Processed through Paypal
No account required.


​​Facebook​​Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Privacy, Personal Information Protection and Encryption   
Files
  File Name Rating Downloads
Last Update/Developer
Alternate File Shredder 1.622
Alternate File Shredder 1.622 This program offers the possiblity to finally delete files and/or folders (no recovery possible). The program also can overwrite the free space on a drive, which means, that already deleted files cannot be restored, too. Open source (MS VC++ 2005)!! Windows NT 4, 95, 98, Me, 2000, XP, Server 2003, Vista, Server 2008, 7, 8, 8.1 Languages included: English, german, spanish, french, italian, chinese, japanese, korean Changes in this version: - Korean translation updated
5/5 1,105 Sep 06, 2016
Alternate Tools
BCTextEncoder 1.01
BCTextEncoder 1.01 Never worry that someone might read a confidential email, BCTextEncoder will easily encrypt part or all of your messages. Easily encrypt your messages using strong and approved symmetric and public key algorithms for data encryption. BCTextEncoderTM utility software simplifies encoding and decoding text data. Plain text data is compressed, encrypted and converted to text format, which can then be easily copied to the clipboard or saved as a text file. BCTextEncoder uses public key encryption methods as well as password-based encryption.
5/5 3,459 Sep 06, 2016
Jetico Inc.
BlackBeltPrivacy Tor+WASTE 3.01.2014.01
BlackBeltPrivacy Tor+WASTE 3.01.2014.01 Tor helps keep you safe online.. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous(). An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE). Features: 4 Modes, Censored Client, Bridge(default), Relay and Exit - chosen by you at install time. Be sure to check-out the screen shots. Friendly support provided. Streamlined Installation Package. No additional configuration necessary for server, client or darkNet() Auto Firefox config. Optional Tor Relaying, bandwidth restricted. From 0->100mb or 0->500mb per day - its your choice. Regularly updated includes auto-configured Obfsproxy, for censored-clients and bridge-operators Screen shots may differ due to our continuous development cycle. •NOTE: Linux/Unix/MacOSX Compatibility is obtained via WINE. (tested working) •NOTE: The core tor team no longer ship a proxy. We have adopted the same.
No Votes 3,546 Sep 06, 2016
darkNet()
Blackbird 0.9.98 32bit
Blackbird 0.9.98 32bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Removes W10 Upgrade Popups Block Win10 upgrade (GWX) messages on Windows 7/8 and remove downloaded Win10 pre-install files/folders. Prevent your PC from auto-installing Windows 10 while you're not looking. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free & Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated & Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. ## Blackbird V6 Changelog ## v0.9.98 - Latest - Added a switch to fix LAN connectivity problems after running Blackbird v0.9.97 or later (blackbird -l) - Fixed Recovery mode not properly restoring some registry ...
5/5 540 Nov 11, 2016
Blackbird Software
Blackbird 0.9.98 64bit
Blackbird 0.9.98 64bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Removes W10 Upgrade Popups Block Win10 upgrade (GWX) messages on Windows 7/8 and remove downloaded Win10 pre-install files/folders. Prevent your PC from auto-installing Windows 10 while you're not looking. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free & Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated & Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. ## Blackbird V6 Changelog ## v0.9.98 - Latest - Added a switch to fix LAN connectivity problems after running Blackbird v0.9.97 or later (blackbird -l) - Fixed Recovery mode not properly restoring some registry keys - ...
5/5 599 Nov 11, 2016
Blackbird Software
Blank And Secure 4.44 32bit
Blank And Secure 4.44 32bit Blank And Secure is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. The other overwriting standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard is not implemented, because in my test i had no measurable improvement, for that reason is that not implemented in "Blank And Secure" ;) # Usage: Add the files or folders via drag and dropp on "Blank And Secure" or program icon on the desktop. Then press "delete". The file(s) will be rewritten with NULL before deleting, so the content is now irreparable. Press the button "Fill the free space with null" this will remove the standard deletion tracks from the harddrive . # Features: # Very Small # Overwrite the Files 1-32 times with NULL and delete. # Fill the free HD space with null # Secure delete and Shutdown the PC # Remove the standard deletion tracks from the harddrive # Optional translation feature # Drag and Drop # Portable # Multilingual # .... # Options: Reset: Clear the List Contents (not delete the files). Delete: Overwrite folder and files with NULL and delete. Overwrite X times: Overwrite the data X times with NULL. Delete Delay X-sec.: At this time you can stop the erasing procedure with the key [ESC]. Fill the free space with null: This will remove the standard deletion tracks from the harddrive. # Operating systems: Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Home, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8, Windows 8 Enterprise, Windows 8 Pro, Windows 7, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, ...
5/5 5 Aug 01, 2017
Nenad Hrg
Blank And Secure 4.44 64bit
Blank And Secure 4.44 64bit Blank And Secure is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. The other overwriting standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard is not implemented, because in my test i had no measurable improvement, for that reason is that not implemented in "Blank And Secure" ;) # Usage: Add the files or folders via drag and dropp on "Blank And Secure" or program icon on the desktop. Then press "delete". The file(s) will be rewritten with NULL before deleting, so the content is now irreparable. Press the button "Fill the free space with null" this will remove the standard deletion tracks from the harddrive . # Features: # Very Small # Overwrite the Files 1-32 times with NULL and delete. # Fill the free HD space with null # Secure delete and Shutdown the PC # Remove the standard deletion tracks from the harddrive # Optional translation feature # Drag and Drop # Portable # Multilingual # .... # Options: Reset: Clear the List Contents (not delete the files). Delete: Overwrite folder and files with NULL and delete. Overwrite X times: Overwrite the data X times with NULL. Delete Delay X-sec.: At this time you can stop the erasing procedure with the key [ESC]. Fill the free space with null: This will remove the standard deletion tracks from the harddrive. # Operating systems: Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Home, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8, Windows 8 Enterprise, Windows 8 Pro, Windows 7, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, ...
5/5 5 Aug 01, 2017
Nenad Hrg
BleachBit 1.12
BleachBit 1.12 BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows and more. Features simple: just check the boxes quick: clean all applications in one place secure: overwrite files to hide contents powerful: clean 1000+ applicationdq safe: options are clearly labeled to avoid surprises Changes These are the changes since version 1.10: Fix error Favicons is version 32 with Google Chrome 51 (reported by Holger) Fix cleaning of Thumbnails in new Chromium and Google Chrome (reported by ineuw, patrick) Fix crash with corrupt BleachBit.ini (reported by BitBleacher) Fix error UNIQUE constraint failed error cleaning Firefox (reported by danjackson1 and gravy45) Specific to Linux Update EasyTAG cleaner (thanks to devmapper0) Update Epiphany cleaner (thanks to devmapper0) Update Evolution cleaner (thanks to skquinn) Update GNOME cleaner (thanks to devmapper0) Update KDE cleaner for KDE 4 on openSUSE (thanks to Mailaender) Update Rhythmbox cleaner (thanks to devmapper0) Update Thumbnails cleaner (thanks to devmapper0) Update Transmission cleaner (thanks to devmapper0) Update X11 cleaner (thanks to devmapper0) Switch from GnomeVFS, which is deprecated, to GIO (reported by MM) Do not repeat Google Chrome cache in preview (reported by Daniel Che) ...
