Active File Recovery is a tool for recovering files from formatted disks, deleted partitions or files which have been removed from the Recycle Bin. It provides excellent chances of getting your data back intact, particularly if you use it soon after losing the files. The latest version introduces a number of improvements, including a 64-bit executable, faster scan times and more file signatures.
Remove PowerPoint Password to Modify instantly removes any password to modify from MS PowerPoint 2007 presentation files. Passwords to modify of any length and character set are supported and removed in seconds. The software supports MS PowerPoint 2007 PPTX, PPTM, PPSX, PPSM, POTX and POTM file formats.
Norton Ghost is a tool for creating backups of your entire hard-drive that can be recovered any time, for example in the case of moving to a new system or a hardware failure. Backups can include either single files and folders, or entire partitions or drives. Norton Ghost offers incremental and differential backups that can be scheduled to run on a regular basis, e.g. at every system start or on an hourly/daily/weekly basis. Besides hard-drives and disks (CD/DVD/Blue Ray), Norton Ghost also supports Iomega Zip and Jaz, NAS, FTP, network drives and other local and remote storage. Encryption, compression, integration of Google Desktop Search and remote management are additional features that make Norton Ghost a powerful and safe backup software.
New on version 11 Gravity The 11th version of Cobian Backup is now out. (See also the whole release history) Welcome to the new version: Cobian Backup 11, Gravity AES encryption (128, 192 and 256 bits) The directories Settings, Logs and DB can now be configured manually A task has now the Priority field A new scheduled type is added: On startup A new scheduled type was added: On first Monday, On third Tuesday, etc... Now you can limit the number of Differential backups as well Now you can select a fixed day of the week to make an incremental or differential backup Full The program can now automatically delete old files Suspend and Hibernate are now Events Sources and Destinations can now be sorted "As Explorer" Delete empty directories is now a Task property A LOT of new parameters can now be used (see the help file) The task list can now be divided and organized in groups Inclusions and Exclusions can now be arranged The Deleter can now delete multiple sources The Safe Mirror directory keeps now the original directory structure You can now link tasks as an event The installer is now improved The application can now be closed from every possible desktop Old encryption methods are now deprecated The decryptor and decompressor accept now multiple sources The decryptor and the decompressor accept command line arguments The program checks the existence of the destination file even when using the attribute method Counting files can now be paused or canceled The body of the mail is now configurable The Remote Manager is fully rewriten and can now show the progress of the remote client The Remote Manager can now get the FULL log file of the client Restart and Shutdown work now even with impersonation Missed backups don't restart or shutdown the machine now if that event is present And a LOT more
A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments, providing true security risk intelligence. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering.
All-in-One Internet Security for Windows x64 bit ESET Smart Security 6 for Windows x64 bit is an all-in-one Internet Security solution for Windows x64 bit with new Anti-theft feature that locates your missing laptop and gives you tools to help recover it. Personal Firewall and Anti-Phishing keep your data safe from identity theft and other scams. Secure your computer and your assets How many personal photos, tax returns and private emails are stored on your computer? Our comprehensive Anti-theft features, accessed via the web, help you locate your misplaced laptop on a map using Wi-Fi®, block access to your files and turn on its webcam so you can identify the thief. Location Tracking • Lets you mark a device as missing via ESET Account Web interface • Initiates automatic monitoring of activity • Displays position on a map based on the Wi-Fi networks in range when it comes online • Allows you to access the gathered information via ESET Anti-theft at my.eset.com Laptop Activity Watch • Allows you to watch thieves via built-in camera • Collects snapshots of the missing laptop's screen • Saves all recent photos and snapshots to your account at my.eset.com Anti-theft Diagnostics • Offers a simple setup process and configuration options • Helps you increase the level of security by prompting you to modify key system settings • Optimizes Anti-theft settings, makes it easy to configure Windows auto-login and account passwords One-way Messaging • Allows you to send a one-way message to your missing laptop to increase the chance of its retrieval Safeguard your online identity Your identity can’t be more personal—or more important. Powerful firewall, removable media and Anti-Phishing security features protect you against criminals trying to steal your personal information through online scams, hacking or by physically plugging a USB thumb drive into your computer and taking files. Personal Firewall • Prevents hackers from accessing your computer and taking advantage of your personal data Removable Media Control • Allows you to block unknown CDs, DVDs, USBs and other media • Prevents unauthorized copying of your private data to external devices Anti-Phishing • Prevents fake websites masquerading as trustworthy ones