最近追加された  - 

他のセキュリティ ソフトウェア 今セキュリティ ソフトウェアとアプリケーションを無料ダウンロードします。ウイルス対策およびスパイウェア対策
CrococryptMirror Portable 1.43

CrococryptMirror Portable 1.43 フリー 4981 

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.

STOP P-O-R-N 8.9.9

STOP P-O-R-N 8.9.9  4981 

STOP P-O-R-N is a handy and easy to use application that can block the access to any pornographic material. It will protect your family or classroom from inappropriate material on the Internet. If inappropriate material is detected the web browser will instantaneously shutdown the program that is displaying inappropriate material.

Paradox Password Recovery 1.9

Paradox Password Recovery 1.9  4980 

Paradox Recovery allow to find the lost password for Paradox tables. An application don't use any external libraries (no BDE, no ODBC, no ADO etc) and you may run this tool on any computer without any additional setup/install. You may customize the brute-force or dictionary search process for entire password with extended options. All versions of Paradox tables and all file kinds (data, indexes etc) supported.

BestCrypt Container Encryption 9.04.02

BestCrypt Container Encryption 9.04.02  4979 

To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe

USB Lockit 2.6

USB Lockit 2.6 フリー 4977 

USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. When the USB drive is locked, your files remain safe in all Operating Systems. Works with all USB flash drives on the market formatted in FAT32/exFAT. Available for Android & Windows PC.

abylon CRYPTDRIVE 15.90.1

abylon CRYPTDRIVE 15.90.1  4975 

Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption.

Password Decryptor for Core FTP 3.0

Password Decryptor for Core FTP 3.0 フリー 4975 

Free CoreFTP Password Recovery Software

BestCrypt Traveller 1.05.3

BestCrypt Traveller 1.05.3 フリー 4974 

BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller.exe), a standard BestCrypt icon appears in the Windows system tray from where commands can be run to mount or dismount container files and create new encrypted containers.

PC Activity Viewer 2.3.4.50

PC Activity Viewer 2.3.4.50  4973 

Watch and control all PCs & Macs in your LAN. You install the client on each computer you intend to monitor. With the server you can view all computers. You can also capture pictures, record video, and remotely control mouse and keyboard.

Terminator 8.1

Terminator 8.1  4973 

The Terminator system - to be more exact HSS (hardware-software system). Terminator consists of an external hardware controller (Terminator controller controller itself) pluggable into an USB port of a computer and the free Terminator program. The Terminator system was made by the best IT specialists of our organization. It combines the newest engineering solutions, ultimate control compliance, compactness and simplicity.

Hidden Disk 5.01

Hidden Disk 5.01 フリー 4972 

Within few seconds you can create additional disk for your secret folders and files, and within few seconds you can hide this disk entirely. To open the disk again you will need to enter your password. This is so easy and so useful! On this disk you can create hidden folders and store any secret files. The disk will be completely virtual, thus, it will not require any additional disk space, it will use free space from your existing hard disk.

11 from 1848

« First « Prev 1 2 ... 93 94 95 96 97 ... 167 168 Next » Last »

ためのベストアプリ 他のセキュリティ ソフトウェア 編集者から

結果もは現在ありません