Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: S :: security
Advertising
Display: short descriptions | full descriptions
  • Unlock Access database with Access Database password remover tool by removing access database password instantly. Remove access database password from MS Access 95/97/2000/2002/2003 with MS Access database password remover tool. If your password has been lost or forgotten, try using Access database password removal solution to remove mdb password from password protected MDB file so as to open & break access security easily.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • Folder Lock is a data leak prevention solution that encrypt & secures your files, while keeping an automatic and real-time backup of encrypted files in the backup cloud. It also offers security for USB drives and CDs/DVDs. Folder Lock is an Anti-Hack Solution that lets you lock files, folders and drives; shred files and clean your Windows History.Works with both 32-bit and 64-bit Windows Vista/XP/7/8.1/10. The complete data leak prevention suite.
  • Slitheris Network Scanner is a free network tool for Microsoft Windows for advanced IP scanning, borrowing techniques from the world of network security, and delivering more successful network scan results than any other network/IP scanner of its kind.
  • 1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, DOS programs, Registry editing and network access. It has got the multiuser intuitional interface.
  • With Cryper you can encrypt single files or even complete directories. An easy workflow with a maximum of security, that what Cryper offers. Only a few clicks are necessary to feel save and the best, you can test it for free.
  • G-Lock EasyMail7 is a hybrid email marketing solution for Windows that works as a powerful front-end to email delivery services, SMTP relays and on-premise email solutions and transforms them into fully functional in-house email service providers with the highest level of data security. It allows you to work with multiple delivery services at the same time helping you deliver awesome personalized emails to your subscribers in a timely manner.
  • SecureBlackbox.NET is a comprehensive component collection that adds SFTP, FTPS, SSH, PGP, PDF, XML security, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security support to your .NET, Xamarin, Mono or .NET CF application. SecureBlackbox primary goal is to provide technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure conversations.
  • CloudsRAID is a powerful utility for (1). Backup your confidential and critical files to public cloud storages with high security and reliability. (2). Synchronize confidential files among computers by RAID5 of multiple cloud storages with high security and reliability. (3). Backup/Synchronize file automatically by flexible schedule. CloudsRAID is the first one and only one cloud storage RAID system in the world until now with (1). High Security - It is nearly impossible to hack your confidential data. Data file is compressed first, then encrypted by AES 256bit; furthermore the data is distributed randomly to data blocks, then the data blocks are uploaded to multiple cloud servers like a RAID5 system. Even some of the cloud servers are hacked by someone, he only get some parts of the data, but he cannot recover it to the original data file. (2) High Reliability - Multiple cloud storages are used as a RAID5 system. Multiple cloud storages, such as Amazon S3, Google Storage, Windows Azure ...
  • With SFTP Net Drive you can work with the remote file system as if it were a local disk drive, given that the remote system supports SFTP protocol. SFTP protocol provides an encrypted channel for file upload and download and also for remote file and directory operations (such as create and delete directories, move and rename files etc). SFTP Net Drive is based on SFTP client component which is part of SecureBlackbox security suite.
  • Fully skin-configurable, Cybercafe SurfShop Pro is a high-value, high-quality, affordable cybercafe software. It offers an intuitive interface, powerful security, centralised management and reporting tools. Get your Internet, games / cyber cafe up and running in minutes with Europe's leading Internetcafe software. Now supports all game consoles, non-pc stations, new training centre-type tools, and dynamic management of cd keys supported.
  • From AKick Antivirus Total Security: Cybercrime has to skyrocket. Every day millions of PC users suffer due to hijacking and fraudulent online habits such as shopping and banking. Even your works may not complete without using the internet with surefire protection. However, online criminals easily swindle money from bank account; even they often misusing your credit card, finally they may crash down of your brand new system without any warnings. Introducing Akick antivirus total security for complete protection against viruses. Features: Comprehensive device control: Set write/read/execute easy access to external devices. Prevents malicious autorun: While using computer even lot of malicious features secretly comes in your computer, installed without your little information or permission, it is capable of blocking all of them effectively. Vulnerability Scanner: It detects and quickly informs the computer user for vulnerable applications that can be exploited to infect their PC. Email Security: This software w ...
  • Skater TOTAL is the unique .NET protection tool that proves real security for your production software. Unlike Skater .NET obfuscator that makes the unauthorized reverse-engineering more difficult by symbol renaming, control-flow algorithms, encrypting etc., Skater TOTAL totally stops MSIL disassemblers. This is the assurance that no one will see your source code.
