Description: Removable Access tool is a very simple-to-use portable freeware Application it helps an individual or a system administrator control USB storage devices. You can protect your confidential data from being copied by others . Ratool can disable USB storage access or enable write protection on all USB Flash drives thus prevent data from being modified or deleted.
There are a lot of such tools available on the internet but they are not effective for example if you use one of the USB Disabler and disable any usb storage / Pendrive you can use another tool and enable it again easily that mean ; they actually not protect your Usb ports, that is the point why we published Ratool , if you use Ratool you don't have to worry about such a situation because other tools can not easily break the Ratool's protection.
Ratool allows you to do the following action:
1. Disable USB disk detection: Disables any USB storage / PenDrive access to your pc.
2· Allow Read-Only : This option allows the computer can only read it from USB disks. In certain cases you may not want the files on your computer are copied to the USB disks that plugged into your computer.
3· Allow Read & Write (Default)
Description: SterJo Wireless Password is free utility for recovering your lost wireless passwords of your network. As the number of devices using wireless network increases same as the need for more security, it often may happen your password containing letters, numbers and special characters to be forgotten in time. So instead of completely resetting everything and creating a new password there is a much simpler solution. All you have to do is run SterJo Wireless Passwords and allow it to scan your wireless network. The software will display all saved passwords which can be used to connect your other wireless devices without a fear of forgetting them in the future.
Description: Have you ever wondered which programs have access to internet and if you have permitted that action? SterJo NetStalker is innovative security software able to detect all authorized and unauthorized connections to your computer and send you alert for each new connection. The software is based on similar principles as most firewalls work and also could create a custom security policies with an advantage to run it totally portable. It serves as an entry point into your computer and instantly informs you about all the processes able to establish a connection with an external network. If making an analysis of all open ports on your system with a standard port scanner would take a few minutes, with this program it would be done only in a few milliseconds. This is also quite powerful software for making analysis of all running processes on your system as well as those that look suspicious. The program offers an option to display details about all connections and closing individual connection or entire process. If you are one of those who want to know exactly where your connections are targeted then this program is the ideal solution for you.
Description: PalCrypt is a free file encryption/decryption program for Windows. Easily protect your files with IDEA 128-bit key encryption algorithm which is stronger than both DES & 3DES. MD5 & SHA1 hash are also used for stronger encryption. RC4 encryption algorithm is supported for PalCrypt internal use.
PalCrypt is fast and easy to use from the standard & simple PalCrypt main window or directly from the Windows explorer by right-clicking the file to encrypt. Double-click an encrypted file to decrypt.
*Please note that in case of password loss you will not be able to retrieve your data*
Installer bugs fixed (no reboot is required anymore). Blowfish encryption algorithm is now supported. New standard-window appearance.
Description: Bytexis MSN Password Recovery - the program to recover MSN Messenger passwords. The program supports all versions of the MSN Messenger. Bytexis MSN Password Recovery lets you recover your MSN Messenger password that has been saved to auto-login to your MSN Messenger application. Program recovers stored login information (when the \"Remember my Password\" tickbox is checked in the messenger) for the current computer user.
ST Proxy Switcher 3.0.44 Compatible with: XP, Vista, Win7 Filename: STProxySwitcher_Setup.exe Size: 952 kb Author: ST Proxy Switcher More Details & Downloads
Description: Stay anonymous when you browse the Internet. The application can be used hide your IP Address from the websites that you browse. Using this application you can browse as if you are in some other country. The application can provide you with fast changing of proxy. The application will provide you with a proxy list so that you can manage your proxies switch the proxy servers of your web browsers, Enable them and Disable them.
KPKFile Pro v10.1 Compatible with: XP, Vista, Win7 Filename: kpkfl101.zip Size: 1727 kb Author: KPKFileSoft More Details & Downloads
Description: KPKFile Pro is a free complete suite of encryption tools that allows you to manage your privacy without worry. PASSWORD MEMO is a useful encrypted database of passwords letting you running your passwords in and out of KPKFile interface. FILE ENCRYPTION TOOL packs files in binary code that can be inoculated inside another still working above suspicion file. Moreover, KPKFile Pro performs steganographic encryption blurring data inside graphic files. These options are useful if you want the maximum of privacy and if you wish to hide that you are hiding something (in fact, note that the use itself of encrypted files can be unsafe). WIPING FUNCTION allows erasing selected files from disk drive preceding file deletion by multiple data changing to make useless file undeletion. PRIVATE FOLDER manages a secret directory in which you can store a tree of file folders. Private Folder is a regular directory, which can be managed out of KPKFile interface too. Distinct Private Folders can be created by different passwords; hence many users are allowed to have their own Private Folder on same computer.
Description: Qustodio helps you protect your kids online. See how they use the Internet, set healthy access limits, and protect against dangerous or inappropriate content, cyberbullying, and online predators. Qustodio is easy, superior and free.
Qustodio's advanced technology ensures that no content escapes supervision. Whenever your children are online, Qustodio is there to safely monitor and guide them.
Qustodio monitors your child's participation in social networks and chat programs as well as their surfing behavior. Discover who your kids talk to, and get instant alerts for suspicious activity.
Set healthy limits on your children's online time. Qustodio's web portal allows you to monitor and manage their activity from any location or device.
Qustodio is designed to be tamper-proof, so no matter how technically advanced your kids are, they can't find ways around the limits and controls you put in place.
Qustodio helps you:
See how your kids use the Internet
Know who they talk to online
Block dangerous websites
Protect kids from bullying and predators
Manage your kids' Internet time
Description: Want to save a copy of your personal file on a usb pendrive but you are worried that, in case of theft, someone will be able to access your data?
With Free File Camouflage you can hide your files inside a jpeg image!
The software can be used with the main interface or via the explorer "send to" context menu (the first time you only need to select a directory with some images).
All the files are encrypted using AES and hidden inside an image.
What happens if someone tries to open a camouflaged image? Well... nothing! He will only see the image.
Description: Multi-layer intrusion prevention for Windows Desktops and Servers. Privatefirewall detects, blocks and quarantines activity characteristic of known malware, hacking, phishing and other threat types so that personal computer users and IT managers within small, medium or large organizations can more effectively and proactively protect the environments and private data for which they are responsible.
An exceptionally simple user interface makes Privatefirewall a breeze to manage. You'll realize expanded protection and become educated about the nature of activity - trusted and un-trusted - that occurs on your system.
Description: Passport is a free password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key. So you only have to remember one single master password to unlock the whole database. The databases are encrypted using the best and secure encryption algorithms. A built-in password generator helps you to create 100% secure passwords, and drag-and-drop capability provides easy to use web-form filling functionality.