5/5 297 Jan 02, 2017
Andrew Ziem
BMP Wrap 2.0
BMP Wrap 2.0 Ever needed to email a file but it keeps on bouncing because it's an illegal attachment? Renaming the file or storing it in a ZIP archive sometimes works, but many ISP can detect that low-tech obfuscation. You need BMP Wrap. BMP Wrap temporarily hides a file inside a valid .BMP image. Once hidden, you can send the BMP file to anybody you wish and they can then extract that file from the BMP image using BMP Wrap. Now you can send EXEs, DLLs, or whatever file format you want, and the destination mail server will never be the wiser. No installation is required - just save the EXE file to your desktop, and then drag the file you want to wrap/unwrap onto the the BMPWrap Icon (a new .BMP file is created, the original file is left unmodified). This program is free & does not include any ad-ware or other malware.
5/5 14 Jan 27, 2017
HCI Design
CrococryptFile 1.6
CrococryptFile 1.6 CrococryptFile is a file encryption tool which creates encrypted archives of arbitrary files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256) Features file encryption encryption aes twofish pbkdf2 cloak pgp Version History 1.6 (05/13/2017): New: Support for Russian added (Special thanks to Aleksey Cheremnykh / Алексей Черемных)
5/5 7 May 19, 2017
Frank Hissen
Crypter Geek 2.0
Crypter Geek 2.0 Encrypt / Decrypt text files by this mysterious encryption tool, No installation required. Warning: Windows Defender and other anti-malware programs may incorrectly detect this as malicious. It is a clean file.
5/5 831 Feb 25, 2017
Christos Beretas
DeepSound 2.0
DeepSound 2.0 DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE). System requirements: - Windows XP/Vista/7/8 - Microsoft .NET Framework 3.5 Documentation: 1 DeepSound 2.0 1.1 Hide data into carrier audio file To hide data into audio file, follow these steps: Select carrier audio file or drag and drop audio file (flac, wav, wma, mp3, ape) into the file explorer. Click to 'Add files' or drag and drop secret files into the panel on the right side of application. Press F3 key or click to encode secret files. You can choose output audio format (wav, flac or ape). DeepSound does not support wma output format. If you want to hide data into wma, hide secret data into wav file and then use external software such as Windows Media Encoder for convert wav to wma lossless file. In settings dialog you can turn On/Off encrypting and set password. Modified audio file will be copied to output directory. Click Ok to start hiding secret files into carrier audio file. 1.2 Extract secret data from audio file or audio CD track To extract secret data from audio file, follow these steps: In the file explorer, select audio file or audio CD track, which contains secret data. If the secret files are encrypted, enter ...
5/5 871 Mar 16, 2016
Jozef Bátora
DeleteOnClick 2.3.0.0
DeleteOnClick 2.3.0.0 DeleteOnClick is a very simple to use file secure delete utility for Microsoft Windows 98SE/ME/ 2000/XP/2003 and Vista. Any type of file can be deleted, including NTFS compressed and NTFS encrypted files. DeleteOnClick completely deletes files in one click and the data becomes unrecoverable, and also has the option to wipe free disk space. For this reason you must use the program carefully. Once a file is 'Securely Deleted' no one can undelete it.
0/5 3,229 Feb 24, 2014
2brightsparks
Easy File Locker 32bit 2.2
Easy File Locker 32bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 3,088 Jan 13, 2017
XOSLAB.COM
Easy File Locker 64bit 2.2
Easy File Locker 64bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 3,119 Jan 13, 2017
XOSLAB.COM
Eraser 6.2.0.2979
Eraser 6.2.0.2979 Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8 ,10 and Windows Server 2012. Eraser is Free software and its source code is released under GNU General Public License. Why Use Eraser? Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems, the list continues. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first. Your first thought may be that when you ‘delete’ the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. Eraser Features It works with Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8,10 and Windows Server 2012.Windows 98, ME, NT, 2000 can still be used with version 5.7!.It works with any drive that works with Windows.Secure drive erasure ...
5/5 258 Aug 31, 2016
The Eraser Team
ExtractFace 5.2.2
ExtractFace 5.2.2 Investigators, researchers or other analysts often have to get local copies of Facebook data. It can be necessary for a lot of reasons like submitting Facebook data as evidence, doing advanced offline analysis, etc. But Facebook interface has not been designed for that and does not provide printing or saving functions. Even for a user that want a copy of a conversation in his profile, there is no simple solution. ExtractFace has been designed to help people to extract data from Facebook. It provides usefull functions to automate a lot of tasks that have to be done manually otherwise. See documentation for more details. How it works ExtractFace can be installed using the installer or used as a standalone application. In order to start using it, just run the executable file from the start menu or the directory you install it. While running, you can access functions by right clicking the ExtractFace tray icon in the taskbar. I recommend you to customize your taskbar to make this tray icon always visible. If you don't know how to do it, look at this page: How to Customize and Tweak Your System Tray Icons in Windows. ExtractFace uses MozRepl add-on* to automate Mozilla Firefox browser. So you can crawl Facebook as normal with Firefox and use ExtractFace to automate some annoying things like scrolling or clicking in order to get additional content. When the content is fully loaded in your browser, you can print to PDF, capture screen, or use ExtractFace again to dump the data in a usefull way. Be aware that you better should not use Firefox when a ExtractFace function is running. What do you need Windows XP SP2 or newer Mozilla Firefox MozRepl add-on https://addons.mozilla.org/en-US/firefox/addon/mozrepl/ A Facebook account Version History Version 5.2.2 ...
5/5 29 Apr 10, 2017
Alain Rioux
Fastlock v1.2
Fastlock v1.2 Fastlock is a small and fast utility to hide the screen activity with a security password. This tool blocks any windows control components: Alt+F4, Alt+Tab, Task Manager, Windows Keys, Security Screen. There is no way to kill Fastlock's process and get access to your desktop. Difference to system's lock screen: There is no CPU deceleration, which enables you an instant access to your programs after unlocking. Notice, that Fastlock is only a temporary solution to lock your screen. Changelog: Version 1.2: - Fixed taskbar and starbutton flickering - Fixed possible access to the startmenu by spamming winbutton - Implemented new error exceptions - Changes in the Fastlock's Password Tool are now being processed in real-time - Locked keys and changing keyboard layout are now being displayed
5/5 9 May 30, 2017
2xDSoft
File Access Monitor 1.0.2
File Access Monitor 1.0.2 File Access Monitor is a multipurpose tool that monitors access to your files and provides detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, as well as on a local computer where it will track local users file access. It is similar in nature to Windows auditing features yet is much easier to use and provides flexible reporting capabilities and notifications. Key features Monitors file actions: creating, moving, deleting, reading and writing to files. Records remote user access to shared folders. Keeps track of local users as to what files they access. Features a powerful filter system to include or exclude certain activities. Self-contained, doesn’t require a database server alongside. Supported platforms Windows XP through Windows 10, Windows Server 2003 through 2012 32-bit and 64-bit Changelog: 2016-10-10 1.0.2 This software is now freeware.
