Categories
Security

SecretMe Security Related Security for Windows

Your new digital secret weapon to run any program in your computer
iHide is a container to any application in your computer system to its shell by means of dynamically created tabs.

iHide can hide instantly the opened programs currently running on its tabs with a set of hot keys (or rather secret keys). The hidden programs do not show their identities on the taskbar or anywhere on your desktop.

You select which program to be hidden, and you define your own set of hot keys. When running on its standard interface, it does not consume much resources of your system.

iHide restores hidden applications as quickly as it hides them, and I had tried it on popular applications like Firefox, Opera, IE7, MS Word, Excel, Outlook, and etc.
Here are some key features of “iHide”:

· Physically disappear on screen even on the taskbar when you don’t want someone to know what you’re surfing.
· An option to block all advertising pop-ups. Edit ->Allow Pop-ups.
· You can create as many web pages in one Browser instance as your PC memory will handle.
· You set your own Secret Keys so no one knows how to activate or deactivate your SecretWeb browser.
· Cookies, whether you like it or not it’s there. Now you have an ability to inspect what sort of information, websites put in your PC, and it’s up to you to delete or keep them.
· Search the net with major search engines.
· FTP client is embedded in the browser for your convenience. Now you don’t have to switch between software to up/download files.
· Database of the last 30 files downloaded and Urls for easy keeping track of what are sitting in your hard drive.
· Set your hotkey to activate Screen Saver immediately.
· Email system supports many foreign languages in Unicode
· SecretWeb offers you a deceptive interface that looks like an Office suite.
· Embedded RSS reader.
· Open and Hide other applications like: Notepad, Dos prompt, Outlook, Outlook Express, Wordpad, Excel, MS Word, Mozilla Firefox, Opera, and Internet Explorer, etc

Requirements:

· 50MB HD
· 70MB Ram

Limitations:

· 30 days trial
What’s New in This Release: [ read full changelog ]

· Encrypt & decrypt, Key Logger added, Unicode supported, Tools added and bugs fixed

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

MsConfig Cleanup Utility Secure cleaning Security for Windows

Remove Msconfig disabled startup items.
Msconfig (Microsoft System Configuration Utility) is a small tool included with most Windows Operating Systems which allows you to enable or disable auto-start Programs and Services. When you type Msconfig into the Run box it opens the program allowing you to stop unnecessary programs from always starting with Windows.

However, you cannot completely remove an item from the list. It only removes the check from the box leaving a useless entry in your Registry. This is where MsConfig Cleanup Utility can help. It scans the startup configurations and allows you remove any or all items that have been previously disabled using the Msconfig tool.

Note to Windows 95 and 2000 users: Windows 95 and 2000 did not include the Msconfig utility but the ones for 98 and XP will work for those systems and are also available for download on the MsConfig Cleanup Utility web page.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Password Safe Wizard Soft Password Managers Generators Security for Windows

This application will keep your passwords and data secure with 256-bit encryption
Password Safe is a very easy-to-use application that you can use to attain security on your computer.

Password Safe is a great personal data management tool. One ‘Master Password’ is all that is needed to access all your passwords and personal information.

Password Safe keep passwords and other private information secure by using strong encryption algorithms. Strength is often measured in the number of bits used for the encryption key. Many systems commonly use between 64 and 256 bits. Most cryptographers consider 128 bits to be strong enough to take a very powerful computer many years to break.

View or edit your passwords, and drag & drop or copy your passwords and other information to web pages and other software. Strong encryption keeps your information safe and secure.

Here are some key features of “Password Safe”:

· Web site passwords
· Credit card and PIN numbers
· Computer logon passwords
· Telephone banking codes
· E-mail passwords
· Software access passwords
· Door entry and alarm codes

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

XP Advanced Keylogger Keylogger Monitoring Security for Windows

A top-rated invisible easy-to-use surveillance tool
XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver.

XP Advanced Keylogger is able to also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer.

XP Advanced Keylogger causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.

Requirements:

· CPU: 133MHZ
· RAM: 32M
· Disk spaceE: 5M

Limitations:

· 5 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Enigma Folder Lock Encrypting Security for Windows

Enigma Folder Lock is a powerful and easy to use security application that allows you to protect your files
Vinasoft Secret Folder is a powerful and easy to use security application that allows you to protect your most sensitive & secret data files like images, video files, documents, etc…

Your folder will be protected and hidden from the computer by a 128 bit encrypted password protection.

The software has two windows area for you to easily lock and unlock the folders of your choice.

To lock, select the folders which you choose to lock in the folder window and click the lock button. To unlock, select the folders in the locked folder window and click the unlock button.

It’s as easy as that!

Requirements:

· 1MB hardisk space

Limitations:

· 10-run trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

SAMInside Decrypting Decoding Security for Windows

An application that allows you to encrypt and decrypt passwords
SAMInside is a software that allows you to decrypt passwords encrypted by system key SYSKEY.

Brute-force attack, mask attack, dictionary attack, pre-calculated Rainbow-tables attack. Import from LC, LCP, LCS, HDT, LMNT.LST, PWDUMP files. Import local hashes.

SAMInside has small size, doesn’t require installation and can be run from diskette, CD/DVD-disk or USB-drive.

SAMInside is the first utility in the world which started to work with passwords encrypted by system key SYSKEY!

Here are some key features of “SAMInside”:

· The program has small size, doesn’t require installation and can be run from diskette, CD/DVD-disk or USB-drive.
· Brute-force attack;
· Distributed attack;
· Mask attack;
· Dictionary attack;
· Hybrid attack;
· Pre-calculated tables attack.
· Forcing program code is written completely on Assembler what lets to get extremely high speed of password forcing procedure on any processor.

Limitations:

· Only Latin capitals may be used for brute-force attack.
· Mask attack is unavailable.
· Only one table is available for attack with pre-calculated tables.

What’s New in This Release: [ read full changelog ]

· Added fucntionality.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!