Description: Subrosa is small program which can help users to save passwords in a file so that it won't get lost. It also allows to generate passwords using random characters. I have implemented Blowfish encryption algorithm so that users can keep the passwords safe in a file. Other than passwords, it can also be used to store gift codes, iTunes codes or any other codes. You can put a remark to a password too.
Ultra Core Protector 6.3 Compatible with: XP, Vista, Win7 Filename: ucpsetup.exe Size: 1.45 mb Author: Endi More Details & Downloads
Description: Ultra Core Protector (UCP) - is a free anti-cheat client-server software for server protection from unscrupulous players. UCP AntiCheat supported games: Half-Life, Condition Zero, Counter-Strike 1.6, Day of Defeat, Adrenaline Gamer, Team Fortress Classic, Counter-Strike Source, Mu Online, Gunz Online.
Description: NiceEnkripteer is a simple and useful files/folder enciphering program. It uses for enciphering strong and fast symmetric opensource algorithm - AMPRNG. This is symmetric stream cipher with high speed and 512 bit key. You can encrypt all files in folder and it's subfolders just by one mouse click. All files will have their original names, program determines which files are encrypted by content only when correct password was submitted.
Ogni Free Folder Locker & Hider 1.0 Compatible with: XP Filename: OgniLockerHidersetup.exe Size: 632 kb Author: Ognilab More Details & Downloads
Description: Ogni Free Folder Locker & Hider version 1.00.00 is a powerfull free software for home or commercial use.This software
Includes locking techniques combined with hiding which is very unique.
USB Safeguard v1.2 Compatible with: XP, Vista, Win7 Filename: usbsafeguard.exe Size: 736 kb Author: USB Safeguard Soft. More Details & Downloads
Description: Password protection software USB pen drive. It's a freeware files encryption utility, small, portable and easy to use. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an password to encrypt and decrypt the files that you want to protect from prying eyes. Not only encrypts your files, it also has option to surf safe on web and removes all Internet traces. Built in file shredder - i.e. wiping the contents of the original pre-encrypted file. Your data is secure while the drive it is out and about with you in an Internet cafe's or at work. (Supports FAT16, FAT32 and NTFS file system)
Description: -What makes this program:
allows you to transmit files securely, those who intercepts it can not be traced back to the plain text data
-How he does it:
through communication between two computers, both must have securefiletransfer (freeware, open source under New BSD license) one of which generates a key pair for asymmetric encryption, sends the public key to another computer that produces a symmetric key and sends the first computer after it is encrypted with the public key, the computer that receives possesses the private key to decrypt the symmetric key asymmetric and at this point the two computers are aware of a symmetric key through Rijndael (AES "implementation") is able to produce a level of encryption security that a brute force attack currently require time processing machine virtually impossible, the public key is exchanged in clear in 1024 is not feasible, then bit back to the private key.
-other features:
Server mode allows the program to create an unlimited number of users each of which is defined a username and password for each user is defined as a directory to read exactly what the user can access a directory read and write where the user has write access, for example the user with username "test" and password "mypassword" will have access to read the entire C: drive and write to c: \ Users \ test \ documents, to request or send the file should of course add to the server and send your username and password that will go on the Internet encrypted, as all data exchanged with Rijndael. SecureFileTransfer software encrypts all data stored locally that
Secret Message v0.2 Compatible with: XP, Vista Filename: SecretMessage.zip Size: 710 kb Author: Eniledahs More Details & Downloads
Description: Secret Message can store a hidden or encrypted message into a JPG / JPEG picture file. The message will not be seen using any image viewer. Will always be free!
Runscanner 1.9.0.9 Compatible with: Win2k, XP, Vista Filename: runscanner.zip Size: 1.44 mb Author: Hemoco More Details & Downloads
Description: RunScanner is a completely free windows system utility which scans your system for all configured running programs.
You can use runscanner to detect autostart programs, spyware, adware, homepage hijackers, unverified drivers and other problems.
You can import and export your results and let other people help you to solve your problems.
- Top rated freeware
- Scanning of 120+ hijack locations
- Online malware analysis of results
- Powerful process killer
Kill multiple processes at once
Kill and rename
Kill and delete
Delete at next reboot
- Saving and importing of .run files (all information available)
- Save to text log file
- Verification of file signatures
- Host file editor
- MD5 hash calculation of files + online file rating
- Online lookup of scanned entries. (Runscanner database + Google)
- Regedit jump
- Explorer jump
- Extended filters
- Marking of items. A user with problems can save the .run file, an expert can mark the items that need fixing and send the .run file back to the user
Cryptola 1.1 Compatible with: Win2k, XP, Vista Filename: cryptola.zip Size: 15 kb Author: Ravi Bhavnani More Details & Downloads
Description: Cryptola is a powerful yet easy-to-use file encryption tool for Windows. I wrote Cryptola because I wanted to protect my system backups (.zip archives that I store online). Cryptola uses technology designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard.
Description: Program to calculate and verify checksums of files downloaded from the internet. Supports major checksum types: CRC32, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, HAVAL 256, TIGER 192. Portable version - no installer, just one file. Has simple, intuitive interface with fireworks. File Checksum Verifier (FCV) supports drag and drop function and can create checksum verification file (program.exe.md5, movie.avi.sha512) and is highly customizable: can save window position, support keyboard shortcuts and makes use of Windows clipboard - copy/paste checksum from/to clipboard and can also auto-paste checksum and automatically compare them, might stay on top on other windows, can be rolled-up to mini bar, show checksum in upper or lowercase and optionally can be integrated with Windows Explorer context menu. Can create history file of all calculated files. Moreover, this application provides support for users with vision difficulties (vision impairment) - respects skins and color schemas. Application is ideal for portable USB drives.
Secret Data Manager v2.5.2 Compatible with: XP, Vista Filename: sdmsoftware_english_b.zip Size: 570 kb Author: Peter Lyon Software More Details & Downloads
Description: Secret Data Manager follows the style of Windows Explorer. You do not need any extra training to use it if you can use a PC. It offers encryption and decryption of files as its core feature, but it is also capable of common file management like the Windows Explorer. The Secret Data Manager implements special algorithm in encryption and decryption. It is much safer than normal or open source products. In addition, its bookmark feature enable users open or update an encrypted file directly.
Description: On your USB drive or your laptop, do not leave your confidential information more accessible.
And what could be more banal than Windows calculator !
This calculator, clone fully operational, is a very discreet safe allowing you to move your IDs, passwords, ... without fear of consequences in case of loss or theft.
After entering your PIN, it will encrypt and "swallows" the file you have chosen.
Process
Enter your PIN in memory (key [MS]), the calculator goes into safe mode. Browse the directory and select a file, it stores it encrypted in its own executable file. Erasing memory (key [MC]) delivers the standard calculator mode. Subject of course you enter your PIN, you shall return it, or display, or replaced.
- For a description of controls, click [Help] or type [F1] in safe mode.
- The defaut PIN is "123".
- Your new PIN must be a number from 1 to 32 numbers, positive or negative, integer or decimal!
- No install required
- No modification of the registry
- This Safe Calculator does not contain spyware, adware, or other virus
Quttera 0.3.1.0 Compatible with: ME, Win2k, XP, Vista Filename: QutteraInstall.exe Size: 3618 kb Author: Quttera More Details & Downloads
Description: Quttera is a Signatureless Malicious Content Detection Solution designated especially to identify the potentially malicious executable code, zero-day vulnerability exploit and shellcode embedded into computer files such as movies, images, documents and etc.
Quttera implements patent pending algorithm capable of detection zero day malicious threats without any previous identifying information (threat signature) needed.
SafeHouse Explorer USB Disk Encryption 3.00 Compatible with: Win2k, XP, Vista Filename: SafeHouseExplorer-3.00.000-setup.exe Size: 3528 kb Author: PC Dynamics. Inc. More Details & Downloads
Description: FREE SafeHouse Explorer provides total privacy and protection for your sensitive files and folders using passwords and super-strong 256-bit encryption. This software is amazingly simple to use and features a familiar Windows Explorer-like look and feel. Protecting files is as simple as dragging and dropping them into SafeHouse Explorer. SafeHouse Explorer is specifically designed to make it easy to work with files stored on portable drives such as USB memory sticks and Flash disks. The fundamental problem faced by most other encryption products is that they must be installed before being used -- which becomes a real problem when trying to access your personal files from other peoples' PCs or public access computers found in schools, libraries and coffee shops. SafeHouse Explorer avoids this problem by being able to be run directly from USB devices without needing to first be installed on host machines. SafeHouse Explorer allows users to create an unlimited number of private storage vaults on any media including local drives, external drives, network servers and even CD/DVDs. Each encrypted vault can be up to 2,000 GB in size and can only be accessed using a secret password. SafeHouse vaults can store any kind of files, including documents, spreadsheets, photos and videos. SafeHouse Explorer is being distributed as a free companion to PC Dynamics' complete line of SafeHouse privacy products in order to promote awareness of data privacy concerns, particularly when it comes to portable media. This software is full featured, and for people with basic security requirements, co
InsetSor 1.0.4 Compatible with: Win2k, XP, Vista Filename: InetSor-1.0.4-Win-ENG-install.zip Size: 1784 kb Author: Netsor More Details & Downloads
Description: "InetSor" protects your computer actually against On-line spies and prevents the On-line access of uninvited guests fast and reliably. The 'InetSor' service supervises constantly the disk drives of your computer and switches the Internet in the OFF-LINE state, if disk drives with protection-worth data are switched to.
The access prevention occurs very near to hardware.
The following protection-worth disk drives can be switched to and be removed in another time:
- USB Sticks
- USB Hard disk drives
- encoded Truecrypt-disk drives
- all other than hardware recognizable disk drives
The computer network can become any time online. Simply remove the protection-worth disk drives and "InetSor" switches the Internet freely.
Result: "InetSor" is a sure and comfortable program which works after the principle DISK DRIVES APPEARANCE-> NO INTERNET---> NOBODY online SPY. It prevents therefore effectively On-line Spy attacks.
Process Blocker 0.3 Compatible with: Win2k, XP, Vista Filename: processblocker32.msi Size: 374 kb Author: Softros Systems. Inc. More Details & Downloads
Description: This is a simple application aiming to help administrators to get rid of time-killing programs. The Process Blocker kills any process contained in its list so you can restrict usage of any other software. It is easy to install and easy to use. Project is still in development but usable enough.
FreeOTFE v4.0 Compatible with: Win2k, XP, Vista Filename: FreeOTFE_setup.exe Size: 1.8 mb Author: Sarah Dean More Details & Downloads
Description: FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program.
Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored.
Features include:
- Source code freely available.
- Easy to use; full wizard included for creating new volumes.
- Data encrypted on your PC can be read/written on your PDA, and vice versa.
- Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems.
- Hash algorithms include: MD5, SHA-512, RIPEMD-160, Tiger and many more.
- Cyphers include AES (256 bit), Twofish (256 bit), Blowfish (448 bit), Serpent (256 bit) and many more.
- "Portable mode" included; FreeOTFE doesn't need to be installed before it can be used - making it ideal for carrying your data securely on USB drives!
- Operates under both PC (MS Windows 2000/XP) and PDA (Windows Mobile 2003/2005) platforms.
- Linux compatibility (Cryptoloop "losetup", dm-crypt and LUKS supported).
- "Hidden" volumes may be concealed within other FreeOTFE volumes, providing "plausible deniability".
- FreeOTFE volumes have no "signature" to allow them to be identified as such.
- Encrypted volumes can be either file or partition based.
- Modular design allowing 3rd party drivers to be created, incorporating new hash/cypher algorithms.
- Supports password salting (up to 512 bits), reducing the risks presented by dictionary attacks.
- Allows
Prevent Restore v 1 Compatible with: ME, Win2k, XP, Vista Filename: setup_prevent_restore1.exe Size: 2209 kb Author: PrivacyRoot.com More Details & Downloads
Description: The main purpose of free "Prevent Restore" program is to make deleted files and folders unrecoverable. Its made as Wizard program and will be friendly for any computer newbie. "Prevent Restore" will overwrite all free space on your hard disks that can contain fragments of deleted files with random data to avoid any possibility of recovery. It uses several security algorithms.
Messenger Blocker v 1.0 Compatible with: Win2k, XP, Vista Filename: messengerblocker.exe Size: 1440 kb Author: Amplusnet More Details & Downloads
Description: Messenger Blocker is a free internet parental control software that protect your child while surfing the internet. The application will block chat applications like msn messenger or yahoo messenger. The blocked user can receive personalized notification that his activity was blocked or there can be no notification showed up.
Description: Winsonar 2008 is a program specifically designed for process monitoring and system protection from
unknown processes.
The basic idea is that if the user could know a new program silently installed into memory, appropriate
countermeasures can be taken.
After a learning period, the program detects new processes running into memory alerting the user.
The on-line status is also detected,asking then the user if an automatic termination of any unknown
processes is desired (this option can be also enabled by default). This leads to an active protection
against trojan\spyware-infected e-mail attachments.
