Iron Key is a utility for encrypting your important files. The encrypted files can be safely sent over the Internet. The recipient receives a self-extracting executable which needs a password for proper decrypting. No software is needed to decrypt the fil
|
Øèôðîâàíèå
Do you need to know what is typed in your computer while you are not looking and you don‘t want to install a huge, shareware, spy program which totally hooks up systйm? This is where KeySpy comes in – a simple freeware utility, which scans for all ke
InTether technology allows a sender to securely distribute files without concern of unauthorized use and/or redistribution. InTether Receiver enables the viewing of InTether security technology packaged files.
SecureDoc is a program that could allow you to encrypt files. This program is compatible with the file manager and thhe user can encrypt files easily with just a click of the mouse.Features:Secure DOC uses the international standard for enc
Minimum 1024 bit encryption, with unrestricted keylength. Integrates into Explorer and most other win32 -programs. Stuffs files before crypting. Limited free support.
Encryptafile uses a user-submitted key to encrypt text into unreadable characters. This can then be transferred or posted so that only someone with the correct key can decrypt the text. Using the user-friendly interface, you can encrypt, decrypt, save and
The Adhaero Doc Reader allows users who receive Adhaero Doc protected documents, which are both encrypted and have digital rights applied to them, to read the documents without having the full Adhaero Doc document security software installed.The Reader
Softwrap is a complete digital marketing and distribution system that manages the entire buying and selling process of software. Softwrap is the worldÒ‘s first complete solution for software authors and distributors who wish to securely DISTRIBUTE and SEL
FileHash_light is a tiny, (371KB) executable that calculates the MD5 hash of binary filesystem objects. Use this freeware tool to verify that downloaded files are complete and have not been tampered.
dsCrypt is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced s
Home Keylogger is intended for interception and recording in a file of everything that is entered from the keyboard. Keylogger is able to work in the hidden mode and to emerge on pressing a combination of keys. Home Key Logger is able to present the recor
Free utility that shows you how easy it is for unauthorized persons to extract information about web-sites you have visited using Internet Explorer (images, web content, cookies etc, history). It shows exactly in which files it was saved on your hard driv
XCSC is a small freeware utility for calculating the checksum values of files. The supported algorithms include CRC32 (Cyclic Redundancy Code), MD5 (Message Digest number 5) and SHA-1 (Secure Hash Algorithm).
It allows you to trace the location of your lost or stolen computer and recover on the web. It includes free 3 years web-based lost/stolen computer tracing service. Recovery service and delivery-to-door services are optional. Web-based, real-time, worldwi
|