5/5 63 Dec 14, 2016
SoftPerfect
FileCrypt R1.0 Rev4
FileCrypt R1.0 Rev4 FileCrypt is a fast, free and secure file encryption software. It's portable and very easy to use. Supported algorithms: AES, RC2 and TripleDES. All are available in their supported key sizes. More algorithms may be added in the future. It encrypts your files very securely using 32-bit long salts and a IV. You can drag and drop files into FileCrypt to quickly add them. Press F10 on your keyboard while not setting a password to switch between visible and non visible password mode. System Requirements: 1,2 GHz Single-Processor, 512 MB RAM, Windows Vista or higher, .NET Framework 4.5.2
5/5 12 Aug 01, 2017
Davaxyr
Files Terminator Free (PORTABLE) 2.6.0.0
Files Terminator Free (PORTABLE) 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 3,441 Jan 19, 2014
Elefant Software
Files Terminator Free 2.6.0.0
Files Terminator Free 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 3,431 Jan 19, 2014
Elefant Software
Free File Camouflage 1.25
Free File Camouflage 1.25 Want to save a copy of your personal file on a USB Pendrive but you are worried that, in case of theft, someone will be able to access your data? With Free File Camouflage you can hide your files inside a JPEG image! The software can be used with the main interface or via the explorer "send to" context menu (the first time you only need to select a directory with some images). All the files are encrypted using AES and hidden inside an image. What happens if someone tries to open a camouflaged image? Well... nothing! He will only see the image. Change Info: Version 1.25: - added a new registration method: SMS. Useful if you don't have a credit card or PayPal - new error reporting system engine - various code fix - updated internal libraries code
5/5 3,009 May 31, 2017
My Portable Software
Free File Wiper 1.76
Free File Wiper 1.76 Delete files securely with this software! Just right click on files or directories and select "Send to / Free File Wiper" to erase them completely! Or ... you can drag and drop them on the trashcan to perform the wipe operation. The files will be overwritten with standard and random patterns. After the wipe, the files cannot be undeleted and restored. Up to four wipe methods (from 1 pass to 7 passes). Change Info: -updated registration library code
5/5 3,005 Apr 01, 2014
My Portable Software
Free Hide IP 4.1.8.8
Free Hide IP 4.1.8.8 Free Hide IP - The best free privacy protection software. Free Hide IP the best way is to keep your IP address from being shown to others. Hackers and identity thieves are becoming more and more rampant in today's society. They may break into anyone's computer and monitor one's activity or steal one's identity or other personal information. To stay safe online, the best way is to keep your IP address from being shown to others. Now we provide you a FREE solution to hide your IP address. Use Free Hide IP to hide your real IP address for free, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click.
5/5 3,533 Jun 07, 2017
Free Hide IP
G Security 1.0
G Security 1.0 G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys like Alt+tab, Ctrl+Alt+Esc, Alt+F4 etc will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time on a single computer with settings stored for each user individually so that each user can use G Security with its own preferences. G Security also supports hotkey to lock the system. In a few words its extremely secure, easy to use and configurable desktop locking solution available for everyone free of cost. Some of its key features include : Its easy to use. Its a Freeware. Fully locks down your computer. Can protect Windows on startup. Suitable for all kinds of users. Multi user support. ...
5/5 393 Jun 20, 2016
Malik Usman Aura
GuardAxon 3.9
GuardAxon 3.9 GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
5/5 1,355 Apr 18, 2015
The Geneosoft Team
GuardAxon 3.9 PORTABLE
GuardAxon 3.9 PORTABLE GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
No Votes 1,368 Apr 18, 2015
The Geneosoft Team
Hardwipe 5.2.0
Hardwipe 5.2.0 Hardwipe is the free data sanitization toolset used by activists, journalists, IT technicians and anyone needing to ensure that discarded, but sensitive, information can never be recovered by someone else. Freedom to Securely Erase Sensitive Information Use Hardwipe to permanently erase (or "hard wipe") data on disk and portable storage media. Hardwipe for Desktop provides a slick user interface with optional support for "right-click" context menus in Windows File Explorer. It can conveniently destroy files and folder contents on-demand, erase drives and USB media, and sanitize the Windows Recycler. Hardwipe for Desktop is free for non-commercial use.
5/5 685 Mar 27, 2017
Big Angry Dog
idoo File Encryption Free 7.1
idoo File Encryption Free 7.1 idoo File Encryption Free is easy-to-use File Encryption freeware by password protect. Free encrypt Microsoft Office documents (MS Word .doc, .docx,Excel .xls,Powerpoint .ppt. text), Images (PNG,TIFF photo,Lotus,PDF files,BMP,Jpg/Jpeg photos,GIF picture ), Media Video files (mp4 ,WMV,AVI,3gp,mp3,music,RMVB movies, RM films,audio) Features: Hide data hide your private files, folders, drives, to make them completely invisible to users programs. Lock data the locked files/folders/drives, can not open, be read, modified, moved, deleted, copied, or renamed. Protected files/folders without password. Files and sub-folders in a locked folder are also protected. Encrypt data it can encrypt files and folders of any type. Portable encryption packs and encrypts a folder into an executable (.exe file) with AES encryption. Safe delete no one can recover deleted data from your disk if you secure delete it. Password protected there's no other way to run or uninstall it if you do not have the password. Idoo is a very easy to use program with a user-friendly interface. Changelog: improve funtion from my user suggestions
0/5 2,398 Jul 17, 2014
Idoo Software
KeyLock 1.1.4
KeyLock 1.1.4 KeyLock is a program to lock your computer with an USB Flash Drive. Read all the features below: Safe: It's not possible to use your computer after you've locked it with KeyLock. Our exclusive technologies disable task manager, and disrupt the mouse, making it impossible to reach the desktop. After unlocking, everything will be recovered immediately and you can use your computer again. Easy and Fast: You quickly need your computer with the common Windows security? First you need to unlock, type your password, have a typo, type in again and finally, your pc is unlocked. With KeyLock, all these problems are solved: Put your USB Flash Drive in your computer and you can use it immediately. Energy Saving: Careful with your laptop battery? No problem with KeyLock. In the program, there are built-in features to save energy, like dimming the screen or slowing down the reaction speed. That way, you can have the best use of your battery with KeyLock! Customizable: Do you want to have another background or do you want to surprise the person that wants to unlock your computer with a different text? This is possible with the customizable options in KeyLock. Customize the lock-screen to your liking! System requirements: - Windows XP or higher (32/64 bit) - 512 MB of RAM (recommended) - 25 MB available hard-disk space - Intel Celeron D 430 @ 1.80 GHZ / AMD Athlon 64 3300 + (minimal), Intel Celeron N2820 @ 2.13 GHZ / AMD Athlon X2 Dual Core LS-5800 (recommended) - .NET Framework 2.0 or later New Features: Version 1.1.4 - Security improved - Minor changes in GUI - Added option to hide battery status - Added option to hide clock / date - Added option to hide warnings when unusual events occur (UWS) - Removed LPS - Added possibility to import / export settings - Bug fixes
0/5 1,932 Jan 23, 2015
Brabonet
KeyScrambler 3.8.0.0
KeyScrambler 3.8.0.0 KeyScrambler encrypts your keystrokes deep in the kernel, foiling keylogging attacks with scrambled, undecipherable data. This advanced method of keystroke protection defeats both known and unknown keyloggers. The friendly interface displays realtime encrypted stream of keystrokes so you see when and how KeyScrambler is working. Strengthens where defenses are the weakest in your traditional anti-virus, anti-malware programs and PC security. Compare Editions A free browser add-on, KeyScrambler Personal protects all your inputs in IE, Firefox, and Flock. KeyScrambler Pro and Premium are paid programs that protect a wide array of apps. How It Works KeyScrambler encrypts your keystrokes at the keyboard driver level and decrypts them at the destination application, giving keyloggers "scrambled," useless keys to record. For Online Games Both KeyScrambler Pro and Premium protect your player's IDs, passwords and digital assets in over two dozen online games. For Business Read how and why KeyScrambler is important for your business. KeyScrambler Premium protects critical systems and reduces risks of information theft at the workplace. Features KeyScrambler defeats known and unknown keyloggers; also protects Chinese, Japanese, and Korean inputs; is compatible with other security programs, tokens and smart cards; and requires no user effort. How To The user-friendly interface allows you to do things on KeyScrambler for a more comfortable, personalized fit. Supports: Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser.
