Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: S :: security
Display: short descriptions | full descriptions
  • Fear... what do you know about fear? Paranoia, delusions of persecution are the them of the game Slender. You think you know the full story. Slender, proximity awareness breeds insecurity - all which will make you run, looking for clues to determine the real situation. But is it already too late? Everything depends on you.
  • Aiseesoft Mac FoneLab for Android is the best software of Android data recovery for Mac users. It does a great job in recovering Android data from contacts, messages and call logs. As the most popular Android data recovery app, it?s compatible with almost all Android phones, tablets and SD card such as Samsung, LG, HTC, Sony, Huawei, and ZTE, on Mac OS (included OS X). Furthermore, it enables the Mac users to recover Android data easily and safely without device damages or privacy disclosure. Key Features: 1. Recover and back up deleted/lost data Aiseesoft Mac FoneLab for Android can recover and back up your lost or deleted important data from Android phones, tablets and SD card. That is, if you lost your contacts, messages, call history which is important for you, you can easily retrieve them back with the help of this software. 2. Support all popular Android devices This Mac Android Data Recovery supports a wide range of Android brands including Samsung, LG, HTC, Sony, Hu ...
  • RegRun Suite is a complete computer security software. RegRun Platinum includes 24 system utilities for computer protection against Rootkits/Trojans/Adware/Spyware components. It increases the speed of Windows boot-up process, making the computer management easier. RegRun Suite is compatible with all known antiviral software and may be used to improve computer security.
  • From Akick Document Converter: Akick Document Converter tool allow you to convert your document into different files formats such as DOC,DOCX, PPTX, PDF, WPS, Word, HTML and other file types. It is one of the best tools that help you to convert your document into multiple files formats. In addition, this software that has been widely used by many people to change their Microsoft word document into the preferred PDF formats. It takes very less time to do so and resultant PDF files are of high quality. This software tool provides easy interface to make relevant changes is what makes Akick Document Converter different from the rest. However, it is compatible with latest version of OS. Well from security point of view, it is safe and secure from recent virus so that it can't be affected by latest threats and malicious codes. Overall it would be a wonderful tool in your hand that can convert dozens of your document and that too at your single-clicks away. While any one only wants to go for best software t ...
  • Text Content Editing, OCR options, Spellchecker, XFA forms support, Listen/add audio comments, New Extended Digital Signature Support, PDF Security Support, Add Comments and Annotations, Custom Stamps, Direct Content, Combine PDFs, Import Directly from XPS and other support formats, Bates Numbering, Crop/Insert/Delete Pages, Scan to PDF
  • The SSD Utility Suite is an essential tool to provide performance enhancement, SMART monitoring and data security for Solid State drives. Manually execute or set the TRIM service to maintain the write performance of the SSD. This suite is designed to enable faster performance by giving the user control over TRIM as well as predict end of life by monitoring the lifespan based on SMART attribute status of your SSD on Microsoft Operating Systems.
  • Auslogics Anti-Malware is an innovative security solution that helps eliminate threats your antivirus may miss and keeps your sensitive data safe from unauthorized access. Easy to use, light on system resources and with flexible auto-scan options, this tool is designed to provide multi-faceted protection and give you the peace of mind you want. Your chances of becoming an ID theft victim instantly drop once you install this powerful shield.
  • From Akick Software: Akick Free Antivirus 2015 provides the essential security you need to protect your Computer from hackers and thieves. In addition to the best free antivirus software and anti-spyware, anti-malware protection possible, the advanced Home-Network scanner automatically scans your network for any of the issues, while browser instantly and effectively cleanup lets you remove annoying plugins, however, automatic schedule scan allows for single-click scanning. It does not allow to suspicious codes into the system. However, it prevent from disruption due to the hidden virus, block permanently the way from harmful codes come into your system, removes the stubborn virus from PC permanently. Antivirus and Anti-malware: Akick sends out automatic Virus Lab updates throughout each and every day to make sure your security software if fully up-to-date. Home Network Security: Complete scans your network and routers for potential issues to instantly help prevent attacks. It prevents your network from onl ...
  • The MDaemon to Outlook 2013 conversion tool is quicker than others. It saves your precious time for exportation. Interaction with this tool is easier to users because of its GUI. The MDaemon to Outlook 2013 tool is not complicated. Demo version is also available to check efficiency.
  • HR Tracking Database Software for employee and job information for businesses. HR Database Software by DB-Pros, Inc. was designed to administer HR and employment data with instant results, while maintaining the accuracy and security that is required for modern business. It is an ideal solution for small to medium sized organizations and growing businesses alike.
  • Fear... what do you know about fear? Paranoia, delusions of persecution are the them of the game Slender. You think you know the full story. Slender, proximity awareness breeds insecurity - all which will make you run, looking for clues to determine the real situation. But is it already too late? Everything depends on you.
  • If you are looking for a convenient and sufficient antivirus to keep your computer system as well as your personal information safe and secure, then Viracure is the best choice. This is because it is available in a full package that ensures complete security and maintenance of the computer system therefore keeping them secure from viruses and hackers that may destroy the computer and can even lead to loss of information from the system.
