Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Passwords Base will keep all your passwords in a secure database, so you only have to remember one single master password. The database is encrypted using the best and most secure encryption algorithms. A user-friendly and intuitive interface makes it easy to manage your passwords.
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 - Internet Explorer Edition is ideal for kiosk setups, digital signage systems, trade show terminals, library and schools labs, Internet cafes, hotels, businesses kiosks, etc. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Internet Explorer to run exclusively.
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas. BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards.
  • Break Access Security software to break access password, break mdb security so as to open & re-use secured access database MDB files. Take a look on easy MDB Key tool to break access security to unlock Access database & break mdb password security. Break access security from MS Access 95/97/2000/2002/2003 database. If your password has been lost or forgotten, get MDB Key to break access database password to open secured access database instantly.
  • Take a look on Microsoft Access Password Recovery tool to quickly recover microsoft access password. Microsoft Access Password Recovery tool recovers ms access password from password protected access database. Microsoft Access Password Recovery software help users to unlock, unprtect & unsecure mdb files of MS Access 2007/2003/2002/2000/97 database. Get MS Access Password Recovery to recover MS Access password & unlock Access database.
  • NolaPro is a free web-based Accounting Suite. Installs quickly on your own PC for secure access via the web. AP/AR/GL all standard with optional Payroll, Inventory and Order Tracking modules. Customizations allow the software to fit your business operations or industry niche. International features such as multi-currency, VAT/GST and built-in language translator all supported.
  • Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. BCWipe uniquely features Transparent Wiping - deleted or temporary files are wiped automatically on the fly. Available for Windows, Mac and UNIX.
  • BizCrypto for SQL Server lets you secure the data in your MS SQL Server Integration Services scripts. The product includes SSH, SFTP, FTPS, OpenPGP, AS2, SMTP, POP3, S/MIME, PGP, PKI, PDF, XML, ZIP connections and tasks.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • Lock down Windows XP/7/8/10 and easily create a kiosk setup using the Google Chrome browser. Inteset's inexpensive Secure Lockdown -Chrome Ed is ideal for various kiosk setups, digital signage, trade shows, libraries, schools, hotels, museums, banks, and other businesses. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Google Chrome to run exclusively.
  • NetstatWrapper Tool Readme File NetstatWrapper Tool: NetstatWrapper is a small windows GUI tool that can be use to run netstat command using UI. With this small tool you can run some of the netstat command line tool and see the result in Notepad, or any other configure text viewer tool. This version Support the Following Commands: 1. an List all connection and ports as number 2. anb List all connection and ports as number with the involve exe 3. ano List all connection and ports as number with the process id 4. r Show Ethernet statistics and perprotocol statistics 5. es Show the current routing table How To Use: 1. Start NetstatWrapper.exe 2. If you get a User Account Control (UAC) allow it to run Press on Yes. 3. Select the netstat command you want to use. 4. Optional: You can select a text viewer that will show the output command data. 5. Press the Run button to execute the command. 6. A text file will be open with the command result.
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • Lock down Windows XP/Vista/7/8/10. Inteset's inexpensive Secure Lockdown v2 - Multi Application Edition is ideal for kiosks, trade shows, library and school labs, hotels, hospitals, Internet cafes, gaming centers, museums, and correctional facilities. Give access to only the apps you need. Secure Lockdown removes the Windows Desktop functionality and unwanted key strokes and runs an elegant customizable menu with only the programs you allow.
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • With KeyLord you can keep your passwords, credit card and bank account numbers, and other sensitive information in a tree-like structure, secured with passwords or X.509 certificates for increased protection. Powerful and flexible password generator, included in KeyLord, lets you create unique and cryptographically strong passwords, which are possible to remember.
  • Remotely monitor your webcam, your desktop, or your microphone with this powerful all-in-one surveillance tool. Features include motion detection , sound detection, and secure website publication with access to live video, and all detected activity.
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • IbidInfo OST to PST Converter is a trustworthy and effective program to migrate OST file to proportionate personal storage (PST) format. The product securely converts all mail objects of OST record and saves them in latest PST document, alongside offering alternative to save as PDF, RTF, EML, & MSG and HTML formats according to necessity. Using IbidInfo OST recovery tool user can restore mail messages with attachments, calendar, task, appointment, notes, and journal; additionally restore the designing of HTML and RTF emails incorporated into OST document. The fundamental interface of the product has the choices to choose the OST document from a known area or discover it from the operating system. Later than to selecting the offline storage (OST) file, it changes over the record to produce the relating PST file. After the change, you can watch the preview of recoverable things in the product interface. The elegant "Find" alternative aides in finding a specific email out of the bundl ...
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • Active@ Boot Disk provides a full range of disk utilities for data recovery, secure erasure, disk imaging and more. This will save you a considerable amount of money over purchasing separate programs for each different task. You can use the bootable CD, DVD or flash drive created by the software to boot up otherwise unworkable computers to access your data and troubleshoot problems with ease.
  • Cloudable enables freelancers, small businesses (such as media agencies) and webmasters to easily share their files online. Its been built to be extremely robust, secure and very fast! The file hosting script is available with a wide variety of features including a responsive file manager built using bootstrap framework, multi-file uploads, drag & drop upload, image viewing capabilities, stream videos, view documents, social sharing, an in-depth admin area and more.
  • SecureBlackbox is a comprehensive library that adds support for SFTP, FTPS, SSH, PGP, PDF, XML, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security to your PHP web pages and scripts. SecureBlackbox primary goal is to provide basic technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure communications. This is PHP edition.
  • hide.me's Windows VPN client is one of a kind solution with a set of unique features to make it stand out from the rest. It has recently released an update for its Windows app introducing some new features like IP leak Protection, DNS leak Protection, Fallback Protocol Support, Kill Switch, Auto-Connect, IPv6 protection and a lot more. It's as easy as 123, No Registration, No Login required. Just download and enjoy the fastest VPN in the world.
  • Quick3270 Secure is a powerful, high reliable TN3270/TN5250 terminal emulator for Windows. Quick3270 is fast, uses low memory and includes a large number of advanced features: - Connectivity: TN3270/TN5250/MS SNA-Server - TLS/SSL based security - FTP and IND$FILE file transfer - 3287/3812 Printer emulation - Vector Graphic support (GDDM) - Macro language - WinHLLAPI, EHLLAPI and COM Interfaces

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware