Network Password Manager is a program created especially for the enterprise. It helps employees to safely store and use passwords within the company, manage passwords and set access rights. It also provides the reliable security using 256-bit AES encryption. It works in multi-user mode and creates a common environment. Support of Windows user groups is included. A clear, user-friendly interface considerably simplifies the installation process.
SplashID secures and backup your passwords, credit card numbers, registration codes and PINs. Never forget a username or password again. SplashID generates truly random passwords hackers cannot guess. Protect yourself from identity theft, keyloggers, and phishing.
SwfScan is a simple free SWF decompiler from HP's Web Security Research Group. Just open your chosen applet and it'll immediately be decompiled, allowing you to browse its code. If this is lengthy, then a search tool (with regular expression support) will help you to locate the details you need. Or you can export the code to a text file for analysis later.
Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space.
Any time you go online, people pay attention. Thieves want to steal your passwords and your private information. Companies want to see what you're buying so they can sell you more stuff. Even the government might be searching for suspicious activity. But privacy is still possible. With Avast SecureLine, you can turn yourself invisible to the prying eyes all around the net, allowing you to shop, bank, and work without a care.
The Password Gorilla helps you manage your logins. It stores all your user names and passwords, along with login information and other notes, in a securely encrypted file. A single “master password†is used to protect the file. This way, you only need to remember the single master password, instead of the many logins that you use.
EraseMaster allows you to clean your Internet history, cookies, cache, index.dat files, temp files, Windows search history, and more. EraseMaster completely cleans your system, ensuring your computer and Internet use cannot be revealed by anyone. It is very easy to use and performs all its cleaning tasks with just a single click of a button! Other features include plug-ins for popular applications, scheduled cleanups and running in stealth mode.
Secret messages is a software which is designed to encrypt your messages before you send them. If you would like to send message online, then you should not worry on how you can prevent unauthorized access to the messages. There are some people out there who are eager to hack your messaging account and read the information you are trying to send. The program generates encryption images which hide your message before you can send.
Omega DB Scanner Standalone is an out-of-box, software-only solution. This Standalone and Free Edition is a simple client-side solution that is deployed on the user's PC and easily scans the security posture of your Oracle database. Run the whole scan set on the target database, or just run a single vulnerability scan, the assessed result in both summary and full will give you a clear picture of the scanned items security configuration.
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks.
The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.