GiliSoft USB Stick Encryption is especially designed to create password protected USB memory sticks. It creates protected areas on the disk that is needed to enter password to see contents. Data on the protected areas are encypted by 256-bit AES on-the-fly encryption. Protected USB stick is fully autonomous and does not need any special software installed on computer.
Software Advisor is a free security tool that protects your PC from the harm caused by out-of-date software and vulnerabilities. Software Advisor detects programs with issues that may compromise PC security, and points you to the download pages for updates, patches and fixes. Other useful features: Backup and Restore your software to save time and headaches later; Discover new software by viewing what people with similar interests recommend.
Have you ever password-protect your iTunes backup files but now you forget iPhone backup password? You want to restore contacts, messages, photos, and notes from iTunes backup file but it’s encrypted. If this is your case, don’t get disappointed, Free iTunes Backup Unlocker is exactly your great rescue. It can help you recover lost iTunes backup password without any damage to your backup data.
Easy Folder Guard is a powerful application aiming to settle the problem of folder encryption and protection. It can quickly, simply and securely protect folders with various methods - password protect a folder, hide a folder and disguise a folder. In addition, it also provides some enhanced features to comprehensively protect the data on your computer, such as disk protection, unable use of USB devices and read-only use of USB devices and more.
Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
Toms AD Object Recovery is a free Windows utility for querying your Active Directory for deleted computer, user, group, or other objects and restore them on-the-fly. SUPPORTED OBJECTS: * Computer Objects * User Objects * Group Objects * Organizational Units * Print Queues * Full volume Encryption Objects (BitLocker Recovery Keys) No domain controller downtime - Restore object attributes - Highlighted Search
RoboForm2Go for USB flash drives securely stores your passwords so you never need to type them again. It automatically logs you into online accounts and completes registration and checkout forms with one click. All new Version 7 supports Chrome and Safari browsers. RoboForm2Go runs directly from USB flash drives giving your data complete security and portability. RoboForm is PC Magazine's Editor's Choice and CNET's "Best Software of the Year."
PC Keylogger Pro is the most advanced and stealth keylogger application that will secretly record all computer activities (visited websites, passwords, all the keystrokes, screenshots, emails sent and received, messenger/chat conversations etc.). PC Keylogger Pro allows you to remotely view the logs/reports uploaded on your secured online account. See more at www.pckeylogger.com
PDF Page Lock enables users to lock or hide selected pages of a PDF document with a password encryption. With PDF Page Lock, users could hide or lock selected pages of a PDF file while leaving all other pages available.
The DeEgger Embedder is a piece of privacy software for Windows. It's designed to allow the user to create files that have other files hidden inside them. It takes a file of any kind, and merges it's binary (1s and 0s) with the binary of any media file (.avi, .jpg, .mp3, .mp4, .pdf, .png). The new media file presents as it normally would, however your secret file is woven into it's binary and can be extracted using this software.
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased.