Finally the program can also scan ports, displayng the open ports \IP addresses and processes owning
open ports.
KOH 2.00 Compatible with: Win9x, ME, Filename: koh20install.zip Size: 113 kb Author: The Far Horizon More Details & Downloads
Description: This is a full disk on-the-fly encryption system with user-installer encryption algorithms. It provides absolutely the best security possible, encrypting all of your files, directories, operating system files, boot and master boot sectors. It is even possible to encrypt the partition table and strongly encrypt the encryption algorithms themselves. You can also install more than one encryption subsystem for enhanced security. KOH comes with several encryption subsystems. Source is available at the home page, and the tools to write your own encryption subsystems. Simply the best!
THIS DOES NOT WORK WITH XP, Win2k, VISTA, ONLY Win98,ME
Description: SecureCrypt UE is most certainly one of the best free encryption softwares to date.
With gaurenteed protection using up to date encryption and decryption technologies,
a newly constructed user interaction system, sleek UI and a completely user friendly
experience, SecureCrypt will offer you the safest, easiest and the best encryption
alternative completely free of charge.
Easy, safe, and efficient encryption software to keep all of your sensitive documents
away from prying eyes. Encrypt your files or text into unreadable, scrambled information,
and then decrypt them at a later date for viewing by first entering any custom
password.
Description: Password Dragon is a free, easy and secure password manager that works on Windows, Mac and Linux (JAVA Must be installed). Can be launched directly from USB thumb drive.
* Files are encrypted with BlowfishJ algorithm. Remember only the master password.
* Store additional information using the 10 additional customizable attributes
* Available in Multi Language.
* Built-in random flexible password generator
* Copy UserId and password to clipboard
* Password Strength indicator
* Data files are automatically backed up.
* Application Inactive timeout.
* File Locking Facility
* Unlimited records and data files
* Launch URL from the application
* Records can be grouped using user defined categories.
* Import records from text file
* Export all/selected records to text,HTML and XML file
* Search records on all/specific columns
* Record sorting based on column names.
* Password can be masked in the main table and in the record view.
* Command line extension. Ability to view records from the command line without launching GUI.
* Ability to specify the startup sort order and startup category
SecuStr 1.0.0.1 Compatible with: Win9x, NT4, ME, Win2k, XP, Vista Filename: SecuStr.exe Size: 713 kb Author: Pal Microsystems More Details & Downloads
Description: SecuStr is a small utility to be used to generate the most popular hashes in use today. Both string & file hash calculation are supported. String encryption/decryption using some popular ciphers is also supported but is in beta phase in the current version. SecuStr is developed to be a quick and trustworthy hash calculator and it does so. For more info about this software contact support@palmicrosystems.eu.
ZoneIDTrimmer 1.0.0 Compatible with: XP, Vista Filename: ZoneIDTrimmerSetup.zip Size: 692 kb Author: Gasanov.net More Details & Downloads
Description: ZoneIDTrimmer helps to detect and remove an alternative data stream (Zone.Identifier) stored by Windows in files downloaded from the Internet or email attachments saved on your disk, causing a security warning when these files are used.
SecureCRYPT 2.0.0 Compatible with: XP, Vista Filename: sc2_files.zip Size: 1.76 mb Author: ZenCore More Details & Downloads
Description: Encrypt your data, scramble documents and text into unreadable symbols and codes, so no one can read or intrude with your most confidential writings, letters or written down passwords.
SecureCRYPT then allows you to decrypt your files into readable text when necessary so that you can then safely access your document.
When encrypting documents and text with SecureCRYPT, you must enter a password, the password that you will need to remember to decrypt the file, so intruders cannot use this software against your will!
SecureCRYPT 2 now supports better VISTA compatibility, faster encryption rate, tighter encryption algorithm, updated UI features and settings.
Description: With SecureFile!, you can encrypt files of any type, including Microsoft Word, Excel and PowerPoint documents. Even your photo and Video documents can be protected with a click of the mouse. It protects information against being viewed or modified without your authorization.
The program has Windows Explorer Shell integration. This means that you can password protect your files and folders by just rightclicking the file or folder anywhere in Windows Explorer and selecting the SecureFile! option.
The icon of the secured file or folder automatically changes into a lock so you can see which files or folders are protected by SecureFile!. Doubleclicking the secured file opens a dialog where you can enter the password you secured the file with. If the password is OK, the file or folder returns to its original state, just like before it was secured with SecureFile!
The program has a convenient and intuitive interface and so even the most inexperienced users in the sphere of information protection can protect their data quite easily.
Description: When a file is deleted, it is not completely removed from the hard disk. So, it is actually possible for somebody to recover these files using file recovery programs. This is a threat if you have some sensitive data that you wish to remove. Shredder is a freeware program using which you can simply select files and shred them. With a very easy-to-use interface, just select the files, and click on shred. The files once shred, even if recovered will not show the original contents. The main advantage of this program is: It's just 9 kb in size (That's right... 9 kb), and no messy forms, just one simple dialog. Attractive Matrix type Green interface.
Bug Fixes And New Features:
* Duplicate entries removal works
* Duplicate entries get removed automatically during shred or erase
* Sequences of 0s and 1s get filled in, before use of standard Nikhil Baliga's Shredder algorithm (that was used before)
* Refresh feature has been added
* Speed has been increased
* Missing path error fixed
SoftPerfect Personal Firewall 1.4.1 Compatible with: Win9x, NT4, ME, Win2k, XP Filename: firewall_setup.exe Size: 927 kb Author: SoftPerfect Research More Details & Downloads
Description: SoftPerfect Personal Firewall is a free network firewall designed to protect your PC against attacks from the Internet or via a local area network. SoftPerfect Personal Firewall offers customizable security using user-defined rules for packet filtering. It works at a low level and also allows you to create rules based on non-IP protocols such as ARP.
SoftPerfect Personal Firewall supports multiple network adapter configurations. This allows you to apply a rule, for example, for just a modem connection or you could apply separate rules for each system interface. With a flexible filtering system, trusted MAC address checking feature and separate network adapter configuration you can even use it on a router or a server.
SoftPerfect Personal Firewall has a learning mode, which prompts you for required actions when it detects an unknown packet. This helps you to create customized rules quickly. The program is easy to use, comes with a set of predefined rules and it is completely free. Additional features include password protection, logging and more.
Description: Choose from 45 types of encryption methods. Use these methods with keys you create to keep your data safe. Encrypt any sort of file up to 4 Gb in size. If you need it to be confidential simply 'mash' it. Chaos Mash does not require installation, simply copy it to the hard drive or a removable USB device and run it from that location.
