GiliSoft USB Stick Encryption is especially designed to create password protected USB memory sticks. It creates protected areas on the disk that is needed to enter password to see contents. Data on the protected areas are encypted by 256-bit AES on-the-fly encryption. Protected USB stick is fully autonomous and does not need any special software installed on computer.
The use of Password Tote allows you to secure your passwords, as well as ensure they are secure-to-use passwords. They will then be accessible from all your other computers and mobile devices.
How do you securely email a group of files? BCArchive for encrypted archive encrypts and compresses a group of files or folders into a secure archive. BCArchive is very simple yet very secure; just specify a password when creating the archive. To access and extract the data use enter the correct password. Passwords are no longer needed if you have your recipient’s public key; just choose your recipient's public key.
ZenVPN lets you access blocked or geo-restricted websites, protect your connection from snooping and conceal your real IP address from the sites you visit. We don't monitor your online activities, do not log and do not restrict them. The free version comes with a 250Mb/day bandwidth cap.
Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
Application for encryption and decryption of files with symmetric key. Features: * Encryption based on a chaotic pseudo-random generator. * Secure file deletion. * High speed. * Multi thread. * Multi-language. * Multi-platform. * GUI / Shell. * Documentation. * Open source. Requirements: * Java-8
Easy Folder Guard is a powerful application aiming to settle the problem of folder encryption and protection. It can quickly, simply and securely protect folders with various methods - password protect a folder, hide a folder and disguise a folder. In addition, it also provides some enhanced features to comprehensively protect the data on your computer, such as disk protection, unable use of USB devices and read-only use of USB devices and more.
The best tool to enumerate and fetch all stored Wi-Fi credentials., Created by Michael Haephrati, founder of Secured Globe, Inc. in New York. The Wi-Fi Credentials Viewer starts scanning any stored Wi-Fi networks credentials right after it starts. After less than a second, you should see a list of all credentials. When Wi-Fi Credentials Viewer starts, you should see a pop up message indicating the name of report .txt file generated.
Windows Firewall Control is a tool that provides fast access to the Windows Firewall settings and enhances functionality by letting you manage networking rules for each application. Windows Firewall Control is a handy application that enables you to render Windows Firewall more functional, by accessing its most used options with ease.
EventSentry is the proactive, real-time monitoring solution that watches over your servers, workstations and network devices to ensure maximum availability and that also helps with SOX, HIPAA and other compliance requirements. With EventSentry you can consolidate and monitor event logs and log files in real-time as well as monitor performance, disk space, services, processes and software/hardware installations on servers and workstations.
TunnelBear displays statistical data concerning the trackers (analytics, ads, scripts, social buttons on Facebook, Twitter and LinkedIn) blocked by the application during your browsing session. It features desktop notifications to let you know about important events, while the 'Vigilant mode' is capable of adjusting the security level.