Identity Cloaker is an application created to help you hide yor identity when navigating online. It's also important to note that free proxy servers are not usually free at all. In most situations the administrators of the physical server computers do not even know they are running a proxy server.
Simple-to-use and easy-to-install, LightLogger runs undetected by most users, recording keystrokes in any web page or program, plus web sites visited, clipboard clips, and applications opened. LightLogger can even take screen shots at intervals and file sizes you choose. Only a customizable hot-key combination and password permit access to LightLogger and its logs.
Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
Encrypto is designed to assist users in securing files and directories. No password is stored within the item and, once protected, the only method of unlocking it is by entering the passcode. Send encrypted files via email, Dropbox, file sharing service, carrier pigeon with USB stick — however you send them, your files are protected. It’s free for both Windows and Mac.
Appnimi Web Directory Buster is designed to let you search for files on a remote web directory. This program guarantees the most complicated filenames can also be retrieved. Appnimi Web Directory Buster allows to search for the files on the web directory.Features : * It is free and easy to use * Support Windows 98, ME, NT, 2000, XP, 2003, Vista and Win 7 Systems * Recovers file names otherwise not accessible due to improper linking.
CryptSync x64 is a small utility that synchronizes two folders while encrypting the contents in one folder. The program works with folder pairs, with the possibility of batch processing, thereby you can add several directories to the synchronization list. This benefits users of multiple backup services. By achieving this, the program allows you to upload and download only encrypted data to the cloud, thus protecting your privacy.
Jetico Personal FirewallTM software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.
PartLocker is a small free tool that will allow you to simply block access to the hard drive of your computer with a simple click and release them only through the same software, you need not remember a password or make complicated settings, you can be away from your PC maintaining your partitions safe from prying eyes.
A complete solution to wipe useless files and keep your computer privacy. Irretrievably deletes private records of your on- and off-line activities, such as temporary internet files, history, cookies, autocomplete forms and passwords, swap files, recently opened documents list, Explorer MRUs, temporary files, traces from more than 600 third-party applications, etc., and free up your disk space. A free fully functional 15-day trial version.
Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions system, form filling, portable mode, Web access. Crypt-o is a secure Client/Server solution for creating custom databases, which is designed for use in enterprise networks. The data is reliably stored in Firebird SQL Server database and encrypted using AES algorithm with 256-bit key.
Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you sure that you remember passwords for all of your files? Do you use passwords that are easy to recover? Are your important files as secure as you think? Get a free check of this. Full system scan usually takes under an hour and can be run in the background.