Packman - Package Manager 2.0 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: PackMan.exe Size: 335 kb Author: United Business Technologies More Details & Downloads
Description: Encryption for email and attachments, or store private files on public servers. PackMan (Package Manager) stores files within it's own compressed and ciphered file format. Integrates well with outlook or other windows mail clients to provide security and sender authentication.
Advanced File Security 3.0 Basic Compatible with: Win9x/NT4/ME/Win2k/XP Filename: AFS3_Setup_eng.exe Size: 646 kb Author: Eric P�rsel More Details & Downloads
Description: AFS securely and reliably protects any type of data against unauthorized access.
Therefore it's using the world-wide standardized, fast and very safe encryption algorihm AES.
Very simple to use. Only a user password is required for encrypting files or folders.
AFS is usable with all kind of storage types, for example: hard-drives, CD/DVD, USB Sticks. But also usable for secure data transfer via eMail.
No Ads, no Spyware, no Trial.
AS3 Personal Firewall 1.1 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: as3PF_1_1.exe Size: 395 kb Author: AS3 Soft4U More Details & Downloads
Description: AS3 Personal Firewall is device designed to prevent outsiders from accessing your network. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy.
This is advanced easy to use software with ability to watch for all ports on your system without listening. Activity provides a real-time view of the open connections through the firewall. The rules editor is used to define a security policy where connections requests from unauthorized ip addresses and ports are rejected. The log viewer provides data connection notes that can be used for prosecuting the potential attackers.
Use the rules editor to specify the destination and service for each rule with the required action. For example, if you don't want someone connecting to your network, you can bar his access by blocking connection request from his ip address or port number. On his end, he see a message that responds 'Connection failed' or 'Connection terminated'.
Once defined the firewall provides control of how the policy is distributed to all TCP connections through your network.
PC Security Test 2005 3.3 Compatible with: Win9x/ME/Win2k/XP Filename: pcsecuritytest.zip Size: 603 kb Author: AxBx More Details & Downloads
Description: PC Security Test is a free program for Windows that checks computer security against viruses, spyware and hackers.
With a few mouse clicks, users can easily control the efficiency of their protection software (anti-virus programs, spyware scanners and firewalls).
PC Security Test simulates virus, spyware and hacking attacks and monitors the responses of your protection software. Don't worry, no real viruses are involved ! After the tests are complete, PC Securtiy computes a security index and provides tips on improving PC security.
Jetico Personal Firewall 1.0.1.47 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: jpfwall.exe Size: 2617 kb Author: Jetico. Inc. More Details & Downloads
Description: Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside
as well as from malicious programs 'living' secretly inside your computer's memory and hard drive.
Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity.
Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not.
With Jetico Personal Firewall you feel secure, safe and protected while enjoying all Internet activities.
Emsa EZ Encryption Tool 1.0.46 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: SetupEzEncryptionN.zip Size: 574 kb Author: EMSA SYSTEMS LTD More Details & Downloads
Description: EMSA EZ Encryption Tool is a simple encryption program for Windows. This program uses the Blowfish algorithm to encrypt files or text chunks. This algorithm is a strong encryption algorithm using a private key, therefore keeping your data safe from prying eyes.
In order to encrypt files, the user must click on the 'Encrypt File' button which will select the input plain file and the path to save the encrypted output file. To decrypt files, the user must click on the 'Decrypt File' button which will select the input ecncrypted file and the path to save the decrypted output file.
To encrypt text, the input text should be copied into the top textbox, then using the 'Encrypt & Encode Text' button the text will be encrypted. This procedure also encodes the resulting text using the standard Base64 encoding, because the result of encryption is not text but binary data and therefore it cannot be copied safely into documents, and the Base64 encoding ensures that all binary data is converted into a text format which can be copied into other documents. The program also provides standard Base64 encoding and decoding as a separate function.
This program is Freeware.
Description: Safest File Encryption system that use an innovative fast, secure and easy way to protect your most important documents, files, productions etc. Fully integrated in windows shell, easy to use, practically uncrackable. Just right click the files you want to encrypt on windows explorer and you will get a file that nobody knows about its content. Then you can decrypt using the same password, getting the precisly same original file. The level of protection does not depend on the length of the password chosen, but the protection is always highest. If you loose your password, you can get the original file back, contacting the author.
BCArchive 1.02 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: bcarchive.exe Size: 2399 kb Author: Jetico. Inc. More Details & Downloads
Description: With BCArchive software you may encrypt and compress a group of files/folders
to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your files, either via knowing correct password or via using public/secret key technology.
All already generated public and secret keys used in other programs can be also used in BCArchive to create encrypted archive and e-mail it to desired recipient. BCArchive uses strong symmetric encryption algorithms such as Blowfish, IDEA, Triple-DES, CAST5; secure hash algorithms: SHA-1, MD5, RIPEMD-160; asymmetric (public/secret key) algorithms such as RSA, ELGamal/Diffie-Hellman; conforms to specifications PKCS #5, PKCS #12, X.509. BCArchive is convenient software product providing you with strongest encryption technology and ability for efficient management of sensitive data.
Naomi Family-Safe internet 1.5 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: setup-en.exe Size: 990 kb Author: Radiant tech. More Details & Downloads
Description: Naomi 1.5 is an advanced internet filtering program, easy to use and totally FREE, intended for families in particular. Monitoring is not limited to web sites, but covers the whole local internet traffic, protecting your children and you from inappropriate online material.
Description: StopListening can conveniently close down all TCP/IP ports open by default on a Windows box, thus hardening the system against worm attacks. Not a firewall per se, provides an additional layer of security nonetheless.
Description: The program blocks spyware and adware from infecting your PC, and eliminates pop-up ads. It can clean cookies, temporary Internet files, and recent and history files. You can get your local weather information on the toolbar and search the Internet from any Web page. You can search Google, Yahoo, MSN, AOL, and Lycos, with a click of the mouse directly from the toolbar.
PlainText Crypto v1.1 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: ptcsetup.exe Size: 613 kb Author: David Green More Details & Downloads
Description: This program lets you encrypt your text files into a sequence of digits. To encode and decode some text, the special key files are used. Every key file is unique and cannot be generated again. The encoded text cannot be restored without having a key file that had been used for encoding. This software may be also helpful for those who need to send secured texts via email. The encryption algorithm is stable against breaking and encoded texts are effectively protected.
Description: TrueCrypt is a free open-source on-the-fly encryption software for Windows XP/2000/2003.
It can encrypt partitions/devices or create virtual encrypted disks within files.
The only free open-source on-the-fly encryption software that fully supports Windows XP.
The only free open-source OTFE software for Windows XP that provides plausible deniability.