from acquiring your personal information Out-of-Home Network • Provides stricter protection when connected to unknown networks • Keeps you invisible to other computers while connected to public Wi-Fi® Surf the web with confidence The time tested NOD32 technology in ESET Smart Security lets you enjoy your technologies to the fullest. The solution eliminates all types of threats, including viruses, rootkits, worms and spyware. Cloud-powered scanning delivers a higher level of protection, speeding up scans and ensuring that your computer runs at its best. Antivirus and Antispyware • Provides proactive protection against all online and offline threats, including viruses, worms, Trojans and other malware Cloud-powered Scanning • Ensures a faster scanning process that uses our online file reputation database for whitelisting safe files Scanning During File Downloads • Decreases scanning time by initiating scan during file download Host-based Intrusion Prevention System (HIPS) • Acts as a firewall to your application and blocks unauthorized changes to programs Small System Footprint • Maintains high performance and extends the lifetime of your hardware • Save Internet bandwidth through extremely small update packages
ODIN is a utility for easy backup of hard drive volumes or complete hard drives under Windows. A disk image can be created or restored. Only used clusters can be backuped, compression on the fly is possible. It runs under 32-Bit Windows Operating Systems. How many hours did you spend in setting up your Windows system? Setting up the operating system, installing programs, customizing to your personal needs. Do you want to be protected against hard disk failures, viruses or other malware? Just restore your system within minutes. Why spend money for a commercial solution? ODIN supports snapshots can be run from command line or with a GUI and runs on 32-Bit and 46-Bit operating systems. ODIN can be run in two modes, either with a GUI or from a console as command line application. All options and functions are available from command line. See -usage for details. The command line application is started as ODINC.exe. The GUI application is started as ODIN.exe without any command line parameter. The console mode is for example useful for automated tasks running from scripts. Important note : To use from the command line under Vista or higher (with User Account Control enabled) start the console as Adminstrator! The 64-Bit version now allows to make snapshots on 64-Bit operating systems. Due to Windows limitations this was not possible before with a 32-Bit application running on a 64-Bit Windows. Features Backup/restore of volume or complete hard disk Backup used blocks or all blocks Compress data on backup Verify backup image files for damages Support of all Windows file systems Split image files to chunks (e.g. for burning to CD/DVD) Does not require installation, just start odin.exe Can be run from USB stick Supports Windows PE (Win7 recovery, BartPe, etc.) Use multiple CPUs Snapshots of volumes Command Line interface 64-Bit version available
Bad Crystal is unique utility for clean your screen from stuck pixels, burn-in and stuck stripes. Launch Bad Crystal for a few minutes, and your screen will be clean. Innovation algorithm and high technology are using in Bad Crystal can repair 90,7% of defect LCD screen within few minutes or your money back.
The recommendations given concerning disinfection of a computer from Virus.Win32.Sality should be applied only if NO Kaspersky Lab product is installed on an infected computer, and/ or if the computer is already infected and a Kaspersky Lab product cannot be installed by regular means. Kaspersky Lab experts also recommend using Rescue Disk to disinfect an infected computer. The SalityKiller.exe utility given in this article allows detecting and disinfecting only the following Sality modification Virus.Win32.Sality.aa, Virus.Win32.Sality.ag.
Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer. A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. This tool will help you remove these types of programs. Junkware Removal Tool has the ability to remove the following types of programs: Ask Toolbar Babylon Browser Manager Claro / iSearch Conduit Coupon Printer for Windows Crossrider DealPly Facemoods / Funmoods iLivid Iminent IncrediBar MyWebSearch Searchqu Web Assistant
Download without any pay this one of the best VCF to XLS Converter software which provides an easy way to import multiple vCard contacts into Excel. This VCF to XLS Converter program is a permission-based tool to convert vCard (2.1/3.0) contacts with contact picture into MS Excel 2010, 2007 and 2003 without any changes in your vCard contact details. Trial demo version 3.7 VCF to XLS Importer to import only 5 VCF files to Excel.
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Kaspersky anti-virus protects you from the Phishing and Malware sites that you wouldn't otherwise know were attempting to steal from you. At the same time, the Kaspersky Security Network allows your computer to report when it discovers a threat that hasn't been seen before. All 250 million Kaspersky users benefit from our combined knowledge! Kaspersky features include: Protects from viruses, Trojans, worms, spyware, adware Scans files, email, and internet traffic Protects Instant Messengers Protects From Unknown Threats Analyzes and closes Internet Explorer vulnerabilities Disables links to malware sites / phishing sites Global Threat Monitoring (Kaspersky Security Network) Blocks all types of keyloggers Automatic Database Updates Free Technical Support Note: This is a 30-day commercial trial.