Recently Added  - 

Other Security software Download now Security software and application for free . antivirus and antispyware
PDF Postman 2.5.403

PDF Postman 2.5.403  4633 

PDF Postman addon for MS Outlook gives ou an easy way to send private email messages and files in a PDF file encrypted with strong AES-256 encryption. Since nearly eveyrone already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. PDF Postman Works across devices and platforms. It's easy for recipients! No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.

SpotAuditor 5.3.5

SpotAuditor 5.3.5  4631 

SpotAuditor is a feature-rich application that recovers passwords saved in various platforms, including Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Microsoft Outlook. SpotAuditor is an advanced password recovery software for recovering lost or forgotten passwords to more than +40 popular programs.

Password Dump for Gmail 6.0

Password Dump for Gmail 6.0 Free version 4631 

Command-line based Network Password Recovery Tool

Password Sniffer Console 3.0

Password Sniffer Console 3.0 Free version 4629 

All-in-one Console based Password Sniffer and Capture Tool

idoo Usb Encryption 4.4

idoo Usb Encryption 4.4  4628 

USB Encryption is quite a useful tool that can effectively protect the data stored on your USB memories. It allows you to create a secure and a public area on the storage devices, whose sizes can be easily adjusted according to your own needs. The secure area can only be accessed by inputting a correct password, while the public area need not. The encrypted USB memories can be used on any PC, and you need not to install any other program at all.

Faronics Core 4.11.2100.4008

Faronics Core 4.11.2100.4008  4628 

Faronics Core is a multi-tool for IT professionals. It’s a simple remote management tool that makes it easy to centrally manage your endpoints. Equipped with enterprise-level deployment and management capabilities that can be customized for your organization, Faronics Core will save you time and money. It’s hard to believe, but Faronics Core comes with all Faronics enterprise solutions – free of charge.

Hijack Hunter 1.8.4.1

Hijack Hunter 1.8.4.1 Free version 4628 

Hijack Hunter is an application that thoroughly scans your computer and displays all the gathered data in a comprehensive way. To help the users to detect suspicious system behaviors, our product shows all the needed information in a report file, taking care of all details, on running processes, registry startups keys, drivers installed, windows hijacks, browser helper objects and much more.

BestCrypt Container Encryption 9.04.02

BestCrypt Container Encryption 9.04.02  4627 

To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe

XOR Binary Data Uncrypter 0.5.3.0

XOR Binary Data Uncrypter 0.5.3.0 Free version 4626 

Xor Binary data unprotector by A.S.L. You can unprotect games data files crypted with xor byte. Extra added ROL , SHL , ADD , NOT , NEG , OR , MUL , DIV and XOR with external file crypto algorithm. Internal detector for files : zip , rar , 7z , exe , jpg , mp3 , xml , mp4 , MS cab files. Analysed files with external detector. Work fast and save unprotected data to disk. Nice GUI interfeace. You can use this tool if you need crypt data.

DEP Process Scanner 1.5

DEP Process Scanner 1.5 Free version 4625 

Command-line Tool to Scan and Show DEP enabled Processes

JRecoverer for Linux Passwords 1.1.1

JRecoverer for Linux Passwords 1.1.1  4624 

Audit and recovery of Linux passwords. Account information import over SSH, from a shadow file. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

11 from 1848

« First « Prev 1 2 ... 96 97 98 99 100 ... 167 168 Next » Last »

Best Apps for Other Security software From the Editors

There are currently no results