BHODemon 2.0 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: BHODemon20Setup.exe Size: 1383 kb Author: Definitive Solutions. Inc. More Details & Downloads
Description: BHODemon is a guardian for your Internet browser: it protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. BHODemon is free, runs in the 'tray' area, and works on Windows 95, Windows 98, Windows 98SE, Windows ME, Windows NT4, Windows 2000, and Windows XP.
Description: BitCrypt Free is a sophisticated tool allowing for encryption of
plain text within bitmap image. What it does is to modify
the individual pixel shadings of the image, and in this way to
incorporate the information related to the text being encrypted.
The modifications of the image are so small that the effect is not
perceptible to the human eye.
Description: It generates random passwords. From this version you can specify a mask for your passwords.The options are : 'l' -lowercase ,'u' -uppercase , 'n' -numeric , 's' -symbols , 'e' -extended , 'x' -any of the selected types of characters and 'a','b','c','d' for use characters from your 4 custom strings. You also have the option to put a static text in every password.Example for mask : '(pass+)ns' - every password will begin with 'pass+' - pass+2!, pass+9@ etc.
WyvernWorks Firewall 5.2 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: firewall.exe Size: 2.64 mb Author: WyvernWorks Dot Com More Details & Downloads
Description: Firewall is our premier solution for intrusion detection and prevention. It will definitely put your mind at ease. It�s fully configurable to maximize security without restricting your surfing habits. It works safely and securely with all connection types and ISPs!
What clearly sets Firewall apart from other commercially available firewalls is its unique ability to prevent internal attacks caused by Trojans! Firewall detects and prevents any unauthorized program on your computer from accessing the Internet without your permission!
BartWare Personal Firewall 2.0.4 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: BartWare.exe Size: 6 mb Author: BartWare More Details & Downloads
Description: BartWare Personal Firewall 2.x is a new firewall that also deletes spam from POP3 servers, and replaces bad words. Version 2.x is a newly improved version with a new layout and custom skin support. You can set which programs you want to allow or disallow to go on the Internet. Whenever an unknown program tries to connect, the program will be paused untill the user takes action.
Description: Now Directory Folder Security 4 final release, After an email from certain parties complaining that the Log.Txt was easy access for anyone to look at, so at first it was desided to make the log.Txt into Log.log or whatever but some people are unaware of how to view a .log hense a File Shredder was built into the program which you can now Delete for good the Log.Txt file or any file for that matter, also modified is the key logging which controls the log.Txt now you have to place the password in to run it and also it does'nt run when the program starts up. This new version gives all the same protection as 1 and 2, 3 secures-locks any folder, accept in this case a 'File Shredder' has been added and it does'nt start logging until you ask to Run/View Logs, default username and password if asked are 'me,me' no quotes.
Note: The user.info has to be cut then pasted unto a floppy, the floppy becomes the 'KEY' before the program will run other wise an error warning will come into view.
Description: PeerGuardian is a powerful yet petite firewall application especially designed for P2P users and anyone else who wants to protect his or her computer from unauthorized searches instigated by private agencies and corporations.
PeerGuardian works by blocking and logging all TCP/IP connections to and from known IP ranges used by known P2P foes, such as the RIAA, MPAA, MediaForce, MediaDefender, BaySTP, Ranger, OverPeer, NetPD, and more.
To make sure that the block-list used to block malicious connections is up to date; PeerGuardian uses an on-line block-list Database that is continuously updated on a daily basis -- so your privacy will remain safe while swapping files.
PeerGuardian is compatible with all TCP/IP based file sharing applications, such as Kazaa, iMesh, LimeWire, eMule, Grokster, DC++, Shareaza, and more. In short, PeerGuardian is the must have tool for any file swapper.
PeerGuardian is not advertising supported, nor does it require registration, and no information is collected from or about product users.
File Sharing Sentinel 1.0.0 Compatible with: Win9x/Win2k/XP Filename: File_Sharing_Sentinel.exe Size: 322 kb Author: Keith Torrence More Details & Downloads
Description: File Sharing Sentinel is one of the best free Parental Control software on the market. It is designed to block file sharing software such as Kazaa, Morpheus, Bearshare, etc.
Protect your children from predators lurking in file sharing networks, also prevent them from being exposed to thousands of pornographic files.
File sharing can be costly, the music industry is suing users of file sharing software for copyright infringement.
The RIAA is becoming very aggressive in taking legal action against file swappers, which includes large fines.
Computer viruses found on file sharing networks can damage or destroy your computer. Often they are disguised as mp3 files, computer games, etc.
.
File Sharing Sentinel prevents spyware from installing on your computer. Spyware can cause your computer to run slow. Some spyware monitors your surfing habits and reports back to advertisers who produce popup ads.
ò Blocks the installation of File Sharing Software.
ò Prevents the operation of P2P Software.
ò Provides password protection.
ò Stealth mode on demand.
ò Very user friendly!
ò Free for personal use!
ò Free online updates!
ò No trial time limits or banner-ads
ò And many other features.
System Security Suite 1.04 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: 3ssetup104.zip Size: 268 kb Author: Igor Shpak More Details & Downloads
Description: System Security Suite (3S) is the program to remove internet tracks and junk files from your computer. It allows you to delete Cookies, clear Internet Explorer Cache, delete index.dat Files, clear Typed URLs, Windows Temp Folder and much more. You can also specify custom folder locations with file masks, which will be cleaned in addition to the selected items. In addition, the program allows you to view and optionally remove programs that launch automatically at Windows startup.
Description: The latest release of ImageHide, Stenography for the masses.
this new release has better encryption RC_4, plus SHA hashed passwords,
ImageHide now knows what version it is viewing , ver1 / ver 2, and if it is encrypted or not , if so the decryption box will auto open.
FireLogXP v1.12 Compatible with: XP Filename: FireLogXP_Setup.zip Size: 616 kb Author: MJLSoftware More Details & Downloads
Description: This is a simple program for people using the Internet Connection Firewall (ICF) in Windows XP. It will read the log file and show you who is trying to get into your computer, and through which ports. The data can be filtered to include/exclude protocols, connection types, and TCP flags. It includes connections to on-line resources to give you more information on what a specific port is for and how it may be being exploited.
XP-AntiSpy 3.73 Compatible with: XP Filename: xp-AntiSpy-setup_en.exe Size: 68 kb Author: Chris Connell More Details & Downloads
Description: XP-AntiSpy is a little utility that let's you disable some built-in update and authetication 'features' in WindowsXP.
