Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • PDA investigation utility analyzes information of windows mobile for the purpose of generating forensic reports according to user requirement. Mobile forensic tool can extract manufacturer name, IMEI number, sim IMSI number, battery status and signal quality of pocket PC. Software provides easy and interactive graphical interface for working efficiently without requirement of much technical knowledge. PC investigation software supports all major worldwide manufacturers of windows mobile devices such as Anextek, Asus, Audiovox, Dopod, Gigabyte, GSMK Cryptophone, Hitachi, HP, i-mate, Motorola, Blackberry, O2, LG, Pantech, Samsung, UTStarcom, Yakumo and others. Utility can extract windows mobile information like SMS, dialed number, received number, saved files and folder like video, music, documents, ringtone etc. Mobile forensic tool provides inbuilt feature to analyze your pocket PC window operating system registry. PDA forensic investigator utility easily operates in the environment of windows 98, ME, 2000, N ...
  • Files Cipher can be used to encrypt a range of computer files to ensure data protection. This program is a multifunctional cryptographic tool that is easy to use and understand. The encryption algorithm with private key was specially developed by FC Soft and has been proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption. Due to a comfortable and intuitive interface, Files Cipher allows any user to protect data, even novices in information security. Main features: - Encryption. It is based on the algorithm with a private key that is not stored in the encrypted file. It is possible to combine several files and folders into one crypto-file. - Compression. It is possible to compress files before they are encrypted, which will reduce the final size of the crypto-file. - Erasing files. After the program encrypts files, it can erase the source files from the disk so that it will be impossible to recover them even wit ...
  • Store all passwords securely in one place. Bitobit Mithril Password Manager makes password management easier and more secure by marrying a single-click user interface with secure cryptographic algorithms to protect your sensitive information. Use Bitobit Mithril Password Manager as a secure scratch book to keep sensitive information such as activation codes, product keys and credit card numbers securely protected yet easily accessible.
  • SmartEncryptor uses the most powerfull encryption algorythms existing. AES - the US Government standard symmetric encryption algorythm and Blowfish. Works on all Windows systems.
  • Find it logic game. The viewer will now see a.puzzle. link in the sidebar when viewing a photo. clicking on this link will turn the photo into a puzzle.. New free puzzles daily word search, crossword puzzle, picture scramble, logic problem, cryptogram, memory match, kriss kross, word math, and more. Visual puzzle tests your observation skills. find it. is an online puzzle where you are presented with a photo that has some element in it that cha
  • OMNIQUAD Total Security Suite includes security and privacy tools that are essential for your computer?s security. 7in1 Suite consists of AntiVirus, AntiSpy, Anonymous Surfing, Firewall, MyPrivacy, BHO/Popup/SpamBlocker and Password Organizer. 11in1 Suite has added tools like File Shredder, File Encryptor and Parental Control. Anti-Virus automatically protects you from viruses, worms, Trojans, spyware etc by continuously scanning the system in background. It prevents virus infection from files coming in through internet. AntiSpy finds and removes spying and advert-displaying programs from your computer. Spyware make the system slow by continuously trying to connect to the internet, some can contain bugs (defects) that can cause system to slow down. Spyware could also add malicious code to legitimate files, similar to the behavior of a Virus. Anonymous Surfing is an Internet Explorer Proxy Manager that automatically downloads a list of anonymous proxy servers, checks them for speed, and sets the fastest one as ...
  • OMNIQUAD Total Security Suite includes security and privacy tools that are essential for your computer?s security. 7in1 Suite consists of AntiVirus, AntiSpy, Anonymous Surfing, Firewall, MyPrivacy, BHO/Popup/SpamBlocker and Password Organizer. 11in1 Suite has added tools like File Shredder, File Encryptor and Parental Control. Anti-Virus automatically protects you from viruses, worms, Trojans, spyware etc by continuously scanning the system in background. It prevents virus infection from files coming in through internet. AntiSpy finds and removes spying and advert-displaying programs from your computer. Spyware make the system slow by continuously trying to connect to the internet, some can contain bugs (defects) that can cause system to slow down. Spyware could also add malicious code to legitimate files, similar to the behavior of a Virus. Anonymous Surfing is an Internet Explorer Proxy Manager that automatically downloads a list of anonymous proxy servers, checks them for speed, and sets the fastest one as ...
  • Select the file or folder you want to keep protected and choose to encrypt from the right click menu. All files in that folder are encrypted with the password you enter and are no longer available to anyone without that password. Secure and reliable data handling, lock personal folders. Once you encrypt the file to access it again,you would need access to the password that was used while encrypting.Because it integrates seamlessly with windows. Finally you can easily protect your important files or folder by using this software. Now its not that easy to access anybody's file.
  • Axessh is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places where people aren't allowed to own cryptographic software). SSH is the industry standard for remote logins.
  • P2P Messenger is secure Instant Messaging client, working by Peer-to-Peer technology. It is fully decentralized and does not require any servers. Supports public-key cryptography
  • It is an ActiveX control which adds encryption features to your Windows applications.It is easy to use, it encrypts strings, buffers and files. It uses public and private RSA keys for encryption/decryption (256-bit symmetric keys for AES) and provides general process information. Whether you are a beginner or a professional in software development, and you need simple but unbreakable encryption, Polar Crypto Light is the appropriate tool for you.
  • WISeCrypt (Personal Edition) provides high security data encryption and protection. Users can securely protect, encrypt, decrypt and wipe files and folders on their PC or other storage devices. Supports AES (Rijndael), 3DES, RSA, RC4 and other asymmetric and symmetric cryptographic algorithms, and X.509 digital certificates.
