Other

124 programs found

AutoWipe PC 2012 Personal Edition

AutoWipe PC is an easy to use software product that makes it easy to wipe data; its uniquely easy to use, enabling normal users to securely wipe their whole PC or server. Our unique software algorithm completely wipes ANY computer...

Chrome Analyzer

Chrome Analyzer is an advanced windows forensic tool which analyzes the Chrome browser to extract a wealth of data. To make the browsing experience smoother Chrome stores lots of data about the browsing sessions of the user, this data is...

Any Keylogger

Any Keylogger Free, as one of hot monitor software in the world, is widely applied to parental control, employee monitoring and private detective service. The keylogger not only record entire activities, including online chat details, clipboard contents and other activities...

Hekasoft SiteLocker

Hekasoft SiteLocker is an easy to use application especially designed to help you block the access to certain websites protecting you from malicious content. The application displays a user-friendly interface and allows you to restrict websites in a few clicks....

SecurityKISS Tunnel

SecurityKISS Tunnel is a Virtual Private Network (VPN) implementation based on OpenVPN, PPTP and L2TP. It creates a VPN between your laptop and our security gateway what prevents third parties from viewing your web browsing activities, instant messages, downloads, credit...

Secure SQL Auditor

Secure SQL Auditor (SQA) is a SQL security software that conducts database server security auditing & includes vulnerability assessment tools for SQL database server. It is a network based SQL security assessment tool capable of scanning multiple database servers. Secure...

checksum

checksum is an easy-to-use, no-nonsense SHA1, MD5 & BLAKE2 hashing utility for Windows, capable of creating & verifying checksums of files and folders, even whole drives, with just one or two clicks. checksum is robust, lightning fast, intuitive, and completely...

Super Hide IP

Use Super Hide IP to keep your IP address hidden, surf anonymously, protect your identity and other personal information against hackers, and provide full encryption of your online activity, all with a simple click of 'Hide IP' button. With it,...

Ardamax Keylogger

Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer...

MultiHash

Generate hash values for files, directories, and entire drives. These hash values can be used to verify that two files or directory trees are identical, or to verify against published hash values when downloading. These hash values can be used...

Data Sweeper Pro

Data Sweeper Pro is a lightweight, fast and easy to use file shredder which provides you a safe way to dispose of any file for good. If you need to get rid of sensitive private information such as bank statements,...

Secure Windows Auditor

Secure Windows Auditor (SWA) A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with...

1 Free Keylogger

1 Free Keylogger offers full remote control of user activity on computer. 1 Free keylogger has a complete set of functions for remote monitoring of user activity on PC. The program records all keystrokes including passwords, regardless of using application...

BCWipe Total WipeOut

BCWipe Total WipeOut distributive includes ISO image used to burn the BCWipe Total WipeOut bootable CD disk. Since version 2.20 BCWipe Total WipeOut can create bootable USB disk as well. Before burning the ISO image to CD disk or creating...

myUnits

Within minutes after download, you have a platform to: store wealth; earn money; make and receive payments; trade services; make and research market deals; exchange currencies and communicate anonymously.Each myUnits program functions as a node for the decentralized P2P network....