighborhood. To achieve the goal, you are given several types of weapons, but you must use your ammo wisely because the amount is limited.
  • BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks, plus supports RAID and GPT partitions, UEFI and Windows 8 computers. Jetico encryption software provides protection from physical threats, such as lost or stolen computers and USB drives. BestCrypt utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.
  • With KeyLord you can keep your passwords, credit card and bank account numbers, and other sensitive information in a tree-like structure, secured with passwords or X.509 certificates for increased protection. Powerful and flexible password generator, included in KeyLord, lets you create unique and cryptographically strong passwords, which are possible to remember.
  • Access Forensics is all-in-one analysis, unprotection and data recovery for MS Access 2000-2016 databases (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). Recover or remove database protection (passwords, user-level security, locks in properties, VBA security) -> analyse database content, structure and properties -> scan and recover deleted tables, records (rows) and columns!
  • This software is suitable for courier business. It's perfect for couriers to plan working hours so that the orders do not overlap with someone else. It'll store the information about clients. Included are two viewing modes, an automatic search option and password protection. The program has a handy interface to calculate and show the "fee charged". The program gives you a customizable Date Navigator and comprehensive reminder.
  • School Calendar will help students and teachers with assignment organization, project due dates, and scheduling. It can even remind you when your scheduled event is about to happen. Included are two viewing modes, an automatic search option, password protection and an auto-backup with an opportunity to remove old archives automatically. The calendar can be synced with MS Outlook and its data exported to .ics, .xls, .txt, .html, .xml, .pdf formats
  • Comprehensive anti-virus security solution for your Windows PC. Real time protection. Installation and operation in an infected system and exceptional resistance to viruses. Efficient detection and neutralization of all types of threats. Fast multi-thread scanning powered by multi-core systems. Protection from latest malicious programs designed to bypass detection by traditional signature-based scan and heuristic analysis.
  • With Macsome iTunes Converter for Win, users can convert any iTunes audios to MP3 / AAC and remove the protections as you need, the only condition is that you can play these audio files on your iTunes normally. It is more than a iTunes Music Converter, is also a perfect Audiobook Converter. Even the purchased audiobooks, iTunes Converter can also convert these Audiobooks to MP3, AAC and other format with ID tags kept.
  • hide.me's Windows VPN client is one of a kind solution with a set of unique features to make it stand out from the rest. It has recently released an update for its Windows app introducing some new features like IP leak Protection, DNS leak Protection, Fallback Protocol Support, Kill Switch, Auto-Connect, IPv6 protection and a lot more. It's as easy as 123, No Registration, No Login required. Just download and enjoy the fastest VPN in the world.
  • Future-proof your backup & meet evolving system requirements without any extra costs! Whether you are switching an OS or virtualizing a server, maintain your coverage with 1 flexible backup license that supports any system type. Acronis Backup Advanced Universal License ensures protection by unlocking all advanced backup capabilities, including 1-click disk imaging, easy granular restores & integrated cloud--all managed with 1 easy console!
  • WinGuard Pro 2016 can Password Protect Programs and encrypt files on your computer. Users can add Password Protection to any Windows Program (ie Store Apps, Desktop Apps, Exe's). Lock Installers, Internet and File Explorer - that's right; if you need some extra security, WinGuard Pro 2016 can Block Software Installations, Internet, File Explorer, Harddrive Access and a whole lot more, all for free.
  • Folder Lock is a data leak prevention solution that encrypt & secures your files, while keeping an automatic and real-time backup of encrypted files in the backup cloud. It also offers security for USB drives and CDs/DVDs. Folder Lock is an Anti-Hack Solution that lets you lock files, folders and drives; shred files and clean your Windows History.Works with both 32-bit and 64-bit Windows Vista/XP/7/8.1/10. The complete data leak prevention suite.