5/5 2,764 Jul 29, 2015
QFX Software
KORO File Shredder 4.2.3.0
KORO File Shredder 4.2.3.0 KORO File Shredder is a program to erase sensitive data in a way that a recovery will be impossible. Data will be overwritten several times e.g. using the US DoD 5220.22-M ( ECE ) erasure method. Using File Shredder you can delete files and documents from your hard drive and must not worry about that they could be recovered anytime later. Software tools offered for retrieval of deleted files under Windows, usually called "file recovery" software, are taking advantage of the shortcoming of the Windows "delete" command we are normally using to delete files. In fact, the "delete" operation in Windows only removes some bits of information from file directories so that the files disappear from thefile manager view. To undelete such a file, it is just necessary to repair the entry in the file directory. To remove files permanently from your system, like a shredder does with your paper documents, you have to use a program that is capable of overwriting the files with a series of random generated binary data for multiple times. Thus, the current contents of the files will be overwritten in a way that a recovery is practically unpossible. Wiping out method Before deletion all files are overwritten using one of the following algorithms Zero (1 Pass): Overwrite the files with zeros. DoD (7 Passes): Overwrite files in accordance with the US Department of Defense regulation DoD 5220.22-M(ECE). Gutmann (35 Passes): Overwrite files using the method developed by Peter Gutmann.. This method is considered to be the most secure, but slow. KORO File Shredder will operate on the following versions of Microsoft Windows: Windows 8.1, 8, 7, Vista, XP, 2000 32-bit és 64-bit Operating system. Special features Easy to use interface Multiple preset shredding methods Support for internal and external drives Support for removable media (SD Flash, Compact Flash, USB drives) Fool proof warnings before deleting any files Custom shredding settings to fit your needs Protects system files ...
5/5 689 Jan 14, 2016
Robert Kovacs
KryptoFiler 1.0.2
KryptoFiler 1.0.2 Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Encrypt & Decrypt Large Files. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1.0.2 : added drag and drop
0/5 911 Sep 29, 2015
3nity Softwares
KryptoMessage 1.0
KryptoMessage 1.0 Encrypt and decrypt messages, mails and conversations through cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Unicode support. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1 : first release
0/5 911 Sep 29, 2015
3nity Softwares
Leo Folder Locker 2.0
Leo Folder Locker 2.0 Leo Folder Locker is a software to secure your data in a smart, fast , effective and secure way. Although your operating system may offer you the possibility to hide folders, they are easy to find and reveal, since they are not protected by anything else. Thus, they cannot be considered as an option if you need to secure your sensitive data, especially on computers shared by more users at once. Leo Folder Locker comes in handy when these situations occur. This software does not encrypt your data instead it relies on some Windows OS based techniques to lock down folders. This software uses some basic techniques which are pretty good to be used on usual data. This software is not recommended to be used in high sensitivity situations where hard core encryption is required. This software was only designed to be used in general situations. Some of its key features include : Lock Down Mode As a defense from password guessing. Self Destruction Mode to provide a high level security. An Beep System used as an alert. Fully Customizable Settings. A Password Recovery System just in case you forgot yours. A new CLI based easy-to-use UI. A Freeware By Malik Usman Aura.
5/5 394 Jun 20, 2016
Malik Usman Aura
MRU-Blaster 1.5
MRU-Blaster 1.5 Protect your privacy, and keep your PC free from clutter. Find and remove over 30,000 MRU lists. MRU-Blaster is a program made to do one large task - detect and clean MRU (most recently used) lists on your computer. These MRU lists contain information such as the names and/or locations of the last files you have accessed. They are located ALL OVER your registry, and for almost ANY file type. By looking at these MRU lists, someone could determine what files you opened/saved/looked at, what their file names were, and much more! (And, in many cases, the lists are displayed in drop-down menus automatically.) With additional plug-ins that allow you to clean out your Temporary Internet Files and Cookies, MRU-Blaster enhances the protection of your privacy! Clean Up Clutter MRU-Blaster safely, efficiently, and rapidly handles cleaning up tens of thousands of "usage tracks" and other remnants that most programs leave behind. These remnants aren't just a potential privacy concern - they can clog up your registry, and take up valuable space on your hard drive. Windows as well as most third-party programs are culprits. And MRU-Blaster can detect and remove over 30,000 different MRUs and usage tracks. Securely Erase Browsing Tracks MRU-Blaster also supports secure removal of Internet Explorer Temporary Internet Files (cache) and Cookies, with its built-in Plugins. The Internet Explorer cache alone can take up GB (gigabytes) of space on your hard drive. System Requirements MRU-Blaster works on Windows 95, 98, ME, NT, 2000, XP, Vista, 7.
5/5 23 Jan 27, 2017
Brightfort LLC
OandO ShutUp10 1.4.1385
OandO ShutUp10 1.4.1385 Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! Freeware More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Further information Portable Version – no installation required Operating System: Microsoft® Windows 10 OandO ShutUp10 EULA Important Features at ...
5/5 979 Dec 08, 2016
OandO Software GmbH
Password Safe 3.41
Password Safe 3.41 How many passwords do you have to secure? Start your safe and simplified digital life Free open source software Installation in minutes on Vista, 7, 8 and 10 Designed by renowned security technologist Bruce Schneier Over 4 million downloads Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work).
5/5 1,403 Mar 07, 2017
Password Safe
Pixeloid 1.1
Pixeloid 1.1 Pixeloid A novel and uber-secure way to store data The Pixeloid Matrix The all new Pixeloid Matrix is extremely dense and enables encoding of both text and images(β) along with an automatic ciphering of the data Password Protection Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices with Triple Data Encryption Standard (TripleDES) encryption over the automatic ciphering Licensing Pixeloid is Licensed to Ajay Menon and is completely free to use.
5/5 15 Aug 25, 2017
Ajay Menon
Privacy Eraser 4.1.1.1291
Privacy Eraser 4.1.1.1291 Privacy Eraser is an easy to use solution for protecting your privacy by deleting your browsing history and other computer activities. All main popular web browsers are supported, including Internet Explorer, Firefox, Chrome, Safari and Opera. With literally one click, Privacy Eraser will erase all digital footprints - web browser cache, cookies, browsing history, address bar history, typed urls, autocomplete form history, saved passwords, index.dat files, Windows' run history, search history, open/save history, recent documents, temporary files, recycle bin, clipboard, dns cache, log files, error reporting and more. Privacy Eraser also supports plugins to further extend the software's cleaning features. Meaning you can also delete whatever tracks are left behind by other applications with your own plugins. Privacy Eraser embedded more than 250 free plugins, supporting many popular programs such as ACDSee, Adobe Reader, Microsoft Office, WinZip, WinRAR, Windows Media Player, VLC Player, BitTorrent, Google Toolbar and many others. Privacy Eraser works with Windows 8.1/8/7/Vista/XP/2012/2008 (32/64-bit), and also supports Windows FAT16/FAT32/exFAT/NTFS file systems. The software implements and exceeds the US Department of Defense and NSA clearing and sanitizing standards, giving you the confidence that once erased, your file data is gone forever and can never be recovered. Main Features: Internet Explorer (IE), Firefox, Chrome, Safari and Opera Cleans internet cache, browsing history, cookies, typed urls, download history, autocomplete & autofill form history, saved password and much more. Windows Better computer security: cleans run history, search history, open & save history, recent documents, temporary files, recycle bin, clipboard, taskbar jump lists, dns cache, log files, memory dumps, error reporting and more. Third party applications More than 250 free, pre-configured plugins to clean the traces of many popular applications. You can also extend cleaning features by ...
0/5 1,277 Jul 10, 2015
Cybertron Software
Privacy Guardian
Keep your what you do on your computer and the Internet protected from prying eyes! Internet and Online Privacy PC Tools Privacy Guardian works with popular Internet browsers to erase your browsing history, search history, cookies, passwords, and download logs to help keep your Internet activities private. It even works with chat programs, media players, FTP browsers, email clients, and peer-to-peer file transfer programs to protect your other online activities as well. Everyday Computing Privacy PC Tools Privacy Guardian also helps maintain your day-to-day computing privacy. Temporary and recent file history erasers clear your temporary file folders, as well as your recently opened files lists, keeping your PC use and file access history private. Other cleaners erase Windows® history, including the ones found in Microsoft® Office, the Recycle Bin, your Recently Run programs, and the Find and Search bar. Secure File Deletion PC Tools Privacy Guardian helps ensure that the files you delete stay deleted with secure file shredding. And to further safeguard your Recycle Bin, a disk-bleaching tool wipes your free hard disk space, preventing of your deleted files from being restored by file recovery tools.
0/5 4,997 Mar 01, 2012
Pctools
PrivaZer 3.0.15
PrivaZer 3.0.15 With simply one click, PrivaZer is able to clean securely . Internet browsers . Index.dat . Cookies . Cookies Tor . Cookies Flash . Cookies Silverlight . DOM Storage . IndexedDB . AppCache . Registry . RAM . Pagefile.sys and Hiberfil.sys files . Use of software . Messengers . Histories of visited websites, viewed videos, use of software, opened docs, etc . Jumplists . Recycle bin . Temp files . Log files . Invalid Prefetch entries . Indexing service . ThumbCaches, Thumbs.db . Residual traces of deleted files . Free space . File table (MFT or FAT) . INDEX attributes in MFT . USN Journal, etc 1- Detection of residual traces in free space Visualization of residual traces of old files remaining in free space 2- Smart cleanup of free space Cleanup of residual traces in free space areas needing a reset to zero We assure no useless cleanups. Areas already reset to zero are not cleaned which can speed up cleanup by 2x to 100x. Cleanup runs faster after each run. 3- File table cleanup Cleanup of residual traces in file tables, not only in MFT but in FAT as well Additional cleanup of INDEX attributes in MFT 4- Smart overwriting Recognition of type of storage medium of your storage device : magnetic disk, SSD, etc Adaptation of overwriting algorithms to storage medium 5- Smart cleanup of Jumplists Cleanup of your Jumplists without deleting your pinned items/ websites which are preserved 6- Smart cleanup of Prefetch Removing of invalid Prefetch entries. Old valid entries are preserved. 7- Deletion of USB history Deletion of remaining traces of disconnected device (name, date, etc) 8- Scan and cleanup of Pagefile.sys / Hiberfil.sys content Visualization of Pagefile.sys / Hiberfil.sys content Pagefile.sys cleanup options : at each PC shutdown, or at next shutdown only Control of Hiberfil.sys cleanup : PrivaZer controls that the system has reset to zero Hiberfil.sys. If not, ...
5/5 3,724 Jan 14, 2017
Goversoft LLC
Program Blocker
Program Blocker Program Blocker is a portable TWC freeware that lets you block any desktop application. You can block it with a password or simply make it non-functional on your computer. The program is completely based on the idea of simply blocking applications from running, without taking any chances with the system, as a result of which the program does not make any changes in the registry and operates independently of the system. Features: Password protection Block applications Task manager Hidden mode
No Votes 3,099 Mar 20, 2014
The Windows Club
Proxy Mask - Proxy Switcher 3.4.4
Proxy Mask - Proxy Switcher 3.4.4 Proxy Checker and Switcher allow access to blocked websites Access blocked websites, and you can watch blocked YouTube videos such as This Video Is Not Available In Your Country (by changing your IP to different country), hide your IP address, surf anonymously without a trace on the Internet. You can access many of blocked websites without using proxy with Smart DNS Changer Free. Supports HTTP and HTTPS proxy servers You can define different proxy setting for different processes at the same time At least several hundred working proxies (always) Updates Working proxy list automatically Supports all windows (XP to windows 10, 32 and 64-bits) When to use Proxy Mask or Proxy Switcher Accessing blocked websites: Your ISP (Internet Service Provider) may block some websites. Normally, network adapters on your computer, uses your IPS DNS server, and most of blocked websites blocking by your ISP's DNS server. This type of restrictions can be bypassed by changing DNS server settings of network adapters. You can use the Smart DNS Changer Free to change your DNS settings. Some websites blocks by their IP addresses and this type of restriction cannot be bypassed by changing DNS server settings. In this case you should use Proxy Mask (Proxy Switcher) to access blocked websites. Bypassing websites region (country) restrictions: Some videos on YouTube cannot be watched from some countries (because of publisher restriction or copyright etc.), In this case YouTube shows text message on video player like This Video Is Not Available In Your Country. To bypass such restrictions you can use Proxy Mask (Proxy Switcher) to access restricted contents by changing your IP address to different country (by using Elite proxy ...
