Wise Folder Hider is designed to password-protect your folders and files from being seen, read or modified by the priers. It provides enhanced security for files and folders on your Windows PC, blocking the unauthorized access of your private files or folders.
Image Vault is the ideal and easy to use solution to keeping your images and pictures private and away from the prying eyes of children, parents, partners and employers etc. With Image Vault you can create a vault file into which you can encrypt, store, manage and view any image file and keep them password protected and secret from the eyes of others.
PassMeter is a free password generator capable of generating single and massive amounts of cryptographically-secure passwords. PassMeter provides lots of options to customize passwords to the users various needs.
Safe365 File Shredder Wizard can permanently erase selected data from PCs, hard drives, RAIDs, Servers, USB drives, memory cards, digital cameras, SD cards, external hard drives which makes it impossible for anyone to retrieve.
Cypditor is an ideal tool for people who share very sensitive data with somebody else with a high-secure encryption algorithm (AES). No other software needed: application and documents are in one. No installation required!
iAlertU is a very useful alarm system for your Apple MacBook computer. Basically iAlertU is a car alarm for your Mac. iAlertU uses the built in sudden motion sensor (SMS) device to detect movement of your MacBook and triggers an audible and visual alarm. The alarm can also be triggered by keyboard and mouse/trackpad movement.
Secure Oracle Auditor (SOA) the most comprehensive Risk Management Software for Oracle database security which conducts vulnerability assessments and security auditing within minutes, which is capable of scanning multiple Oracle database servers. This Oracle security software provides Oracle audit tools, Oracle password tools, database scanner software.
SecQua is an open source project written in Python, that tries to quantify the security of a given Information System, using a novel security metric, trying to provide a deterministic, unbiased, objective and efficient measurement. The approach is vulnerability driven and in order to get as much unbiased results, it makes use of the National Vulnerability Database.