For example, there's a service running in the background wich is called 'Automatic Updates'. I don't know what this service transfers from my machine to other machines on the internet, especially the MS ones. So I play it safe and disable such functions. If you like, you can even disable these function manually, by going through the System and checking or unchecking some checkboxes. This will take you approximately half an hour. But why wasting time when a little neat utility can do the same in 1 minute? This utility was successfully tested by lots of users, and was found to disable all the known 'Suspicious' Functions in WindowsXP
EasyEncrypt v1.0 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: easyencrypt.zip Size: 30 kb Author: Kevin Hu More Details & Downloads
Description: EasyEncrypt is a file encryption and decryption program that uses Secret-Key Encryption. Specifically, EasyEncrypt uses the Rijndael algorithm along with SHA384Managed Hashing algorithm to generate a secure key. Not inteded for encrypting large amounts of files.
Requires the Microsoft .NET Framework
Description: Intrusion Catcher 2.1
Now looking better than before with extras
Monitors Ports looking out for Intrusions,
Trojans etc Alerts you if any Attempt is made. User can Block IP Numbers etc
Now you can Look Up the IP Number
[ Who Is Server ]
New Looks and New Feature test your own Ports.
CompuSec PC Security Suite 4.15 Compatible with: NT4/Win2k/XP Filename: CompuSec_English.zip Size: 6.11 mb Author: CE-Infosys Pte Ltd More Details & Downloads
Description: CompuSec is a security software designed to protect desktops and notebooks. It uses pre-boot authentication, single-sign-on for windows Logon, full hard disk encryption, encryption of floppy diskettes and other removable media. This software is a full version without any limitations. It is not a demo or trial version.
Pre-boot Access Control in CompuSec requires you to enter your userID and password before the system will boot up. Once authentication is completed, CompuSec will automatically log you into the windows environment and provide a screen saver lock as well.
Full Hard Disk Encryption keeps your data secret. The encryption uses AES as the standard algorithm. The intelligent program uses ensures fast encryption speeds that will minimize any effect on your work.
Encryption of Floppy Disk and other removable media allows users to secure their data when transferring files between their CompuSec protected PCs. This feature will ensure that all files are encrypted and only accessible by authorized users.
CompuSec is the entry-level version from CE-Infosys. The high-end model features e-Identity (a secured electronic identity via a smart card or USB token) that will complement your password and store your digital certificates, providing strong two-factor authentication and access control. CompuSec with e-Identity also features file and folder encryption for file servers or local drives, plus IP encryption. CompuSec (freeware) can be upgraded at any time.
Description: BOLTLOCK is a powerful, small, relatively fast and compact command line encryption tool. Quickly, from the command line, encode or decode ascii or binary files using a password chosen by you. BOLTLOCK 3.0 beta now supports STENOGRAPHY capabilites. You can add or extract messages, files, or programs from gif and jpeg image files (other image file types may also be compatible). The best part: it's free of course! BOLTLOCK encrypted files are very resilient and much effort must be taken to even make a bruteforce attack possible .
Description: bmpPacker is a FREEWARE encrypting-/decrypting software tool which uses a very common graphic file format as a data container. The resulting file is a bitmap file which is 100% compatible to the Windows BMP format. But the only chance to decode (& optional decrypt) these files is if you use bmpPacker. Implemented cipher algorythms are : Blowfish, Twofish & Rijndael
Description: Scrub is a secure file remover. This version exceeds U.S. Government recommendations for the number of passes needed to make a file unrecoverable.
Description: XORrior is a file encryption system using the simple - but, if used properly, powerful - XOR operator. If you use a (truly) random key file which is at least as big as the source file, the XOR encryption will be unbreakable. You can obtain truly random files by, for example, recording radio noise with your soundcard. XORrior can encrypt Gigabyte-sized files in a few minutes on a modern computer.
Description: Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly.
Description: Let's face it, in the real world many people simply aren't willing to buy and install a specific encryption package just to be able to read a couple of files you send them. With iOpus Secure Email Attachments (SEA) they don't have to, because you can send them self-decrypting archives that 'unpack' themselves. The recipient just double clicks on the file and enters the password at the prompt displayed. The original files are then decrypted, extracted and written to your disk automatically.
In just a few moments, you can create an encrypted, compressed (ZIP) attachment with your sensitive documents. Ideal for sending information by email or making secure backups. Thanks to compression, iOpus SEA packages are up to 95 % smaller than the original files, saving time and money for e-mail transmission. The recipient requires no special software, because iOpus SEA packages decode themselves after the password is entered.
If desired, your company logo, a custom message, and a link to your home page can be displayed: the perfect combination of branding and security. In addition, your disclaimer may be displayed: your client has to accept it before decrypting the iOpus SEA package.
iOpus SEA uses the Blowfish encryption algorithm with a key length of up to 448 bits. Blowfish encryption is so strong that it has never been cracked yet. In fact, most experts agree that it cannot be cracked with current computer technology and that includes supercomputers!
Your time is not worth waiting for your computer to do what you want him to do. iOpus SEA is very fast. Encrypting or decrypting a file hardly takes any longer than copying it.
iOpus SEA protects your data not only on its way across the internet, but also on the recipient's PC.
MaxCrypt v1.10 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: MaxCrypt_v1.10.exe Size: 1.1 mb Author: KinoCode. Inc. More Details & Downloads
Description: KinoCode is proud to introduce MaxCrypt!! The only real encryption option for your computer. Automated computer encryption is finally here. You no longer have to worry about snooping eyes. Selected files, folders, and even drives are automatically encrypted when the computer is shutdown and decrypted when you log in. Features: -Automated encryption and decryption Graphical user interface for adding files, folders, and drives to the user encryption list -AES (Advanced Encryption Standard) finalist 256-bit Twofish encryption algorithm -Easy right click on-the-fly decrypting of files -Many more features...
Cleaner 1.1 Compatible with: Win9x/ME/Win2k/XP Filename: cleaner.zip Size: 153 kb Author: SoftComplete Development More Details & Downloads
Description: It is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible.
Description: ZoneAlarm is the award-winning PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. Shield your system with our proven, award-winning personal firewall. Keep hackers at bay with protection against worms, Trojans, spyware, and 46 types of malicious email attachments..
Description: StayOut locks your computer when you are not using it to prevent unauthorized access. To unlock the computer you must supply the correct password. StayOut will restart itself if there is a power outage or if someone resets your computer. StayOut now has screensaver support, so you can launch StayOut to secure your computer as your default screensaver!
Description: ICE Encrypt is a simple files/folder encrypting program. ICE Encrypt uses for encryption algorithm of the new generation - ICESafe. This is symmetric algorithm of encryption outperform all known symmetric block algorithms (DES, AES, BlowFish, GOST, ...):
1. The size of a key for encryption / decryption always is about 1 million bits
2. The size of the block is a true variable. It can has any length like: 64 bit, 72 bit, 80 bit, ..., 128 bit, 1024 bit, 2097152 bit, ... up to 17179869184 bits.