5/5 840 Feb 25, 2017
Rentanadviser.com
Psiphon v3
Psiphon v3 The Psiphon 3 Circumvention System is a relay-based Internet censorship circumventer. The system consists of a client application, which configures a users computer to direct Internet traffic; and a set of servers, which proxy client traffic to the Internet. As long as a client can connect to a Psiphon server, it can access Internet services that may be blocked to the user via direct connection. Features: Automatic discovery. Psiphon 3 clients ship with a set of known Psiphon servers to connect to. Over time, clients discover additional servers that are added to a backup server list. As older servers become blocked, each client will have a reserve list of new servers to draw from as it reconnects. To ensure that an adversary cannot enumerate and block a large number of servers, the Psiphon 3 system takes special measures to control how many servers may be discovered by a single client. Mobile ready. A Psiphon 3 client Android app will be available as part of the beta launch, and other mobile platforms are in the works. Zero install. Psiphon 3 is delivered to users as a minimal footprint, zero install application that can be downloaded from any webpage, file sharing site or shared by e-mail and passed around on a USB key. We keep the file size small and avoid the overhead of having to install an application. Custom branding. Psiphon 3 offers a flexible sponsorship system which includes sponsor-branded clients. Dynamic branding includes graphics and text on the client UI; and a region-specific dynamic homepage mechanism that allows a different home page to open depending on where in the world the client is run. Chain of trust. Each client instance may be digitally signed to ...
5/5 32 May 11, 2017
Psiphon Inc.
QuickStego 1.2.1
QuickStego 1.2.1 Free Steganography Software QuickStego lets you hide text in pictures so that only other users of QuickStego can retrieve and read the hidden secret messages. Once text is hidden in an image the saved picture is still a 'picture', it will load just like any other image and appear as it did before. The image can be saved, emailed, uploaded to the web What is Steganography? Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. An Example of Image Steganography ... A perfectly innocuous picture? Nothing special about it? Well if you download QuickStego and copy the above image into the system, you will see that there is a lot of 'secret text' hidden in this image. Try it and see! Or if you can't wait, move further down this page for a screen shot of what will be revealed ... QuickStego - Screenshots Load the image from above into QuickStego and the secret text that was hidden in the photograph is revealed: System Requirements & FAQ * Operating System - Windows XP or Vista or 7. * Display - 32 bit color depth required * Image Types that can be opened - .jpg/.jpeg, .gif, or .bmp formats * Saved Hidden Text Images - .bmp format only * Approximately 2MB of free hard disk space (plus extra space for any images)
5/5 15 Mar 31, 2017
Cybernescence ltd.
SafeIP 2.0.0.2595
SafeIP 2.0.0.2595 Hide your IP address and protect your online identity with SafeIP by hiding your IP from websites, email, games, and more. Features: Encrypt all your Internet traffic with a private proxy, either browsing at home or on public WiFi hotspots Choose the anonymous IP location closest to you for the fastest connection speeds SafeIP can be used completely free for unlimited use, without advertisements and never expires
No Votes 3,730 Jan 19, 2014
SafeIP, LLC.
Secret Disk 4.00
Secret Disk 4.00 Secret Disk can create additional disk on your PC, which can be invisible and locked with a password within one second. You can make your private files and folders invisible and protected. You don't need to format your hard disk or make any changes to boot sector. Our program will create new disk automatically very quickly. You can make this disk invisible, including all contents, and protect it with a password. You can store any files and folders on the disk. Secret disk works as usual hard disk and compatible with any other programs which you have installed. You can have more than one secret disk and you can also choose disk letter. In case of power outage or fatal error of OS Windows your secret disk will be locked and become invisible automatically. It happens automatically because information are stored in the virtual memory. Secret Disk does not encrypt any files, it just limits access to your files (you can use password). Software ties virtual disk to your files. This will provide you enough security to hide your files from any person. What's new in version 4.00? Meet great visual changes! New design is here! • The main change in this release is a new design! We made some cleaning in the interface of the program. Now it looks better. Please send us your comments and suggestions using feedback form at our web site. • Now you can add your own images for disks, instead of standard. Just select any PNG image and it will be applied to the disk. Size of the image should be 90x90, but other dimensions are also fine. • Date of release: 16 June 2017.
5/5 1,044 Jun 19, 2017
PrivacyRoot
SecretFolder 3.0.0.0
SecretFolder 3.0.0.0 SecretFolder is a security tool to hide and lock your sensitive folder out from the other users. It provides immediate data protection (protect and unprotect commands are executed in no time). Features: Free to use at both home and in the office Support for 64-bit Windows. NTFS, FAT32, exFAT and FAT volumes are supported. Unlimited number of folders can be protected at the same time. No limits on the size of protected data. No file system structure modifications will occur. Protected uninstall. When you create a secret folder, using your own password, you can manage folder. CMD command will not be able to access the folders.
No Votes 2,661 Jun 05, 2014
Oh!Soft
Spybot Anti-Beacon for Windows 10 1.6
Spybot Anti-Beacon for Windows 10 1.6 Spybot Anti-Beacon for Windows 10 is a small utility designed to block and stop the various tracking (aka telemetry) issues that come with Windows 10. Seeing the bunch of incomplete or broken scripts to disable tracking in Windows 10, and the tools that install adware or worse in exchange for their function, we wrapped disabling tracking up in a small tool that’s free and clean. With the upcoming news about telemetry in Windows 7 and 8.1, Spybot Anti-Beacon has added support for those as well. Changelog: Spybot Anti-Beacon 1.6 now available December 5th, 2016 Many thanks for all the patience waiting for an update to Spybot Anti-Beacon! We spent a lot of time working on Spybot 3. And now that Spybot Anti-Beacon will also be integrated into Spybot 3, we found time to continue work. Today’s update to Anti-Beacon 1.6 will add two new immunizers and a few new blocked hosts. More updates are already pending since we’re actively working on this feature again (including a new look, but mostly focused on function of course)! Spybot Anti-Beacon 1.6 can be downloaded from here. Updates: Additional Telemetry Immunization Categories Additional Blocked Hosts Fixes: Immunization of Office 13/16 Telemetry Scheduled Tasks and Options is possible even if Microsoft Office is not installed (previously they appeared to immunize correctly, but the immunization could not be undone in Anti-Beacon) Don’t forget to always run Spybot Anti-Beacon as an administrator by right-clicking the downloaded installer, and choosing the option to “Run as administrator”. This will ensure that Anti-Beacon has the permissions it needs to function correctly.