  • This Mail Merge Toolkit is a powerful add-in for Microsoft Office extending the mail merging capabilities in Outlook, Word and Publisher. Allows you to insert data fields into subject fields, add attachments, send emails in GIF, HTML, RTF and text formats. The mail merging with Mail Merge Toolkit is virtually the same as standard merging, but it gives you more options and is more reliable in operation. Coded to avoid security prompts.
  • Mobile app for the site Burdachok - http://burdachok.ru. Burdachok is a glove box full of little useful things (in Russian). Install and read, comment, communicate. To install you have to tick 'Allow installation of apps not from the Play Store' under 'Settings / Security' of your device. After you install this tick are better off. Leave feedbacks on http://rifco.ru/contact If you want a similar mobile app for your site, please contact us: http://rifco.ru/contact Your website is powered by WordPress? Think about the safety. On the site http://securemywp.ru everything you need for the safe WordPress website.
  • Comodo Internet Security is the awarding winning and completely free security solution for Windows that uses a powerful combination of antivirus, firewall, auto-sandbox, host intrusion prevention and website filtering to immediately protect your computer from all known and unknown malware. Whether you are an IT novice or an advanced user, Comodo Internet Security makes it easy to lock-out malware and implement the highest strength protection.
  • Nero Standard 2019 is the masterpiece for your digital life. Its now even easier to manage, edit, burn, convert, stream, and play back videos, photos, and music. Make the most of your files and discs with countless effects, playing videos with embedded subtitles, convenient video editing, new SecurDisc 4.0 technology for greater security, and support for the latest mobile devices.
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • Program Protector is unique, state of art security utility that allows you to password protect programs. You can easily password protect any Windows application. Program Protector is very easy to use and does not require any special computer knowledge.
  • Multi-user, client-server, document scanning, OCR, workflow & case management. Store & retrieve millions of documents, workflows & cases. OCR in over 50 languages. Use your existing computers & photocopier/scanner. Handles TIF, PDF, PNG & JPG files. Recognise, classify & extract data from documents & initiate workflows. Export, print & email documents. Export extracted data in Excel or CSV format. Maintain users, roles, & document security.
  • Once the Zhelatin worm installs itself onto your computer, it sends spam e-mails through your e-mail account to all of your contacts. Additionally, the Zhelatin worm slows your computer, reduces your available system memory and may change your system settings. Conseuqnetly, if you notice Antivirus 8 on your computer, you should remove it immediately. This program is distributed by Internet criminals who use various Trojans and other devious methods to spread their rogue programs. When installed on your computer, Antivirus 8 will block execution of legitimate Windows programs, making its removal problematic. This bogus program encourages you to believe that it is the only program able to save your PC from spyware and malware purportedly attacking your machine. In fact, your computer is unlikely to have any infection and the security threats that Antivirus 8 'detects' are completely fake. This program's purpose is to sell you a license to remove the non-existent security issues fro ...
  • From Akick Password Safeguard: Safeguarding your password, login with Akick Password Safeguard tool. No matter keeping safe your password, PIN Codes is quite difficult for a while. While using Akick Password Safeguard tool, you can save, store quickly of your password in the database while keeping it protected. Especially when you forget lost your data. It is one of the best tools that come with many quality features that help you to easily recover your password for its reusability. Akick Password Safeguard tool is designed to keep all your personal and professional data safe and secure from any unauthorized access. How does Akick Password Safeguard tool help you out to keep your dozens of password in a database? In addition, this software is very much user-friendly that easily store several of the passwords in a database for its future use. However, it provide you easy interface so that anyone can use it in a simple way. It would be the right way that it maintains your password privacy with easy installation ...
  • Event log analysis of Windows event logs is a highly important task for any system administrator. Event Log Explorer is an effective tool to view, explore, backup and monitor events in Security, System, Application and other Windows logs. The program extends the standard Windows Event Log Viewer functionality and brings a lot of new features. Download it now - this program is FREE for personal use!
  • From Akick Document Converter: Akick Document Converter tool allow you to convert your document into different files formats such as DOC,DOCX, PPTX, PDF, WPS, Word, HTML and other file types. It is one of the best tools that help you to convert your document into multiple files formats. In addition, this software that has been widely used by many people to change their Microsoft word document into the preferred PDF formats. It takes very less time to do so and resultant PDF files are of high quality. This software tool provides easy interface to make relevant changes is what makes Akick Document Converter different from the rest. However, it is compatible with latest version of OS. Well from security point of view, it is safe and secure from recent virus so that it can't be affected by latest threats and malicious codes. Overall it would be a wonderful tool in your hand that can convert dozens of your document and that too at your single-clicks away. While any one only wants to go for best software t ...
Advertising

Page 4 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware