MENU

recientemente se agregó  - 

Otro software de seguridad Descargue ahora el software de seguridad y aplicación gratuitamente. antivirus y antispyware
Pinterest Password Decryptor 5.0

Pinterest Password Decryptor 5.0 versión gratuita 3751 

Free Pinterest Login Password Recovery Software

Rohos Disk Encryption 2.0

Rohos Disk Encryption 2.0  3750 

Rohos Disk - program creates hidden and protected partitions on the computer or USB flash drive. Those who have megabytes of sensitive files and seriously concerned with data security, can not imagine their computer or USB drive without the hidden partition that is created using this wonderful tool.

KaKa Private Disk 4.01

KaKa Private Disk 4.01  3750 

Private Disk, an easy-to-use software to protect sensitive data on notebooks, personal computers, removable and flash disk. It is used for creating virtual disks on your computer. On this disk you can store confidential information which youd like to keep secret from other users. You only need to save files into this private disk and close them after that, then the program will protect the files automatically.

SecurityKISS Tunnel 0.3.2

SecurityKISS Tunnel 0.3.2 versión gratuita 3750 

SecurityKISS Tunnel is a handy, easy to use tool specially designed to ensure security and privacy once your data leaves your computer. SecurityKISS Tunnel redirects all your traffic through an impenetrable tunnel to our security gateway.

Hauberk Firewall 1.12

Hauberk Firewall 1.12 versión gratuita 3750 

Hauberk Firewall is a tiny firewall from Hauberk. All your network connections are under control. It controls all connections your applications request and you can control the launch of the applications. It has a Web filter which works with the white/black lists of keywords/websites. It also features convenient diagrams of the network activity and fantastic management ergonomics. Hauberk Firewall includes all necessary modes and options.

Teslacrypt Decryption Tool 1.0

Teslacrypt Decryption Tool 1.0 versión gratuita 3749 

TeslaCrypt malware encrypts the victim’s files such as photos, videos, documents, saved game files, and demands a ransom from the victim within a time limit. When the victim pays the ransom they can download a decryption key that will restore their files, otherwise the files are permanently lost.

ServerDefender VP 2.2.7

ServerDefender VP 2.2.7  3749 

ServerDefender Vulnerability Protection (VP) Web application firewall is a strong application designed to provide immediate PCI compliant protection for Web sites and applications running on the Microsoft IIS Web server by blocking Web attacks including buffer overflows, SQL injection, cross-site scripting (XSS) and request forgery (CSRF), zero-day, dictionary, brute force, denial of service and others.

SafeInCloud 20.3.2

SafeInCloud 20.3.2 versión gratuita 3748 

SafeInCloud Password Manager has a unique set of AWESOME FEATURES: Ease Of Use, Strong Encryption, Cloud Synchronization, Browser Integration, Cross-Platforming, Automatic Data Import, and Multi-Language Support. Safe In Cloud enables you to add personal notes by entering text messages in the primary panel or pasting data from other third-party utilities, as well as insert images from your computer.

Password Decryptor for Linkedin 7.0

Password Decryptor for Linkedin 7.0 versión gratuita 3744 

Linkedin Password Decryptor is the free all-in-one software to instantly recover Linkedin password from popular 30+ Web Browsers

SafeKuvert 1.0.2

SafeKuvert 1.0.2  3743 

SafeKuvert provides the user with the ability to encrypt, digitally sign, compress, and/or securely delete files from the hard disk. It uses the Public Key Infrastructure (PKI) built into Windows, standard X-509 certificates from any source including Active Directory, and support for AES, 3DES, DES, RC2, RC4 symmetrical encryption algorithms. The resulting encoded files are standard PKCS#7 messages saved in files with a ".pkcs7" extension.

AccessPatrol 4.2.0.6

AccessPatrol 4.2.0.6  3742 

Access Patrol provides a comprehensive solution for securing company devices to minimize unauthorized access to proprietary information. Also provides an effective method for power management. With a simple click of the mouse, computers can be remotely shutdown or booted. This function can also be scheduled to force a shutdown of the PCs at a specific time, e.g. after work hours, or schedule a boot of the PCs at the beginning of a work day.

11 from 1848

« First « Prev 1 2 ... 114 115 116 117 118 ... 167 168 Next » Last »

Las mejores aplicaciones para Otro software de seguridad Por los Editores

ctualmente no hay resultados