5/5 1,052 Dec 06, 2016
Safer-Networking Limited
SpyDetectFree 32bit 1.0
SpyDetectFree 32bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
0/5 798 Dec 07, 2015
NesterSoft Inc.
SpyDetectFree 64bit 1.0
SpyDetectFree 64bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
1/5 824 Dec 07, 2015
NesterSoft Inc.
Tor Browser Bundle 7.0.4 for Linux, BSD, and Unix 32bit
Tor Browser Bundle 7.0.4 for Linux, BSD, and Unix 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. The full changelog since Tor Browser 7.0.2 (for Linux since Tor Browser 7.0.3) is: All Platforms Update Firefox to 52.3.0esr Update Tor to 0.3.0.10 Update Torbutton to 1.9.7.5 Bug 21999: Fix display of language prompt in non-en-US locales Bug 18913: Don't let about:tor have chrome privileges Bug 22535: Search on about:tor discards search query Bug 21948: Going back to about:tor page gives "Address isn't valid" error Code clean-up Translations update Update Tor Launcher to 0.2.12.3 Bug 22592: Default bridge settings are not removed ...
5/5 1,284 Sep 04, 2017
The Tor Project
Tor Browser Bundle 7.0.4 for Linux, BSD, and Unix 64bit
Tor Browser Bundle 7.0.4 for Linux, BSD, and Unix 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. The full changelog since Tor Browser 7.0.2 (for Linux since Tor Browser 7.0.3) is: All Platforms Update Firefox to 52.3.0esr Update Tor to 0.3.0.10 Update Torbutton to 1.9.7.5 Bug 21999: Fix display of language prompt in non-en-US locales Bug 18913: Don't let about:tor have chrome privileges Bug 22535: Search on about:tor discards search query Bug 21948: Going back to about:tor page gives "Address isn't valid" error Code clean-up Translations update Update Tor Launcher to 0.2.12.3 Bug 22592: Default bridge settings are not removed ...
5/5 1,288 Sep 04, 2017
The Tor Project
Tor Browser Bundle 7.0.4 for Mac OS X
Tor Browser Bundle 7.0.4 for Mac OS X What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. The full changelog since Tor Browser 7.0.2 (for Linux since Tor Browser 7.0.3) is: All Platforms Update Firefox to 52.3.0esr Update Tor to 0.3.0.10 Update Torbutton to 1.9.7.5 Bug 21999: Fix display of language prompt in non-en-US locales Bug 18913: Don't let about:tor have chrome privileges Bug 22535: Search on about:tor discards search query Bug 21948: Going back to about:tor page gives "Address isn't valid" error Code clean-up Translations update Update Tor Launcher to 0.2.12.3 Bug 22592: Default bridge settings are not removed ...
5/5 1,404 Sep 04, 2017
The Tor Project
Tor Browser Bundle 7.0.4 for Windows
Tor Browser Bundle 7.0.4 for Windows What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. The full changelog since Tor Browser 7.0.2 (for Linux since Tor Browser 7.0.3) is: All Platforms Update Firefox to 52.3.0esr Update Tor to 0.3.0.10 Update Torbutton to 1.9.7.5 Bug 21999: Fix display of language prompt in non-en-US locales Bug 18913: Don't let about:tor have chrome privileges Bug 22535: Search on about:tor discards search query Bug 21948: Going back to about:tor page gives "Address isn't valid" error Code clean-up Translations update Update Tor Launcher to 0.2.12.3 Bug 22592: Default bridge settings are not removed ...
5/5 3,460 Sep 04, 2017
The Tor Project
USB Raptor 0.0.8.61
USB Raptor 0.0.8.61 Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function Features Automated Windows lock/unlock with the use of common USB flash drives Compatible with all types of USB flash drives Robust design Easy to setup and use High security option to verify the serial number of the flash drive Various alternative unlock methods Supports LAN lockdown (and unlock) function Synchronized lock and unlock on LAN for multiple PCs Status report over internet and LAN Supports serial command integration (beta stage) Tray icon based application Option to delay and cancel the lock, to avoid unwanted locks Windows 10, Windows 7, Windows 8 and Windows XP compatible Multi screen systems ...
5/5 638 Feb 08, 2017
Nikos Georgousis
VeraCrypt 1.21 for Linux
VeraCrypt 1.21 for Linux VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes Changes between 1.20 and 1.21 (9 July 2017) : - All OSes: * Fix 1.20 regression crash when running on CPU not supporting extended features. Windows: * Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount. * Fix 1.20 regression that causes system favorites not to mount in some cases. * Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard. * Install PDF documents related to EFI system encryption configuration for advanced users; - disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption - dcs_tpm_owner_02.pdf related to TPM configuration for EFI system encryption. FreeBSD: * Add support for building on FreeBSD.
5/5 1,006 Jul 11, 2017
IDRIX
VeraCrypt 1.21 for Mac
VeraCrypt 1.21 for Mac VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes Changes between 1.20 and 1.21 (9 July 2017) : - All OSes: * Fix 1.20 regression crash when running on CPU not supporting extended features. Windows: * Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount. * Fix 1.20 regression that causes system favorites not to mount in some cases. * Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard. * Install PDF documents related to EFI system encryption configuration for advanced users; - disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption - dcs_tpm_owner_02.pdf related to TPM configuration for EFI system encryption. FreeBSD: * Add support for building on FreeBSD.
5/5 1,000 Jul 11, 2017
IDRIX
VeraCrypt 1.21 for Windows
VeraCrypt 1.21 for Windows VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes Changes between 1.20 and 1.21 (9 July 2017) : - All OSes: * Fix 1.20 regression crash when running on CPU not supporting extended features. Windows: * Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount. * Fix 1.20 regression that causes system favorites not to mount in some cases. * Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard. * Install PDF documents related to EFI system encryption configuration for advanced users; - disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption - dcs_tpm_owner_02.pdf related to TPM configuration for EFI system encryption. FreeBSD: * Add support for building on FreeBSD.
5/5 1,048 Jul 11, 2017
IDRIX
W10Privacy 2.2.0.1
W10Privacy 2.2.0.1 The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea for the development of this little program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! This program may trigger anti-virus warnings since it changes core Windows settings.. These are false warnings. This program contains no viruses or malware. Changelog: 2.2.0.1 (06.02.2017) - W10Privacy automatically creates a backup of the settings in the file " W10Privacy_Settings_First_Start.ini " (this does not apply to the CommandLine mode). This can be used in the future as long as the creation of a backup configuration was not done manually, in order to switch to the original settings (many thanks to Kurt for the meaningful reference!). - Adding the Russian language. Thank you at this point to "karabidon" for providing the lyrics!