3. Theoretically is impossible to create faster block algorithm.
4. Brute force attack against ICESafe is not effective. It's difficult to crack key with size 1 million bits.
5. Easy to implement in hardware.
6. It is possible to make very fast parallel encryption / decryption.
N-Krypt 1.0 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: N-Krypt.zip Size: 9.40 kb Author: Perception:Reality Web Design More Details & Downloads
Description: N-Krypt is a freeware, effective text encryption program. It allows a user to enter any amount of characters, which can then be encrypted. The other user can then easily decrypt the message. It is fast, free, and small.
Note: Visual Basic 6.0 SP5 Run-times are needed for this. Windows XP (Home or Pro) users already have this, do not worry about it.
It can be downloaded from http://download.microsoft.com/download/vb60pro/Redist/sp5/WIN98Me/EN-US/vbrun60sp5.exe
AxCrypt 1.4 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: AxCrypt-1.4.exe Size: 230 kb Author: Axon Data More Details & Downloads
Description: AxCrypt is a file encryption program for Windows 95/98/ME/NT/2K/XP using the AES algorithm with 128-bit keys.
It combines strong symmetric encryption with compression (if needed) and double-click editing/viewing.
Encrypted files have a '.axx' extension added to their names, and are shown with a new icon.
To encrypt a file, right-click it in Windows Explorer and select 'AxCrypt | Encrypt'.
To edit or view an encrypted file - just double-click it.
To decrypt, right-click and select 'AxCrypt | Decrypt' instead.
No configuration is necessary. Run the installer, and AxCrypt is ready to use.
English, German, French, Spanish, Italian or Swedish will be used for messages and dialogues depending on the language of the system. Documentation (this document) and installation scripts are in English.
UNIQUE FEATURES
The following are features that really set it apart from all other file encryption tools, commercial as well as free:
- Double-click to edit/view with any application, with automatic re-encryption when done.
- Extensive command-line interface for scripting and programming.
- 6 languages in one executable distribution.
- Absolutely no user configuration necessary or possible before use.
- Free and Open Source under GNU GPL.
ClipSecure 1.1 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: clipsecure11.zip Size: 330 kb Author: Andrew Ferguson More Details & Downloads
Description: ClipSecure is an all-purpose, simple, secure, on-the-fly text encryption utility, and is ideal for easy encryption of plain-text email. It works via the Windows clipboard, so you can use it with any text-based program (including web browsers). Many encryption algorithms to choose from, including AES (Rijndael).
Hide In Picture 2.1 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: hip21_en_nogif.zip Size: 367 kb Author: Davi Figueiredo More Details & Downloads
Description: Hide In Picture is a steganography program. It allows you to 'hide' any kind of file inside standard bitmap pictures. The pictures look like normal images, so people will not suspect anything when they see them. You can use a password to hide your files, and only those who know the password used are able to retrieve them - without it, people cannot even be sure there is something hidden in an image.
Description: This program is intended to protect the valuable information from unauthorized access. The protection is performed by encrypting the data, contained in the files. Instead of using a password, Signature Cryptographer uses the key-files for encryption. In that way, the length of the password may amount to the huge sizes (or even exceed the length of the input file, making the encrypted file theoretically unbreakable).
The program's encryption algorithm is based on the Signature encryption algorithm, fully described in the online help system.
To receive any additional information, feel free to ask your questions in Binary Insight Software support forums.
Description: GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden information. In order to keep the final file size a low as possible, GRL RealHidden gives you the option of compressing the hidden file.
Description: FileVault is a revolutionary file protection program that allows you to lock out personal files on your hard drive with a password. For each protected file, you have the choice of read-only or full-open protection. New in this release, FileVault has a DOD file shredder, system lock, stealth mode, and stronger file security. You can protect your files through an open-dialog box, or by dragging and dropping files. An extensive help system is included.
Kerio Personal Firewall 2.1.4 Compatible with: Win9x/NT4/ME/Win2k/XP Filename: kerio-pf-214-en-win.exe Size: 2,0 mb Author: Kerio Technonlogies More Details & Downloads
Description: Great personal firewall that won't slow your computor down. Automatic stealth mode renders the desktop invisible to potential intruders. MD5 signature verification protects the computer from Trojan horses spoofing as trusted programs. Free for personal use. Easy to use. Try it!
Description: Scrambler is a free 92 bit encryption/decryption program, capable of providing resonable security for your secrets. Actually, itÆs based on matrix multiplication - if you know the elements of the matrix, you can invert the operation. In any other case, you can not. Unless you want to do it by trial and error and go through roughly 5 billion billion billion different key combinations.
Description: A tiny, but powerful firewall on one single floppy. This is a Windows-program which will ask you for any needed information, like username and password, and then create a ready-to-go floppy. The floppy can then be booted on any old PC to turn it into a no-fuzz firewall for your broadband connection. v1.1 now supports DHCP-, PPPoe-, and fixed IP-connections, as well as downloads of the latest firewall updates on install time. An alpha DHCP-server for your internal network is included. The firewall itself is a tiny Linux-distribution called FloppyFW
Eraser 5.2.1 Compatible with: Win9x/NT4/ME/Win2k Filename: eraser52.zip Size: 751 kb Author: Sami Tolvanen More Details & Downloads
Description: Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
System Lock 1.2.1 Compatible with: Win9x/ME Filename: syslock.exe Size: 194 kb Author: r2 studios More Details & Downloads
Description: System Lock allows you to lock your desktop so that no other users may use your computer. Windows NT/2000 already comes with this capability, but what about Windows 95, 98 & ME?
System Lock contains numerous Options for security and appearance. It also has a unique protection system in that, if your computer is restarted or a power failure causes your machine to reboot, System Lock will automatically lock the system on restarting, so that you computer will remain locked. This option is of course only an option, and every user may not need this option.
Upon System Lock Launching it will automatically minimize into the System Tray, ready for activation. If you simply double click on the icon, it will lock the system for you. Right clicking on it will bring up a context menu allowing you to open the prefrences Dialog, or Unload it from memory.
If you add the paramater '/QUICKLOCK' without the quotes to the end of your shortcut, System Lock will lock straight away and when the correct password is entered it will unload itself from memory.
Description: CipherBox Zap is an easy to use encryption tool which uses 2048 bit RC4 encryption algorithm which allows a folder to be dragged into the main window, and the contents of that folder will be encrypted into one file.