With over 3 million customers, Disconnect is the easiest way to protect your privacy on all of your devices. Disconnect protects you in 6 ways: Visualize Tracking - see who's following you Encrypted Internet - secure all of your online activity Safe Browsing - block 5000+ trackers Anonymous Search - search privately on Google, Bing, & more Location Control - defeat censorship Privacy Icons - easily decipher privacy policies
CyberGhost client software connects you with an online server via a so-called tunnel that transmits all data in encrypted form, currently giving you 100% protection from eavesdroppers. The Internet pages you visit only see the address of our VPN server, not your private IP address. In this way, you are ensured total anonymity.
To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
Small changes to either the pass phrase or password name result in radically different passwords. If a password is compromised the hacker would not be able to reverse-engineer your pass phrase or other passwords. Generated passwords should not be vulnerable to dictionary attacks.
This small free utility allows you to set protection to PDF documents. Especially it is useful in cases where there are no computer tools to work with pdf files. The program allows you to set passwords on the pdf document of two types: a user password and owner password. User password restricts access to a pdf file as a whole. Owner Password prohibits the manipulation of the individual document, for example, it can be to protect pdf from copying
Restore your PC to peak performance Speeds up your PC, cleans your hard drive and eliminates freezing and crashing. Boost your Internet speed Fine tune your PC’s Internet settings to maximize your speed online. Internet Optimizer Internet Optimizer evaluates your PC’s Internet connection settings such as Max MTU and RWIN then tweaks them to increase connection speed and decrease la ...
All-in-one Command-line Hash Password Recovery Tool
By deleting files/folders/drives with this program you can switch between 11 different erasing methods, and all of them overwrite your old file and rename it before removing so the only thing that could ever be recovered with an undeleting tool will be senseless data. As a special feature you can overwrite files you want to delete with another file too, so whenever someone tries to reverse the wiping, he only gets the things you want him recover.
BestCrypt Volume Encryption software is a new class of volume encryption products that allows users to encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices - for example Spanned, Striped, Mirrored or RAID-5 volumes.
OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN is not a web application proxy and does not operate through a web browser.
A port of the Firefox PasswordMaker plugin to a standalone Java application. The latest version is 0.6.0. A few of the wider screenshots below are blurry due to Google limiting the width of the page. The program itself does not blur.