Protectorion is the solution for secure management of data. The program functions as a file manager and additionally allows the encryption, versioning and describing of files. Files can be sent and exchanged as encrypted files and with the help of the search tool, they can easily be located and organized.
Infralution Licensing System (ILS) is a powerful .NET solution specially designed to help you with licensing components and software using simple and secure encrypted license keys. ILS uses a public key encryption algorithm to generate encrypted license keys which are virtually impossible for a cracker to reverse engineer from your code.
My Endpoint Protector Key Benefits 1. Centrally manage your device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3. Enterprise class endpoint security for everyone 4. Manage one or hundreds of PC endpoints from one online place 5. Every PC user can set it up. No experienced Admin needed 6. Setup in minutes 7. Works with any PC that has an internet connection 8. Works for PC and Mac 9. Free for personal use
Aiseesoft FoneEraser is an exclusive eraser for iOS devices. It allows you to remove all data from your iPhone/iPad/iPod completely and permanently. Those data may be contacts, text messages, photo Albums, videos, music, settings, documents and so forth. And the erasing level is optional (Low level, Medium level and High level). In addition, it functions on two or more devices at the same time, which will save lots of time.
Total Privacy Provides the Most Advanced Information Removal Solution for Protection Against Today's Malicious Online and Offline Threats. Total Privacy is a safe and easy-to-use Windows privacy protection tool that securely cleans Internet tracks, system activities and program history information stored on your computer. Supports all major browsers in addition to over 450 popular third-party applications.
The free Svchost Process Analyzer examines all Svchost instances. This makes it easy to recognize processes that start up through Svchost and disguise their activities. This was the way the Conficker Worm, which infected millions of computers, operated. The genuine Svchost.exe is an important Windows system process and is located in the C:WindowsSystem32 directory. The Svchost.exe processis often misused by spyware, Trojans or worms.
A simple program that can generate hashes such as md5, sha1, sha2 and many others.
The protection of the computer and stored files against undesirable access is more and more important. This Security-Suite offers innovative and professional security and encryption modules for private and business use. Beside the password- or certificate-based encryption you can protect the computer against illegal access or ultimate delete files.
Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured to op
Command-line Tool to Change File Date and Time
النسخ الاحتياطي إيبيريوس واحد من الأفضل النسخ الاحتياطي البرمجيات الحرة، كما صدر في طبعات تجارية لأولئك الذين بحاجة إلى النسخ الاحتياطي ميزات متقدمة لشركاتهم. نسخة مجانية من إيبيريوس النسخ الاحتياطي يسمح لك لإجراء نسخ احتياطي لأي جهاز تخزين كبير السعة، مثل محركات أقراص USB الخارجية ومحركات RDX، ناس وأجهزة الكمبيوتر المتصلة بالشبكة. قد جدولة شاملة ومهام إرسال البريد الإلكتروني. وهو يدعم ضغط zip مع أي حد حجم النسخ الاحتياطي التزايدي ومصادقة الشبكة وتنفيذ البرامج والبرامج النصية الخارجية.
كاسبرسكي لمكافحة الفيروسات يحميك من مواقع التصيد والبرامج الضارة التي لن تعرف إلا كانوا يحاولون سرقة منك. في الوقت نفسه، "شبكة الأمن كاسبيرسكي" يسمح جهاز الكمبيوتر الخاص بك إلى التقرير عندما يكتشف تهديد التي لم تشاهد من قبل. يستفيد جميع مستخدمي كاسبرسكي 250 مليون من معرفتنا مجتمعة! وتشمل ميزات كاسبيرسكي: يحمي من الفيروسات وأحصنة طروادة، والديدان، وبرامج التجسس، ادواري مسح الملفات، البريد الإلكتروني والإنترنت المرور "يحمي فورية الرسل يحمي غير معروف التهديدات يحلل" ويغلق "إنترنت إكسبلورر" الضعف تعطيل وصلات لمواقع البرمجيات الخبيثة/مواقع التصيد كتل "الرصد العالمي التهديد" (كاسبيرسكي شبكة الأمن) جميع أنواع keyloggers "التلقائي قاعدة بيانات التحديثات مجاناً دعم المذكرة التقنية": هذا محاكمة تجارية 30 يوما.