File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased.
Norascan is a small but effective application that will scan and remove malware components from your system. Norascan is not any kind of anti malware product that you can find on the internet. Scan and find known and unknown active malware on system.
The most comprehensive security suite on the market protects your PC, identity, data and everything you do online. Further protection comes with anti-phishing, anti-spam, parental controls and online backup. Also includes unique security not found in other suites like virtual and private browsing, identity protection with victim recovery services, and optional hard drive encryption that stops others from reading your PC, laptop or netbook.
A simple and powerful classroom management software that allows you to see live screens of student computers or show you screen to students. You can take control of a remote computer by controlling the mouse and keyboard. Additionally you can also record student's screens. Several tools allow you to turn off, restart, hibernate.... remote computers with one click. Starting program on remote computers is easy.
CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
TeslaCrypt malware encrypts the victim’s files such as photos, videos, documents, saved game files, and demands a ransom from the victim within a time limit. When the victim pays the ransom they can download a decryption key that will restore their files, otherwise the files are permanently lost.
RogueKiller is a useful application which will scan the running processes from your computer and kill those who are malicious.The interface is based on a regular window with seemingly cluttered options, where a pre-scan mode automatically starts at initialization and kills any suspicious processes. The file list shows the status, type, process ID, name, and path for each item.
VSUsbLogon enables users to login to their operating system using their USB devices instead of their passwords. The host OS remains password protected, but users need to input the password corresponding to the USB device assigned to them.
Free All-in-one Salted Hash Generation Software
SwfScan is a simple free SWF decompiler from HP's Web Security Research Group. Just open your chosen applet and it'll immediately be decompiled, allowing you to browse its code. If this is lengthy, then a search tool (with regular expression support) will help you to locate the details you need. Or you can export the code to a text file for analysis later.
Simple, fast and lightweight free Antivirus compatible with several OS. Panda Free Antivirus protects you while you work, play, or browse online. Protects against malware in general, and against rootkits, ransomware, USB infections and many more.
النسخ الاحتياطي إيبيريوس واحد من الأفضل النسخ الاحتياطي البرمجيات الحرة، كما صدر في طبعات تجارية لأولئك الذين بحاجة إلى النسخ الاحتياطي ميزات متقدمة لشركاتهم. نسخة مجانية من إيبيريوس النسخ الاحتياطي يسمح لك لإجراء نسخ احتياطي لأي جهاز تخزين كبير السعة، مثل محركات أقراص USB الخارجية ومحركات RDX، ناس وأجهزة الكمبيوتر المتصلة بالشبكة. قد جدولة شاملة ومهام إرسال البريد الإلكتروني. وهو يدعم ضغط zip مع أي حد حجم النسخ الاحتياطي التزايدي ومصادقة الشبكة وتنفيذ البرامج والبرامج النصية الخارجية.
كاسبرسكي لمكافحة الفيروسات يحميك من مواقع التصيد والبرامج الضارة التي لن تعرف إلا كانوا يحاولون سرقة منك. في الوقت نفسه، "شبكة الأمن كاسبيرسكي" يسمح جهاز الكمبيوتر الخاص بك إلى التقرير عندما يكتشف تهديد التي لم تشاهد من قبل. يستفيد جميع مستخدمي كاسبرسكي 250 مليون من معرفتنا مجتمعة! وتشمل ميزات كاسبيرسكي: يحمي من الفيروسات وأحصنة طروادة، والديدان، وبرامج التجسس، ادواري مسح الملفات، البريد الإلكتروني والإنترنت المرور "يحمي فورية الرسل يحمي غير معروف التهديدات يحلل" ويغلق "إنترنت إكسبلورر" الضعف تعطيل وصلات لمواقع البرمجيات الخبيثة/مواقع التصيد كتل "الرصد العالمي التهديد" (كاسبيرسكي شبكة الأمن) جميع أنواع keyloggers "التلقائي قاعدة بيانات التحديثات مجاناً دعم المذكرة التقنية": هذا محاكمة تجارية 30 يوما.