  • 2030 to the Land was crushed terrible catastrophe. The Ensemble asteroid has begun to fall to The ground. The Mankind was found on galley proof of death and for the reason protection from asteroid was created unique spaceship whole with one revenge for pilot. You there is try the role cosmic Hero and rescue the Land from VWVload on asteroid. The Play is executed in bright and colorful stiletto. But track record of the fighting and increasing to d
  • Malware Removal Tool is one of the most authentic, powerful and adapted with easy to use features that protects PC from any threats. it has been designed with latest and comprehensive techniques that makes it possible to detect any threats that often remains deep seated and hidden with the background. Thus it makes it easier for even newbies in scanning their PC using Malware Removal Software. it gives complete protection against all threats including adware, malware as well as spyware. Some of its best features like System Guard, Advanced Scan, Custom Scan suits need of the hour. Free scanner of the software can be used for scanning the PC and detecting threats. However, you need to purchase trhe licensed version of the software to remove detected threats permanently from PC. Kindly visit: http://uninstalladwareinfection.com/
  • Secure Hunter Anti-Malware PRO Edition Antivirus software is no longer enough to keep you safe online. While viruses are still a cause for concern, cyber threats are being produced that can infect your computer, view your photos, steal your identity and hack into your bank account, simply because you opened a web browser. Unfortunately, antivirus programs cannot detect these threats Ė thatís why you need Secure Hunter. Secure Hunter Anti-Malware PRO Edition Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. A low-cost option for malware protection, Secure Hunter hunts down trojans, worms, spyware, adware and more. Available by instant download, Secure Hunter is designed to provide immediate protection against the internetís nastiest bugs. Are you ready to experience the relief of worry-free browsing? Download Secure Hunter Anti-Malware PRO now. Still trying to decide? Secure Hunter is available for both personal a ...
  • Dr.Web KATANA- Kills Active Threats And New Attacks. A non-signature anti-virus offering preventive protection against the latest active threats, targeted attacks, and attempts to exploit vulnerabilities, including zero-day ones, to penetrate systems. Complements the traditional signature-based anti-virus that is already installed on your computer. Does not require any configuration/
  • This program emulates pressing the keyboard, moving and clicking the mouse with a joystick xbox layout. This handy utility solves problems such as developers' unfinished support for gamepads games. For example Morovind, Oblivion, and many others don't translate properly. Other games that never worked with a gamepad now do. Examples include Minecraft, Queke1 and 2 that support one-stick protection devices such as a steering wheel. Also it is possi
  • Hide IP Address Safe is a professional software used to hide your IP address so that you can hide your internet traffic and the real location while surfing the web. This best IP hider software provides government-level safety protection, makes nobody know what you do on the internet. So you can surf wherever you want on the web without worrying about any of the information leaked.
  • Aobo Keylogger for Mac Standard, the invisible keylogger for Mac OS X with multiple-user support, has the ability to monitor all the activities on the targeted Mac, including keystrokes typed, IM chatting conversations entered, comments posted on social media, websites visited and so on. Aobo Keylogger for Mac Standard secretly sends log reports to your Email box in interval for remote log viewing. Timely uploading logs to FTP space are also available in Aobo Keylogger for Mac Standard. Below are the features of Aobo Keylogger for Mac Standard: Stealth monitoring- All the monitoring behaviors are undergo silently and secretly IM message monitoring - All the chat conversations on Skype/MSN/AIM/Adium/iChat are recorded Social networking monitoring - It logs all the posts and comments composed on the Mac and sent to social networks like Facebook/Twitter Websites monitoring - Aobo Keylogger for Mac keeps track of every URL of websites visited in Safari, Firefox and Chrome Screenshots capturing - It ...
  • Able Spyware Scan and Destroy provides real-time anti-spyware protection against spyware, viruses, keyloggers, spyware cookies, adware, Trojan horses, spybots, browser hijackers, and phishing attacks. It actively monitor and protect the PC from uninvited software attacks.Able Spyware Scan and Destroy can detect and remove a multitude of spyware files and viruses from your computer. It prevents viruses from being installed in the first place.
  • Axence nVision gives you everything you need to manage your network in an efficient and effective manner. The application consists of 5 modules (centrally managed): proactive network monitoring and visualization; hardware and software inventory (license audit); intelligent user monitoring (blocking websites); data leak protection (port blocking), helpdesk (remote access, trouble ticket database, chat) - all with a wide range of alerts & reports.
  • NCheck Bio Attendance is an automatic ready-to-use time tracking system with biometric fingerprint and face identification. May be used from employee attendance control to check-in at events, clubs, clinics, etc. Protection against human-factor errors or user fraud. Employee GPS logging (optional). User groups, shifts and schedule planning. Reports in XLS, PDF or CSV. Webcams and 90+ fingerprint reader models from 40+ manufacturers support.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware