Categories
Security

Securepoint Personal Firewall VPN Client Firewall Security for Windows

The job of your this firewall is to protect a PC from unwelcome access
That means it makes the PC invisible for possible attackers and
catches suspicious connections. Unnoticed passing-on of personal data
will become impossible.

The integrated VPN Client is an easy-to-use
remote working software based on the latest VPN technology.

The software provides smooth integration with a remote network and may be used with the most popular IPSec-compliant gateway – like Securepoint Firewall & VPN server.

The software provides authentication, encryption to your network traffic and supports Preshared Key / X509 certificates.

Without permission, everything is forbidden: The basic setting of the
Securepoint Personal Firewall only allows those applications whose
communications were explicitly permitted.

Minimal rights of access: Each program on your PC should only own those right of access which it actually needs. The Securepoint Personal
Firewall & VPN Client supports you in this and recognises automatically
which programs are tending to communicate with the exterior.

You will be asked if you want to allow this program to communicate or if you refuse to give your allowance. Thereby, the working surface which could possibly be attacked is essentially reduced.

Easy control and overview: An easy control and overview allows you to
concentrate on fundamental settings.

Lines of defence in several layers: Do not rely on a single system of
defence. In any case, use other security systems such as virus scanners in addition to the Securepoint Personal Firewall.

Since the Securepoin tPersonal Firewall & VPN Client is compatible with virus scanners, e.g. of AntiVir, you can additionally operate with a virus scanner.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Armor Tools Encrypting Security for Windows

This is a suite of tools which ensures your privacy and keeps your sensitive information secure
While you are working on your computer the system monitors the so called “history” and saves it.

All information about your work in the Internet – when and which sites you visited, of what content, which programs downloaded, with which documents you worked, which and whom you wrote, what you looked for, which folders you opened, what computers you connected to – all that and a lot of other information is left on your computer.

Any person who has an access to your PC can easily access this information and monitor practically your every step. Besides he/she can collect compromising information about you.

In that situation confidentiality can not be guaranteed. So much accessible information about you not only destroys your privacy but also slows down your computer.

All this information is kept on your hard drive, in the system registry. Besides the history of started programs, history of the search, history of last opened documents is constantly loading by the system and “eats” RAM of your computer.

“Armor Tools” will let you work on the computer not leaving traces of your activities.

Armor Tools will let you work on your computer taking care not to leave traces of your activities.

The program includes some very useful tools:

Encrypted Disk – Tool is used for creating encrypted disks on your computer. On this disk you can store confidential information which you’d like to keep secret from other users. The disk is encrypted by 256-bit (32 symbols) password using “AES256” algorithm in real-time mode (this ensures steady protection of your data against hacking).

The Eraser – Tool is used for cleaning the private information kept on your computer. This tool contain MS Windows objects and Internet Explorer objects for erasing.

Invisible Man – Tool is used for keeping private information and its later restoring. This is necessary in that case when you wish to do some work on the computer which must not be fixed anywhere, but you need to save the information which you had in computer before your work.

File Shredder – Tool is used for deleting secret documents, programs, and other files without possibility to restore them. It also destroys file information and file headers.

Adjustments – A set of additional adjustments related to safety, system capacity and user preferences. It contain parts: Start Menu, Explorer, Network, Printers, Display, IE Favorites.

Requirements:

· Minimum screen resolution 800×600
· Pentium processor and above
· 16 Mb RAM
· 5 Mb free disk space

Limitations:

· 21 days trial
· nag screen
What’s New in This Release: [ read full changelog ]

· Erasure dialog was added
· Erasure algorithms were updated
· erasing status added
· program settings (by default) were changed
· minor changes of program interface
· lng-files were updated

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Windows Antivirus

The Cleaner Pro Build Antivirus and Spyware for Windows

The Cleaner description

Detect and remove many trojans resident on your system
The Cleaner Professional is a system of programs designed to keep your computer and data safe from Trojans / Worms / Keyloggers / Spyware and all manner of malware.

By actively monitering files and processes on your computer it can detect a virus in action and catch it before it has a chance to do any damage to your valuable data.

Never again worry about e-mails you open, or programs you run — The Cleaner Profession virus detection system will take care of business so you don’t have to!

Here are some key features of “The Cleaner”:

· Malware Protection
· Live Updates
· Registry Monitoring
· Active Scanning
· Stealth Mode
· Quarantine Manager
· Scheduler
· In-Program File Submission
· Command Line File Testing
· Email Alerts
· Admin Message Alerts
· TCMonitor Ignore List
· TCMonitor Editor
· Active Scanner Ignore List
· Encrypted Configuration Data
· Expanded Scan Information
· Scan Pause/Resume
· Enhanced Fonts In TCActive!

Limitations:

· 30-day trial
What’s New in This Release: [ read full changelog ]

· Added PendingFileOperations viewer to retail version
· Minor bug fixes

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Disk Drive Administrator Security Related Security for Windows

You can disable all USB drives, regardless of the drive letters that can be associated with them.
Disk Drive Administrator can hide, lock and protect your local, network, Floppy and USB drives, and disable the AutoRun feature for them using this fabulously designed software.

Functionality and simplicity is put in every corner of Disk Drive Administrator; intuitively understandable user interface gives you an ability to start using the program right out of the box without learning anything. All you need to do is to click on the checkboxes located within the group boxes representing individual drives.

Another great feature you can use lets you disable the AutoRun feature based on drive types. This means you can disable, for instance, only all USB drives, regardless of the drive letters that can be associated with them.

Disk Drive Administrator lets you protect itself from an unauthorized access by assigning a password that can be requested on each program start.
Here are some key features of “Disk Drive Administrator”:

· Hide local drives
· Hide network drives
· Hide USB drives
· Hide Floppy drives
· Hide CD drives
· Hide DVD drives
· Lock hard drives
· Lock USB drives
· Lock CD drives
· Lock DVD drives
· Protect access to your valuable data

Limitations:

· 30 days trial
· Nag screen

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

File Shredder Secure cleaning Security for Windows

Completely remove sensitive files from your disk drives
File Shredder is a small tool that will help you to erase the contents of sensitive files and folders that you specify.

Normal file deletion only removes a file’s directory entry, but leaves the data contained in the file on your disk drive.

File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin.

You can also shred files by right-clicking on them from the MS Windows Explorer and selecting the Send To item on the popup context menu.

File Shredder has two file wiping methods available, a standard two-pass file clearing procedure and an NSA approved seven-pass file erasure method.

For normal file deletion operations the two-pass method should be sufficient, but if you want to thoroughly erase a file’s contents before deleting it the NSA approved method may be used.

NOTE: Files and folders selected for shredding can not be recovered using an undelete program. The purpose of File Shredder is to completely remove sensitive files and their contents from you disk drive. Once a file has been shredded it can not be recovered using sophisticated file restoration utilities.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Atomic PST Password Recovery Password Managers Generators Security for Windows

Recover lost passwords to personal folders in Microsoft Outlook (.pst files)
When working on MS-Outlook mail client with POP3 or IMAP accounts, all received and sent emails, are saved in a Personal Folders (.pst) file along with Contacts and Calendar. You decided to set a password on a .pst file, in order to protect the content of the emails, and prevent from accessing them by other users.

When you started up outlook again, you had dropped the connection to the personal folder which stores most of your mail. When you tried to reconnect the pst, you needed a password that you can’t remember.

Atomic PST Password Recovery is designed to be a tool that will allow you to recover lost passwords to personal folders in Microsoft Outlook (.pst files).

It will take just a few seconds to recover a password to your personal folder.

Owing to the peculiarities of the password encryption in the Outlook PST file, which is very weak (for each password-protected PST file, there are many passwords that can open it) our program recovers not the “original” password that you typed, but offers you a similar “fake” password that will be 100% fit and functional.

Note!
Atomic PST Password Recovery is designed to recover lost or forgotten passwords to personal folders (.pst files) only! Does not recover mail account passwords, for this purpose we would advise you our Atomic Mailbox Password Recovery or Atomic Outlook Recovery (recovers both Outlook passwords: mailbox and pst).

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Hide Protect any Drives Keylogger Monitoring Security for Windows

An application designed to password protect Hard drive, CD, DVD, floppy and flash drive.
Protect Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives. Stop unauthorized software installations and data leak by removable media.

Hide & Protect any Drives is a security tool that gives you the possibility to password protect the hard drive, CD, DVD, floppy and flash drive.

Hide & Protect any Drives is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to partitions of hard disk drives.

There is an ability to secure your data by two ways: hide your devices or lock access to them. You should enter a password to gain access back. Your data on media will not be encrypted or altered in any way, therefore if you have lost or forgotten your password, you’ll never lose your data stored on the protected media.

Moreover, it works much more faster than any other software using cryptooperation mechanisms. The main purpose of the program is restricting an ability of copying data between removable media and hard disk drives as well as denying access to the media itself.

Hide & Protect any Drives will also allow you avoid many of headaches connected with unauthorized software installations from any removable media. It also prevents data leak by removable media.
Here are some key features of “Hide & Protect any Drives”:

· Password protect hard drive
· Protect floppy drive
· Hide CD
· Hide DVD
· Password protect CD
· Password Protect DVD
· Protect access to your valuable data

Limitations:

· 30 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

ZipLock Encrypting Security for Windows

ZipLock is an invaluable tool for protecting sensitive data on your PC.
ZipLock is Valiant IT Ltd’s premier cross-platform encryption and compression utility.

ZipLock is a very useful and effective utility for the protection of the sensitive data on your computer.
Using a combination of RSA public-private key encryption and secret key encryption, ZipLock allows you to keep your data totally secure.

ZipLock provides a variety of secret key encryption algorithms including the Advanced Encryption Standard (classified as secure enough for use by the US government), and two of the other finalists for the Advanced Encryption Standard: the Serpent and TwoFish encryption algorithms.

In addition to support for data encryption, ZipLock provides full archiving and compression capability. ZipLock provides a number of different compression options.

It allows you to compress files on your PC using Zip format (commonly used in Windows platforms) and compressed Tar format (commonly used in UNIX platforms).

Here are some key features of “ZipLock”:

· Encrypt files using third-party public keys.
· Sign and verify files.
· Support for BZip2 compression.
· New start-up wizard for generating key-pair or utilising existing key-pair.
· New Skinnable look and feel – supports GTK and KDE skins.
· Full Encryption/Decryption support using a combination of symmetric and asymmetric encryption methods
· Create zip, tar and compressed tar archives
· Add and remove entries to/from zip files
· Associate file types with applications to launch from within archive file

Requirements:

· SUN’s Java Runtime Environment (version 1.4.0 or greater)

Limitations:

· 30 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Mobile Phone Tools

Christersson SendFile for Sony Ericsson Sony Ericsson Mobile Phone Tools for Windows

Christersson SendFile for Sony Ericsson allows you to send any file to your mobilephone
Christersson SendFile for Sony Ericsson allows you to send any file to your mobilephone (SonyEricsson/Ericsson).

From MyPictures you can only send images to the phone but, what if you want to send a ringtone, a contact, a game or any other file? We use SendFile

NOTE:
Mobile Phone Monitor is necessary for this program.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Windows Antivirus

Geekz Virus Remover Antivirus and Spyware for Windows

Geekz Virus Remover description

You can use this software to check and improve the protection status for your computer.
Geekz Virus Remover will offer you the possibility to scan your computer and detect any form of malware. In addition you will be able to fix registry and change your computer’s registered owner name.

Here are some key features of “Geekz Virus Remover”:

· Scan Button
Scan specific Folder or drive.

· Scan System Button
Scan specific folder which probably has virus. Recommended for checking virus active on your system or not.

· Scan File
Scan Single File.

· Repair Registry
Change registry back to normal which changed by virus like show back folder option, control panel, show hidden files, can not right click mouse, Task manager and more.

· Kill All Process
Kill all process except system process. This function is important to kill and clean unknown virus.

· Change PC Information
Change Pc information (Registered Owner And Organization Owner).

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!