  • Split PDF software builds up for both profession and end user. You can use this application into different way like personally and professionally. Program permitted you to perform several operations like split PDF file into pages, merge pages, create PDF file, delete blank and useless pages, take out required pages, join two file as well as pages, add number of PDF file in queue etc. Tool make possible to resize PDF document by using paper size, custom size, width and height. No need to worry for documents security because it offer you password protect option in this way you can inset User and owner password on resultant file. Features: * Software enables to split, merge, delete, extract, combine, compare PDF document. * Perform operation according to page range, specific pages and odd/even pages. * Split large PDF file into pages. * Merge number of pages and create PDF file. * Delete useless pages from PDF document. * Extract required pages. * Change PDF page size. * Modify PDF Meta Pro ...
  • Antivirus, Anti-Malware and Firewall, all-in-one. Complete security suite to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adware and worms. An intelligent firewall closes off and hides your system when using public networks. Your PC will be practically invisible. Includes IPv6 support.
  • If you are looking for the best reliable way how to erase hard drive data, then you should look no further than Active@ KillDisk. This program requires absolutely no special knowledge but meeting 23 data security standards (including DoD 5220.22-M) from around the world, this solution provides an industrial level of quality. Ultimate package now includes Windows, Dos, Linux Console, Linux (LiveCD) targets.
  • Folder Lock is a full suite solution letting you keep your personal files encrypted and locked, while keeping an automatic and real-time backup of encrypted files to an online storage. It also offers portable security for USB drives and CDs/DVDs. Folder Lock also lets you lock files, folders and drives; save your personal information in Wallets; shred files and clean your Windows History. Works with both 32-bit and 64-bit Windows 7/Vista/XP.
  • PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing, content copying, content editing, form-filling, annotation, page extraction and document assembling etc. program authorize you to select page resolution values like high resolution and low resolution. Features: * Software Protect your PDF document from illegal user. * Set password on PDF file. * User encryption technique like 128 bit and 40 bit. * Restrict page permissions values like print, copy, edit, extract, annotation etc. * Choose page resolution setting like low and high. * Create efficient resultant file name. * Perform operation into batch style. * Work with 32 and 64 bit operating system. * Work with all Window oper ...
  • Pdf encryption software password secures and encrypts batch pdf files with option to lock each pdf using unique password. Configure it to load different password for each individual pdf. It supports RC4 and AES 128/256 bit long encryption key. Axommsoft pdf encryption software is easy to use and advanced desktop utility support encryption of large size pdf documents as well. Its advanced setting allows users to implement different user and owner passwords. Users are provided with option to specify the password pattern like alphabetic, numeric, special characters and lower/upper case string. An evaluation version download is available for free to test the program.
  • Provide live chat support to your customers and website visitors with award-winning live chat solutions from Live2support. We have been delivering enterprise level live chat to websites around the world since 2003. Many more reasons to adopt Live2Support: - Highly reliable and stable with 99.9% uptime - Distinguished track record of performance, service and quality for more than 10 years - Subscription-based solution that is highly affordable with packages starting at $9.95 per month - Proactive live chat which allows your chat operators to extend chat invitations to your visitors proactively without asking them to register on your website - Multi-tier backup and disaster recovery since our solution resides entirely on the cloud on high performance servers - Ability to Scale from one chat operator to as many chat operators as you wish at a moment's notice - Seamless integration with all major CRM and CMS platforms such as Salesforce.com, SugarCRM, Microsoft Dynamic CRM, Ze ...
  • Folder Protect is a new concept in Data Security. It lets you password protect and set different access rights to your files, folders, drives, installed programs and popular extensions. Folder Protect goes beyond normal file locking and encryption by letting you decide whether to make files inaccessible, hidden, delete proof or write proof. Folder Protect is Windows 7 / Vista / 2003 / XP compatible.
  • Retail Man, powerful Point of Sale (POS) and inventory software with accounting. Supports most POS hardware :- docket printer, bar code scanner, cash drawer, pole display, touch screen, scales. Simple user interface with powerful security. POS with stock control, inventory, invoicing, debtors control, purchasing, creditors control. Support for web stores including OpenCart. Menus in English, Arabic, Chinese, Dutch, French, Portuguese, Spanish.
  • File system monitor filter can monitor the file system activities on the fly. With file system monitor filter you can monitor the file activities on file system level,capture file open,create, overwrite, read, write,query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.
  • File system control filter can control the file activities, which you can intercept the file system call, modify its content before or after the request goes down to the file system, allow/deny/cancel its execution based on the filter rule. You can fully control file open/create/overwrite, read/write, query/set file attribute/size/time security information, rename/delete, directory browsing these Io requests.
  • Need to protect your important and valuable pdf data with password in non-editable mode? Try pdf encryption software which uses strong 128 bit protection key to encrypt pdf data. Tool adds pdf user password as well as pdf owner restrictions password. User password stands for pdf open restriction and prompts to type when an unauthorized user tries to open it. Only valid and authenticated person who know the password can open and view pdf. Owner password stands for pdf permission password which restricts user to edit document, blocks all types of modification like pdf page split merge extract etc, disable pdf printing and content copying, deny form filling, signing and commenting etc. Software uses 128 bit, 256 bit strong security key and supports both RC4 and AES encryption level protection. Batch pdf security software is very easy to use even by novice user. Download free evaluation copy to lock pdf document with hard security settings. Trial shows watermark on output documents however registered copy works w ...
  • Any hack consists of a sequence of several steps. It's the prequel of Tower Bombarde - the first steps in hacking servers and security systems. In this case the player should crack Cyber Brain which represents a labyrinth stuffed with security systems and various puzzles.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware