Software Downloads for "I Vault Comodo"

Comodo i-Vault - Single point of storage for all your confidential information.

Comodo i-Vault Secure is a Password Management Software

Here are some key features of "Comodo i Vault":

* Instantly login to your favorite websites and applications
* Speed up surfing - No more forgotten passwords
* Single point of storage for all your confidential information
* 256 bit encryption of credit card and bank account details
* Secure Password Generator instantly creates complex passwords
* Supports multiple users on a single machine
* Anti Keylogging feature- stop hackers monitoring your personal data
* 'Drag 'n' drop' interface -Windows ease of use
.

  • Platform: Windows
  • Publisher: Comodo Inc
  • Date:
  • Size: 8110 KB

myCode Vault at phpdevshed.com is a web based personal (i.e. you are the only one that has access to your code) code storage, that enable you to store bits of code and or information in one place - online. You can use it to store reusable code and or other information that you frequently use or need access to from anywhere in the world - all you need is access to the internet..

Vault Backup is a backup and restore client application which i simple, fast and secure. Laptop or desktop users can make an off-site copy over the Internet of their valuable data using Vault Backup.
Vault Backup License - GNU Library or Lesser General Public License (LGPL).

e l i t e FreeRAM! is a small, easy to use application that frees a selected amount of memory when run. It is based on the memory freeing VBS script files that many people use..

  • Platform: WinOther
  • Publisher: Robert DeFusco
  • Date: 17-07-2001
  • Size: 362 KB

I of the Enemy: Ril'Cerat is a totally free, stand alone, science fiction real-time starategy game, that is the first chapter in the "I of the Enemy" saga. The player is a Lokob (luh-kobe) officer who is in charge of his race's contingent. Major Verkkal (voice talents of Ian McNeice, famed for his role as Baron Harkonnen in Dune) is his trusted friend and Field Commander. Emphasis in this game has moved away from gathering, mining and building, and instead concentrates on interesting tactical problems.

Pass I-Net+ IK0-002 in first attempt. 250 Questions with detailed explanation. IK0-002 Study notes, Articles and Mock Test. 99% pass rate, 100% money back guarantee. Based on Latest CompTIA I-Net+ Certification Exam pattern Exam Simulation and Study Guide. Download IK0-002 Now This Practice test can be used for following CompTIA's certificaitons exam: I-Net+

  uCertify PrepEngine has following features:
 ---------------------------------------------
 1. Adaptive Testing
 2.

  • Platform: Windows
  • Publisher: uCertify
  • Date: 17-12-2004
  • Size: 8436 KB

FREE Comodo Personal Firewall - Secure your system against internal attacks such as Trojan viruses / malicious software and external attacks by hackers. With a user-friendly single click interface you can allow or block access to the Internet offering complete immunity to attacks and total protection of your personal information. Real time traffic monitoring enables you to react instantly to threats and identify bandwidth bottlenecks. Silent Security Technology means no needless alerts with out-of-the-box protection against hackers, Trojans and other unknown threats.

Make sure your private and personal digital photos are kept secure and protected both before and while you share them by email or FTP over the public Internet or store them on your PC or USB flash drive. BLUBOX provides you with your own desktop digital vault in which to securely store for files and photographs. BLUBOX encrypts and compresses your photos using industrial strength 256-bit encryption technology and acts as your personal digital vault on your PC. By password protecting your photos you can be sure that they will never be viewed without your permission or if your PC is lost, stolen or needs repair your private data remains secure and private.

i-Fetch is a feed reader and information aggregation program that enables you to read various RSS feeds on your desktop, so that you can get information from various sources on a single interface. i-Fetch allows you to keep watch of the articles that contains specific keywords. When you find any article of interest, you can put that into your Archive for future reference. Features - Reduces bandwidth requirements - Collects information at a single interface - Pull-based, not Push-based - Groups information conveniently - Integrated browser - Auto discovery of feeds - Support for RSS, Atom and RDF formats - OPML Support - Quick search - Predefined with 20 popular feeds.

  • Platform: Windows
  • Publisher: Ideafarms
  • Date: 01-11-2005
  • Size: 2857 KB

DIVINATION WITH I CHING The Chinese Book of Changes (or the I Ching) was created more than 3000 years ago and is one of the most ancient written texts in the world literature. It consists of 64 hexagram predictions. These hexagrams describe all possible ways how situations may develop. How does the Book work? All answers are already in your heart. The Book only gives you access to your unconscious. The Book allows you to get into the depth of your I and hear your inside voice devoid of any conscious layers - fears, wishes, prejudices and illusions.

  • Platform: Windows
  • Publisher: qxmap.com
  • Date: 24-01-2007
  • Size: 300 KB

Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format. Set Cryptex to automatically lock the vault on demand, after a period of inactivity or upon shut down for maximum protection of your laptop or PC. Cryptex will work on Windows 2000/XP/Vista with any file type and allows for the creation of encrypted vaults on most removable USB media's, including flash drives and USB hard drives.

Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format. Set Cryptex to automatically lock the vault on demand, after a period of inactivity or upon shut down for maximum protection of your laptop or PC. Cryptex will work on Windows 2000/XP/Vista with any file type and allows for the creation of encrypted vaults on most removable USB media's, including flash drives and USB hard drives.

Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format. Set Cryptex to automatically lock the vault on demand, after a period of inactivity or upon shut down for maximum protection of your laptop or PC. Cryptex will work on Windows 2000/XP/Vista with any file type and allows for the creation of encrypted vaults on most removable USB media's, including flash drives and USB hard drives.

FREE Comodo Firewall Pro - Secure your system against internal attacks such as Trojan viruses / malicious software and external attacks by hackers. With a user-friendly single click interface you can allow or block access to the Internet offering complete immunity to attacks and total protection of your personal information. Real time traffic monitoring enables you to react instantly to threats and identify bandwidth bottlenecks. Silent Security Technology means no needless alerts with out-of-the-box protection against hackers, Trojans and other unknown threats.

  • Platform: Windows
  • Publisher: Comodo Group
  • Date: 11-12-2007
  • Size: 9299 KB

Free Comodo Memory Firewall is a buffer overflow detection and prevention tool which provides the ultimate defense against one of the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks.

  • Platform: Windows
  • Publisher: Comodo Group
  • Date: 25-01-2008
  • Size: 3346 KB

Are you sure nobody doesn't steal your files? Storage Vault is a file protection technology based on usage of RSA keys and ciphering algorithms. A distinctive characteristic of Storage Vault technology is a deep integration with operating system so no advanced skills are required to use the application. You can easy create a secure storage that acts and looks as an ordinal forlder in the Windows environment and store your vital data inside it and to not worry about the intruders that probably already do crack your system! Just imagine, to protect your files the only thing you need to do is to drag files from one folder to another! It has never been easier! Advantages: - Strong data protection is warranted by RSA algorithm.

  • Platform: Windows
  • Publisher: ILYNS
  • Date: 07-10-2008
  • Size: 6983 KB

This extremely well presented version of the full Wilhelm Translation of the I Ching, complete with commentary and moving lines simulates the Coin Oracle method. Outclasses other I Ching software with its inclusion of stunning Chinese art. Unique in its combination of the hexagram meanings and commentary together with the moving lines one page. Free Version for unlimited readings.. Guiding Star Developers. Producers of Free Tarot and I Ching software, and Free Parental Control Software..

Comodo Business Antivirus enables remote, centralized management of PC security products such as Antivirus, Firewall and Disk Encryption on business workstations. With Comodo Business Antivirus businesses can save up to $30 per endpoint per year with the Power Management feature that allows administrators to control power settings from the management console. Comodo has integrated a game changing technology Default Deny Protection(tm) and Auto Sandbox Technology(tm). Default Deny Protection(tm) prevents virus attacks by working within a universe of known and safe applications, unknown applications are by default challenged prior to execution.

The Web is what you make of it! There is no doubt that the Web has evolved from viewing to doing, and it is today the world's foremost communicative medium. That is why the web browser is arguably the most important program on your computer. However, the Internet represents an insecure channel for exchanging information leading to a high risk of intrusion, fraud, malware attack. This is exactly why Comodo, the world's leading on-line security and trust assurance innovator, has stepped forward with Comodo Dragon - A versatile technology Browser that offers you all the possible features PLUS the unparalleled level of security and privacy you only get from Comodo.

Based on the I-Shoppro script, I-Merchant utilizes real-time credit card authorization, utilizing the AuthorizeNet Payment Gateway. An unlimited number of products can be handled easily with its user friendly back-end management feature. I-Merchant is available in 2 versions, Single and Multiple Sales tax..

New Reviews


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


Zoolz

No serious PC user needs introduction about the need to backup data, both at home and workplace. There was a time when majority of people used external HDD or storage media to backup important data. However, local data backup has its limitations and ...


Driver Fusion

To keep your laptop and desktop running smoothly and get the best performance out of it, it is important to pay attention to some aspects. It is quite important to ensure your PC device drivers are updated. Components like motherboards, GPU and ...


New Downloads

Axence nVision

Comprehensive network
management: network monitoring
and visualization; hardware
and software inventory
(license audit, ...

Proxy Log Explorer

Proxy Log Explorer is the
fastest and most powerful
analysis application for
monitoring the efficiency
corporate Internet ...

BDmate for Mac

An effective Blu-ray tool to
copy Blu-ray to mkv/BDMV/ISO,
convert Blu-ray to digital
formats like MP4, MOV, MP3, or
to ...

StarCode Network Plus POS
& Inventory

StarCode Network Plus is multi
station or terminal POS (Point
of Sale) and Inventory
Manager. Best suited for small
...

PhotoStage Pro Edition

PhotoStage Pro Edition for
Windows makes creating a
slideshow easy and fun. Share
your memories with a
professional ...

Thesaurus Synonym Database

Thesaurus, Synonym, Database
for English, French, German,
Portuguese, Spanish, Italian,
Dutch, Swedish in SQL, Excel
or ...

HueScope Separator

Create art by detecting color
within photos. Mimics
watercolor art with color
separations that target
specific watercolor ...

Citrus Inventory

Manage Inventory Items Create
and Manage Vendor Data Create
and Print a Purchase Order
Create a Pick List Return
Items to ...

Bank2QIF

Bank2QIF is an useful utility
to convert your OFX, QFX, QIF,
QBO, OFC files to the QIF
format. Simply browse for your
...

CSV2QIF

CSV2QIF is an useful utility
to convert CSV files to QIF
format. Simply point to the
CSV file and CSV2QIF will do
the rest.