recientemente se agregó  - 

Otro software de seguridad Descargue ahora el software de seguridad y aplicación gratuitamente. antivirus y antispyware
CrococryptMirror Portable 1.43

CrococryptMirror Portable 1.43 versión gratuita 3518 

CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.

USB Safeguard 8.3

USB Safeguard 8.3  3517 

USB Safeguard is a portable software that allows you to protect your private files with a password on your removable drive using the secure AES 256 bits key. It protects data by creating a password-protected virtual drive on your portable storage device (USB flash drive, HDD hard drive, SSD, memory card). Once setted, no one will be able to access your private files without the correct password!

PasswordMaker for Windows 0.7.2

PasswordMaker for Windows 0.7.2 versión gratuita 3516 

A port of the Firefox PasswordMaker plugin to a standalone Java application. The latest version is 0.6.0. A few of the wider screenshots below are blurry due to Google limiting the width of the page. The program itself does not blur.

SafeDRM Video Protection 1.10

SafeDRM Video Protection 1.10  3515 

SafeDRM is designed to protect audio,video and PDF files intended for playback on PC and mobile phone against copying, illegal distribution and unauthorized use. The program uses high-strength encryption algorithms to protect audio, video files, and PDF files. These files can be played on multiple platforms, such as Android, iOS, Mac, and Windows.

Terminator 8.1

Terminator 8.1  3515 

The Terminator system - to be more exact HSS (hardware-software system). Terminator consists of an external hardware controller (Terminator controller controller itself) pluggable into an USB port of a computer and the free Terminator program. The Terminator system was made by the best IT specialists of our organization. It combines the newest engineering solutions, ultimate control compliance, compactness and simplicity.

Parental Control 5.4.1.1

Parental Control 5.4.1.1  3514 

Cost effective key logger software works invisibly on your computer and does not show desktop icon, program path and add remove list and not affect processor working speed. Parental Control Software provides convenient option to monitor entire system activities from start to shut down in hidden manner. Parental Control Software records overall system activities made by external user or family members with real date and time in reliable manner.

Social Password Dump 7.0

Social Password Dump 7.0 versión gratuita 3514 

Free Command-line based all-in-one Social Network Password Recovery Tool

SSH client for windows SSHPro 3.5

SSH client for windows SSHPro 3.5  3513 

SSHPro - ssh client for Windows (Secure Shell) for logging into and executing commands on a remote host (with installed SSH server). Replaces telnet, rlogin and rsh, while providing secure communication between hosts over insecure network. Now with unique "Dynamic Port Forwarding" feature and SSH-2 support. Download and try it for free.

Network Password Dump 4.0

Network Password Dump 4.0 versión gratuita 3513 

Command-line based Network Password Recovery Tool

abylon CRYPTDRIVE 15.90.1

abylon CRYPTDRIVE 15.90.1  3512 

Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption.

Device Seizure 5.0

Device Seizure 5.0  3511 

Device Seizure forensically analyzes PDA and cell phone data. Supports Palm, Windows CE/Mobile, BlackBerry, and Psion devices as well as certain Nokia, Sony Ericsson, Motorola, iDen, Siemens, LG, Samsung, and Symbian based phone models. Also supports GSM SIM card acquisition. Focuses on the physical level of acquisition offering more physical downloads of devices.

11 from 1848

« First « Prev 1 2 ... 82 83 84 85 86 ... 167 168 Next » Last »

Las mejores aplicaciones para Otro software de seguridad Por los Editores

ctualmente no hay resultados