Strong file protection by 128-2048 bit encryption (AES 256-bit and RSA 2048-bit are also supported). Secure file deletion is also supported: U.S. DoD 5200.28, GOST P50739-95 and others. USB Flash Drives can be used as the storage for strong encryption/decryption keys. Creating Self-Decrypting executable files. Powerful command line utility. Ability to encrypt/decrypt files from Windows Explorer in 1-2 mouse clicks.
Toms AD Object Recovery is a free Windows utility for querying your Active Directory for deleted computer, user, group, or other objects and restore them on-the-fly. SUPPORTED OBJECTS: * Computer Objects * User Objects * Group Objects * Organizational Units * Print Queues * Full volume Encryption Objects (BitLocker Recovery Keys) No domain controller downtime - Restore object attributes - Highlighted Search
These days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning secure password management, a random password generator, own encryption engine, txt export..
RogueKiller is a useful application which will scan the running processes from your computer and kill those who are malicious.The interface is based on a regular window with seemingly cluttered options, where a pre-scan mode automatically starts at initialization and kills any suspicious processes. The file list shows the status, type, process ID, name, and path for each item.
Command-line Tool to Hide DLL in a Windows Process
G-Zapper helps you stay anonymous while searching Google by blocking and deleting the Google search cookie. Did you know that Google stores a unique identifier in a cookie on your PC, which allows them to track the keywords you search for? G-Zapper helps you protect your identity and search history by allowing you to view your Google ID, see how long your searches have been tracked, erase your searches, and block the Google search cookie.
WiFi Security Guard is the free command-line tool to monitor and shield your Wireless Network from hackers and unauthorised users.
i-Catcher Console will provide a complete scalable CCTV system, with motion detection, remote web interface, alerting, simultaneous record & playback, scheduled activity, device control, and flexible display options, exceeding the standards you'd expect from a modern digital CCTV system.
The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
Best Free Keylogger is a feature rich Windows Monitoring System intended for parental control and employee monitoring. It's main features are Keystroke Recording, Internet activity Monitoring, Application Monitoring, Clipboard Monitoring, Chats and password logging & Screen Capturing. It also provides following functions: Invisible mode, Auto uninstall (silent mode), Automatic log clear, Log file encryption & Remote Monitoring.
Stealth Keystroker is an undetectable keystroke logger (keylogger) which allows you to secretly record all activities of computer users and automatically deliver the logs to you via Email or FTP. Stealth Keystroker records all the system activities, such as email sent and received, websites visited, all keystrokes, passwords, chat convos, and takes screenshots at set intervals just like a surveillance camera. See more at www.key-stroke.com