  • The Whitenoise encrypted e-mail attachment utility allows users to send securely encrypted e-mail attachments to recipients even if they do not have the Whitenoise e-mail encryption software. The sender, who is using the Whitenoise encryption utility, encrypts the file using a dual password key that is given to the recipient while they are on the telephone or by other means. $100,000 Whitenoise Security Challenge.
  • CryptoDisk is a powerful tool for creating and managing virtual encrypted disks (encrypted volumes). It creates encrypted volume within a file on a hard drive or any external data storage device (flash memory card, USB drive, etc) and then mount it as a real disk. All the data are automatically encrypted using your password right before they are saved to disk or decrypted right before they are loaded, without any user intervention.
  • Speed up .NET development and create secure and trouble-free code. CryptoSharp Security Library provides complete data security throughout your .NET applications. Encrypt, store, and erase data securely. Saves time on development and debugging, and creates fast, secure and reliable code. Cryptographic and compression algorithms, secure hash functions and cryptographically strong random number generators are included.
  • Compress and Protect your EXE files. Manage your serials for your shareware.Protect your exe files against cracking with crypto technologie.
  • Xidie it?s a complete security suite with many modules integrated into a single application. By acquiring Xidie you have: Xidie steganography: is one of the most complete, innovative and complex application in steganography branch. Offer over 40 carrier types including many new technologies like ADS, Microsoft Office carrier, Registry keys etc.Most of carrier types implemented in Xidie are unique: Tiff and Word, Excel workbooks, Access databases Registry keys, Microsoft console documents, Event log files Cookies, subtitles, dictionary and PDF documents Alternate data streams and attaching method with multiple files carrier. Unique noise technology on some carrier type Time date stamp: the stego-document have same date-time stamp as original carrier document Stretch image technology. Xidie archivator: a powerful tool which allows you to create, manage and control archive files. Work with a special designed format Xidie archive (.zxc extension) but also could manage Zip compatible archives. This modu ...
  • FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored. Features include: - Source code freely available. - Easy to use; full wizard included for creating new volumes. - Data encrypted on your PC can be read/written on your PDA, and vice versa. - Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems. - Hash algorithms include: MD5, SHA-512, RIPEMD-160, Tiger and many more. - Cyphers include AES (256 bit), Twofish (256 bit), Blowfish (448 bit), Serpent (256 bit) and many more. - "Portable mode" included; FreeOTFE doesn't need to be installed before it can be used - making it ideal for carrying your data securely on USB dr ...
  • Protect your EXE files. Manage your serials for your shareware.Protect your exe files against cracking with crypto technologie.
  • Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto is an ActiveX and DLL component featuring the latest encryption technology and including full source code written in MS Visual C++.
  • The program CryptoLead will protect fast and effectively your files from immodest and curious looks. Make up the password, click on the right mouse button on the file icon, select item "Encrypt with CryptoLead" and encrypt the file very fast! CryptoLead will always stand guard over your secrets! CryptoLead encrypts the files using the strong algorithms, such as RSA, RC4, MD5, GOST 28147-89 and so on. CryptoLead is distributed free.
  • DVD-to-MPEG is powerful, convenient and high-efficient software to convert DVD to MPEG1 or MPEG2. It is easy to use, fast in speed, excellent in quality and reasonable in price. And the publisher offers excellent after-sale service that ensures the convenience and joy for all users in using the software. The most important thing is, it is super easy to use, which is beyond your imagination. No matter whether you are a beginner or a veteran, you will feel it's developed JUST for you! In one word, choosing the DVD-to-MPEG means opening the door of enjoying your multimedia life! Key features (what's new) 1 Easy to use. It is super easy beyond your imagination. You can handle all settings and properties quite easily in one interface. 2 Brand-new DVD decryptor 3 Multi-language function for operating interface. 4 Adding the function of setting video and audio Bitrate (Kbit/s) of mpeg 5 support chapter choosing and previewing
  • Everybody has a right to privacy. Your confidential information can be saved as a file (photo, document, program, music or video file etc.). You do not want anyone to know your secret and anyone to suspect you have a secret. Insider allows the user to conceal details (of their private life or business) from unauthorized viewers. If the user needs to conceal confidential files, he can use various programs for protection. Meanwhile these programs do not allow use of the concealed data as easily and safely as you can with normally unprotected files. Our program is not available obviously. It is hidden inside another, absolutely inconspicious program (file compression utility). Confidential files are compressed and kept inside containers - usually pictures. These pictures themselves are not distorted. Any program that can be used to view the pictures will show the container's content only. The above mentioned features are very important psychologically. When there is no indication of an encrypted file, e ...
  • Windows stores your frequently used passwords. The password is staring right at you, but it's hiding behind a row of asterisks - ****. KRyLack Password Decryptor is a program that lets you see the actual password behind the asterisks! It can recover passwords to such programs as Microsoft Outlook / Outlook Express, The BAT! and other e-mail clients, FTP clients such as CuteFTP, FlashFXP, etc. Microsoft Internet Explorer password recovery support.
  • Everybody has a right to privacy and business secrets. You have a little secret. It is saved as a graphics file (illustration, photo, scanned document, etc.). You do not want anyone to know your secret and anyone to suspect you have a secret. ViewPoint allows the user to conceal details (of their private life or business) from unauthorized viewers. If the user needs to conceal confidential pictures, he can use various programs for protection. Meanwhile these programs do not allow use of the concealed data as easily and safely, as you can with normally unprotected files. Our program is not available obviously. It is hidden inside another, absolutely usual and neutral program (Another ViewPoint inside ViewPoint). Confidential files are not kept as hidden files. They are kept inside carriers - usually pictures. The pictures (carriers) themselves are not distorted. Any program that can be used to view pictures will show the carrier's content only. The above mentioned features are very important psycholog ...
Advertising

Page 6 of 9
1 2 3 4 5 6 7 8 9


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware