Home > By category > Utilities > Security & Encryption
Sort by : Name|Date|Downloads|Rating|

Listing of Security & Encryption in Utilities

NT Password is an application for Windows NT system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure.

  • Platform: WinOther

Password protect your workstation or server with Transparent Screen Lock while viewing programs that are running. Any attempts to access the system will display a message requesting the password. Prevent access via CRTL-ALT-DEL. Includes a log file to track activity and failed login attempts.

  • Platform: WinOther
  • l0stat
  • License: Freeware
  • Price: 0.00
  • Rating

l0stat is a tool that uses L0phtcrack or LC3 results in order to generate a set of statistics that provide a global security view of the NT password database.It provides statistical info about all user or computer accounts in terms of:- Basic Analysis: gives a global view of strength of password account.

  • Platform: WinOther

Mouse Lock is a Windows based application designedto prevent  unauthorized use of your computer.The program simply traps your mouse inside a small button.Your computer can  trap or free the mouse at specified time.You can to do it handle too.Mouse Lock disables special key combinations such as ALT_TAB, CTRL_ESC, CONTROL_ALT_DELETE and others.

  • Platform: WinOther

Kerio WinRoute Firewall 5 is a corporate firewall with antivirus support, content filtering and user-specific Internet access management. Also available with integrated McAfee Anti-Virus and Cobion content filtering. Supports all Internet connection types, VoIP (H.

  • Platform: WinOther

Kerio WinRoute Firewall is a corporate firewall with integrated McAfee antivirus, Cobion content filtering, and user specific Internet access management. Supports all Internet connection types, VoIP (H.323, SIP, Cisco SCCP) and VPN, and Active Directory.

  • Platform: WinOther

HotCrypt is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encoding. Working with embedded in text pictures and objects.

  • Platform: WinOther

WebEradicator is the award-winning security solution that securely eradicates your PC activity histories. WebEradicator has the ability to cover up your previous PC activity, as well as eradicate selected files and directories that you specify! WebEradicator allows you to use your PC in private without having to worry about others seeing what you have been doing, or reading your sensitive data.

  • Platform: WinOther
  • cPWD
  • License: Shareware
  • Price: 49
  • Rating

Security requirements demand dynamic password changes across hundreds of systems. Use cPWD to maintain multiple, local account passwords on all NT/2000/XP/2003 systems participating in the domain. Flexible filters allow you to target specific systems and accounts.

  • Platform: WinOther

Active@ KillDisk is a quality security application that destroys data permanently from any computer that can be started using a DOS floppy disk. Active@ KillDisk Professional conforms to US Department of Defense clearing and sanitizing standard DoD 5220.

  • Platform: Dos, WinOther
  • P-Guard
  • License: Freeware
  • Price: 0.00
  • Rating

KEEP YOUR DATA PRIVATE!P-Guard uses strong and certified cryptographic services, >which allow encrypt any type of sensitive user's data.>Only person, who is owner of encrypted file may decrypt this file.>Shell integration allows to use P-Guard with maximum comfort:>You can start P-Guard from right-mouse context menu or>you can easily integrate the P-Guard in your favorite file manager.

  • Platform: WinOther

Protect PDF files against unauthorized access and encrypt them! The program limits the access to PDF documents. You decide if a PDF file can be printed in th Acrobat Reader or if somebody may copy or edit the text. You can deside if the user have to enter a password in order to view the file.

  • Platform: WinOther

Lockout Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities.

  • Platform: WinOther

Boss Key permits you to hide active program window immediatlly using a hot key! Everybody should have such program for personal security..

  • Platform: WinOther

PicoZip Recovery Tool is an easy-to-use program that can help you recover lost or forgotten passwords from password protected Zip files created by compression utilities like PicoZip, WinZip, PKZip, etc. Self-extracting Zip files are also supported. You have a choice of Brute Force or Dictionary based recovery methods.

  • Publisher: Softchitect
  • Date: 24-06-2003
  • Size: 2794 KB
  • Platform: WinOther

Surf Spy is an invisible tool that monitors the Internet activity on your computer. It captures the link (URL) of every visited web site and stores it to an encrypted file. The log file can be sent secretly with email to a specified receiver. Surf Spy Enterprise allows logging to a centralized server.

  • Publisher: Sureshot
  • Date: 24-06-2003
  • Size: 1100 KB
  • Platform: WinOther

Password Crypt stores your passwords and other sensitive data in an encrypted file using industry standard encryption methods. You the user get to choose the password that encrypts the data.Built-in categories allow you to start right away entering your data.