5/5 652 Mar 29, 2017
Bernd Schuster
WebCam On-Off v1.2
WebCam On-Off v1.2 Webcams may let you stay in touch with friends and family also a webcam allows you to record and stream video from your computer or laptop to the Internet or a video file. When you are not using your webcam, you may wish to disable it to ensure it is not recording by accident and they also pose risks of people hacking into them and spying on you surely ,Malware can take over webcams, so there is potential for your camera to spy on you , Most hackers utilize so-called Trojan horse attacks , they can take control of your webcam and make videos and take pictures of you without your knowledge. If you’re a parent, there are a few reasons why you may want to disable your webcam, all of them having to do with safety. Video instant messaging and websites aren’t always child-friendly, and you may decide disabling your webcam is your best recourse. If you have an external webcam, unplug the USB cord that connects the camera to the computer, and hide the camera somewhere your kid won’t find it! , But it is not the best way because if you need it every 2 – 3 hours will you hide it again and again ? and what about if you have a built-in camera ? the Washington Post highlighted an unnerving study published at Johns Hopkins University which found that a laptop webcam can function in relative secrecy-a slightly subtler Eye of Sauron Webcam-spying—particularly the variant that involves disabling LED indicator lights—takes quite a bit of effort, but the practice isn’t limited to the realm of benevolent academics. The FBI has also publicly acknowledged its ability to employ such techniques when investigating criminal activity As you see disable the webcam completely is the safest way to ...
5/5 1,166 Jun 04, 2015
Sordum.org
Who Stalks My Cam V2.0
Who Stalks My Cam V2.0 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ...
5/5 739 Mar 07, 2017
PHROZEN SAS
Win.Privacy 1.0.1.8
Win.Privacy 1.0.1.8 Win.Privacy. What is it? Microsoft released its new OS (Operating System). Windows 10. Almost every review regarding Windows 10, points out how perfect it is and deems it a next generation OS. We can't disagree that Windows 10 is actually a really efficient and a modern operating system. However, behind "the stage" it hides some secrets that the majority of the users cannot perceive. To be more precise, Microsoft is "spying" on you. Everything you search or say(by using Cortana) is being transferred to Microsoft. Which means that Microsoft has access to your computer at any time and of course it has access to see everything you do. I should finally get to the point. I decided to create a tiny tool that actually blocks a decent amount of windows services which collect information about you. I am not going to assure you that after using my tool Microsoft won't have access to your personal data, since that would be a lie. However, I will try to develop Win.Privacy as much as I can and collect more and more Windows services that might be spying on you. How to use Win.Privacy? Win.Privacy's user interface is actually very simple and easy to use. The user only has to click one button to block the Windows services. After that, the user can click the button called "Open hosts File" to open the hosts file in order to check out the work that has been done by the program. Click "Fix Privacy Issues" button. Wait until it's done (Win.Privacy will write the hosts file. It won't take long). Click "Open hosts File" button to open the hosts file to inspect changes made. (Optional) Done! That's all. More Options Available. Disable ...
5/5 21 Jun 08, 2017
Antony Koinousis
WinGuard Pro 2014 8.9.2.3
WinGuard Pro 2014 8.9.2.3 Secure your computer by password protecting your Windows applications, programs and EXE files. Plus, protect your data with encryption for your files, folders and drives - directly from Windows Explorer. Extra features allow you to disable the Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and more. Features: Lock Programs, Applications, EXE Files with a Password Lock any folder with a password Disable Windows at Boot Disable Software Installation and Downloads Password Protect Windows Explorer Password Protect your Web Browser, inc. Internet Explorer, FireFox, Opera and more Parental Time Control It's FREE, no advertising or spyware Works alongside your firewall and anti-virus program Advanced edition also includes: Add your own program for protection Disable Canceling of Password Prompt Configure Multiple User Accounts Password Windows at Boot Password Internet Explorer Disable Software Installation Use Software in Commercial Enviroment
5/5 3,688 Nov 02, 2013
WGSoft
WinMend Folder Hidden 1.4.9
WinMend Folder Hidden 1.4.9 WinMend Folder Hidden is a free file/folder hiding tool. While ensuring the absolute system safety, this application can quickly hide files and folders on local partitions and/or on removable devices. The hidden files/folders will be safely hidden whether the drive is accessed in another operating system on the same computer or reinstalled on another computer. You can set a password for this application. Hidden data can be displayed and unhidden only when the user enters the valid password. The data is completely invisible to other programs or on other operating systems. However, please keep in mind that this application is for home use only. It’s not recommended for commercial settings where more strict confidentiality is required. Supports Language: English, French, German, Hungarian, Spanish, Dutch, Arabic, Greek, Korean, Itanlian, Slovak, Vietnames. Features 1. Safety First The hiding technology will never damage any file data. It is safe and reliable. 2. High-Speed Hiding and Unhiding Whether it’s a file of dozens of GB, or a folder containing a lot of files, the file or the folder can be hidden and unhidden instantly. 3. Removable Drives Are Supported Files and folders on removable drives such as USB drives hidden by WinMend Folder Hidden are invisible not only in the computer where the hiding was completed, but in any computer.
0/5 835 Nov 09, 2015
WinMend.com
Wipe 17.00
Wipe 17.00 This powerful program can remove a lot of gigabytes of garbage on your computer and recover many free disk space. In addition, it will protect your privacy on the Internet - it removes records about personal activity on PC. You will be able to delete browser history and cache, index.dat files, registry, internet cookies files, autocomplete-history, temporary internet files and many many other items. This program also erases any other tracks of personal activity which you made when used your PC, and no matter in which program: Windows, Internet Explorer, FireFox, Chrome, Opera or any other... To prevent recovery of deleted data the program uses the following security methods: DoD 5220.22-M method, Gutmann method ( full 35 steps ), Russian GOST and other. You can also customize cleaning process and choose which items to remove and which is not. Or you can view detailed information about areas where garbage located on your computer. What's new in version 17.00? This program release dedicated to the new 2017 year, which is coming very shortly. We wish you all the best, happy new year! • First of all we have changed design of the program. Now it looks different, however, almost all buttons on the same places so you will recognize your favorite program easily. In next year the program will look more classical, with black and dark-red colors. • Fixed critical error which appears sometime during cleanup. • We have identified 755 error and we have provided more information about it. We're working to find a solution. • Added new option in the preferences for the TrayAgent. Now you can hide icons of the programs in the menu for faster load. • Added support for new browser Maxthon 5. • Added support for new browser Cyberfox 50. • Added support for browser Opera 43. • Added support for browser IceDragon 50. • Added ...
5/5 3,707 Jan 08, 2017
Yuri Saprykin
   
 
Showing rows 1 to 68 of 68 Showing Page 1 of 1  1 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2017 - 0.075 seconds


Tweets by @GeekOnTheLoose