eMonit is a versatile new employee monitor that makes it easy for mid-size businesses to monitor employees' computer activity. eMonit sets up in minutes, configures easily, and provides graphic overviews as well as filterable details of activity on each monitored computer. eMonit logs keystrokes, captures web browsing activity in detail, records application-use history, and can even take screenshots at regular intervals.
The TRaNGen program is fully functional and comes with the built-in Microsoft Pseudo Random Number Generator (PRNG) and the Wichmann-Hill pseudo random number generator. If you need a True Random Number Generator (TRNG), the program can use the Araneus Alea I true random number generating device that plugs into a USB port.
Burn Protector can be installed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software provides easy-to-use network administration interface including auto discovery, auto scanning, reports, actions, exporting capabilities and database support.
This software offers a solution to users who want to protect sensitive data by encrypting files using a password. The user simply adds the required files or an entire folder before entering the password and choosing the option to encrypt or decrypt the chosen files. Using this time saving software, large numbers of files can be encrypted or decrypted with just one click.
Clean Slate is designed to protect public access computers from malicious or inexperienced users. While not restricting users' activities, Clean Slate will scour drives back to their original state upon reboot or log off.Clean Slate restores the computer to its original configuration discarding unwanted user changes: including erased files, installed software, downloaded spyware and adware, downloaded viruses and Trojan horses, and altered icons.
VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. It is Great tool for network administrators and webmasters to calculate file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2.
Command-line Tool to Scan and Show DEP enabled Processes
UkeySoft USB Encryption support password protect all kinds of removable storage drive like USB flash drives, Thumb Drives, Memory Sticks, Memory Cards, Pen Drives and Jump Drives. It can help you password lock photos, pictures, videos, information, files, folders and all kinds of documents on USB drive, making data on USB drives completely secured.
Kruptos 2 Professional is an easy to use encryption program that uses 256-bit encryption to password protect your private files and prevent them from being modified, read or even accessed without the correct password. With Kruptos 2 Professional you can password protect all your sensitive personal and commercial information including your photos, movies, credit card data, tax returns or any other private document.
WirelessKeyView recovers all wireless network keys (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.