  • Platform: WinOther

The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file.

  • Platform: WinOther

FingerPoint is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed.

  • Platform: WinOther

ShyFile generates self-decrypting files carrying your highly secured text to be attached to an email or to be published on a website. 1on1 symmetric key entries are used for your HTML encryption, email security and binary file encryption, i.e.CAD-files, Ms Word - and MS Excel files.

  • Platform: WinOther

A tool to stop spammers from changing your Home Page. Are you annoyed by so many sites that change your home page? They use nasty Internet. Explorer exploits to change it. With this tool you are protected 100% of your time. Even if they change it, this tool can change it back, so no matter how hard they try, they won’t be able to do it :) .

  • Platform: WinOther

Dial-Up Lock Millennium Edition is a protection tool that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me.

  • Platform: WinOther

CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with zip compression. Functions to build self-extracting encrypted zip files and email capabilities are also included. Encrypt your files and folders from within the Windows shell.

  • Platform: WinOther
  • LockEXE
  • License: Shareware
  • Price: 14
  • Rating

So Easy to Use!!! LockEXE can password protect your programs. Your email, word processor, browser or ANY other programs you choose will only work with your password! Protect your computer and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier!.

  • Platform: WinOther

Encrypt a file once with whatever password you choose and Oxide takes care of all decryptions and re-encryption even if you change the file contents! Whats more, we even take the extra step of securely deleting any data left on disk about this file after you use it, guaranteeing your files will be kept for your eyes only.

  • Platform: WinOther

Hide Files allows you to select any folders (and sub folders with all files) of your choice to protect them as hidden. You can drag-and-drop the desired files/folders from Explorer into the Hide Files window. In one mouse click they become invisible. Once files or folders are hidden, it is impossible to find them, or access and remove any file.

  • Publisher: Spydex Inc
  • Date: 24-06-2003
  • Size: 207 KB
  • Platform: WinOther

Encrypt and Hide: Files, Folders, Disks, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time settings. Supports 8 encryption algorithms. Set rights for reading, copying, deleting, invisibility features for other users on your computer.

  • Platform: WinOther

JpegGuard: This program is for JPEG users who want to protect their images and avoid potential embarrassment. This program will encrypt all of your .JPG and .JPEG files on your computer. This prevents others from viewing your encrypted JPEG images.

  • Platform: WinOther
  • rscdisk
  • License: Shareware
  • Price: 29
  • Rating

Crypt encryption"on the fly"creates a virtual disk on your system (cryptdisk).Cryptdisk is turned off and on as you need it. Entry into the virtual disk is only achieved by use of a file (Keyfile) and a highly secure passphrase process.All files, data, and information written in the cryptdisk or parked in the cryptdisk is encrypted automatically.

  • Platform: WinOther

Telephone Spy uses your modem to record phone conversations. Before recording a call, it can play a legal disclaimer. The calls are stored to the hard drive as regular Windows sound files. A memo is added to each file to let you easily distinguish one call from another.

  • Platform: WinOther

New Downloads

Wayk Now

Wayk Now lets you take control
of a remote computer, or allow
an authorized user to take
control of your computer. Wayk
...

Database Browser Portable

This Easy to use tool allows
user to connect to any
database and browse or modify
data ,run sql scripts, export
and print ...

FreeFileSync

FreeFileSync is a free backup
software that helps you to
compare and synchronize files
and folders on Windows, Linux
and ...

Voxal Voice Changer
Software Free

Voxal is free voice changer
software for Windows designed
to enhance any game or
application that uses a
microphone. ...

EtherSensor PCAP Edition

EtherSensor is a
high-performance (over 20Gbps+
links) platform for extracting
events and messages from
network traffic ...

Crescendo Music Notation
Free Android

Crescendo Free is a simple and
intuitive way to create
musical compositions.
Crescendo allows you to
create, save and ...

Efficient Diary

Efficient Diary is a
completely free while still
cross-platform and powerful
electronic diary software
package. The ...

Soft4Boost Any Uninstaller

Soft4Boost Any Uninstaller
helps you to uninstall
software and remove unwanted
or corrupted programs
installed on your ...

Syncios

Syncios is an easy-to-use yet
powerful smartphone manager,
which enables to transfer,
manage or backup apps, photos,
...

wolfSSL

wolfSSL is a lightweight
SSL/TLS library targeted for
embedded and RTOS environments
primarily because of its small
size, ...