You may use any one of nineteen, industrial and military strength, encryption ciphers to secure your most precious private information including files, documents, and text messages. Simply load your file, select a cipher and cipher mode, enter your password and that is it, safe and secure encryption or decryption with just one click. It just could not get any easier.
Spyrix Personal Monitor is a powerful software for full and detailed REMOTE monitoring of user activity, including activity on social networks, IM chats and Web surfing. The program is perfect for parental control and control of employees. Main features: Remote monitoring via secure web account, Keylogger, Screenshots, snapshots from web camera, Live Viewing, Invisible, Undetectable to antivirus; monitoring: Facebook, IMs, Web surfing, Apps.
Windows 8 limits your start screen customization options to only a few provided background images and a few pre-defined color schemes. Decor8 removes these limitations and provides the freedom to personalize your start screen with your own images and colors.
Easily investigate all the web pages and images that someone has viewed. This program will succinctly show the web page title, date/time it was viewed, and thumbnails of all the images viewed. As an added convenience, it can search the computer and locate all of the cache folders for you.
BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller.exe), a standard BestCrypt icon appears in the Windows system tray from where commands can be run to mount or dismount container files and create new encrypted containers.
CryptoTE is a text editor with integrated strong cryptography. It is based on the popular Scintilla widget and automatically stores text data in secure encrypted container files. Compared to other "password keeper" programs, CryptoTE does not force any structure upon your data: it works with plain ASCII text and does not require you to fill in grids, key-value attributes, descriptions etc.
KillDisk Desktop is a data destruction hardware that securely erases all the contents stored on hard disks and other storage devices. It permanently deletes all data so that it will never be recoverable, and it can automatically erase up to five hard disks as soon as you connect them to the system. For extra peace of mind, it can also print out certificates and reports detailing the process.
Keyboard Tracer is an easy-to-use tool to record keyboard and monitor keystrokes on your own computer. It can track activities of other people using your keyboard without your permission. Keyboard Tracer runs in invisible mode automatically after Windows starts up.
Audio Watermarking Tools 2 (AWT2) of www.audiowatermarking.info are software utilities for embedding (and extracting) short data payload within audio streams (wave files). The tools are distributed as a package of GUI and console utilities running on Microsoft Windows, Apple Mac OS X and Linux. The watermark is highly robust. It survives almost all kinds of audio conversions: transcoding using MP3, Ogg Vorbis, air transducing, etc.
EraseMaster allows you to clean your Internet history, cookies, cache, index.dat files, temp files, Windows search history, and more. EraseMaster completely cleans your system, ensuring your computer and Internet use cannot be revealed by anyone. It is very easy to use and performs all its cleaning tasks with just a single click of a button! Other features include plug-ins for popular applications, scheduled cleanups and running in stealth mode.
Free LDAP Password Recovery and Auditing Software