There are no ads or fake
download buttons on this site.
This project is supported by
your donations.
Please donate. Thanks!



Processed through Paypal
No account required.


​​Facebook​​Follow OlderGeeks on Pinterest Follow @GeekOnTheLoose

PayWhatYouWant


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Privacy and Personal Information Protection   
Files
  File Name Rating Downloads
Last Update/Developer
Alternate File Shredder 1.622
Alternate File Shredder 1.622 This program offers the possiblity to finally delete files and/or folders (no recovery possible). The program also can overwrite the free space on a drive, which means, that already deleted files cannot be restored, too. Open source (MS VC++ 2005)!! Windows NT 4, 95, 98, Me, 2000, XP, Server 2003, Vista, Server 2008, 7, 8, 8.1 Languages included: English, german, spanish, french, italian, chinese, japanese, korean Changes in this version: - Korean translation updated
5/5 1,097 Sep 06, 2016
Alternate Tools
BCTextEncoder 1.01
BCTextEncoder 1.01 Never worry that someone might read a confidential email, BCTextEncoder will easily encrypt part or all of your messages. Easily encrypt your messages using strong and approved symmetric and public key algorithms for data encryption. BCTextEncoderTM utility software simplifies encoding and decoding text data. Plain text data is compressed, encrypted and converted to text format, which can then be easily copied to the clipboard or saved as a text file. BCTextEncoder uses public key encryption methods as well as password-based encryption.
5/5 3,454 Sep 06, 2016
Jetico Inc.
BlackBeltPrivacy Tor+WASTE 3.01.2014.01
BlackBeltPrivacy Tor+WASTE 3.01.2014.01 Tor helps keep you safe online.. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous(). An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE). Features: 4 Modes, Censored Client, Bridge(default), Relay and Exit - chosen by you at install time. Be sure to check-out the screen shots. Friendly support provided. Streamlined Installation Package. No additional configuration necessary for server, client or darkNet() Auto Firefox config. Optional Tor Relaying, bandwidth restricted. From 0->100mb or 0->500mb per day - its your choice. Regularly updated includes auto-configured Obfsproxy, for censored-clients and bridge-operators Screen shots may differ due to our continuous development cycle. •NOTE: Linux/Unix/MacOSX Compatibility is obtained via WINE. (tested working) •NOTE: The core tor team no longer ship a proxy. We have adopted the same.
No Votes 3,540 Sep 06, 2016
darkNet()
Blackbird 0.9.98 32bit
Blackbird 0.9.98 32bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Removes W10 Upgrade Popups Block Win10 upgrade (GWX) messages on Windows 7/8 and remove downloaded Win10 pre-install files/folders. Prevent your PC from auto-installing Windows 10 while you're not looking. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free & Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated & Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. ## Blackbird V6 Changelog ## v0.9.98 - Latest - Added a switch to fix LAN connectivity problems after running Blackbird v0.9.97 or later (blackbird -l) - Fixed Recovery mode not properly restoring some registry ...
5/5 517 Nov 11, 2016
Blackbird Software
Blackbird 0.9.98 64bit
Blackbird 0.9.98 64bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Removes W10 Upgrade Popups Block Win10 upgrade (GWX) messages on Windows 7/8 and remove downloaded Win10 pre-install files/folders. Prevent your PC from auto-installing Windows 10 while you're not looking. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free & Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated & Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. ## Blackbird V6 Changelog ## v0.9.98 - Latest - Added a switch to fix LAN connectivity problems after running Blackbird v0.9.97 or later (blackbird -l) - Fixed Recovery mode not properly restoring some registry keys - ...
5/5 564 Nov 11, 2016
Blackbird Software
BleachBit 1.12
BleachBit 1.12 BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows and more. Features simple: just check the boxes quick: clean all applications in one place secure: overwrite files to hide contents powerful: clean 1000+ applicationdq safe: options are clearly labeled to avoid surprises Changes These are the changes since version 1.10: Fix error Favicons is version 32 with Google Chrome 51 (reported by Holger) Fix cleaning of Thumbnails in new Chromium and Google Chrome (reported by ineuw, patrick) Fix crash with corrupt BleachBit.ini (reported by BitBleacher) Fix error UNIQUE constraint failed error cleaning Firefox (reported by danjackson1 and gravy45) Specific to Linux Update EasyTAG cleaner (thanks to devmapper0) Update Epiphany cleaner (thanks to devmapper0) Update Evolution cleaner (thanks to skquinn) Update GNOME cleaner (thanks to devmapper0) Update KDE cleaner for KDE 4 on openSUSE (thanks to Mailaender) Update Rhythmbox cleaner (thanks to devmapper0) Update Thumbnails cleaner (thanks to devmapper0) Update Transmission cleaner (thanks to devmapper0) Update X11 cleaner (thanks to devmapper0) Switch from GnomeVFS, which is deprecated, to GIO (reported by MM) Do not repeat Google Chrome cache in preview (reported by Daniel Che) ...
5/5 278 Jan 02, 2017
Andrew Ziem
BMP Wrap 2.0
BMP Wrap 2.0 Ever needed to email a file but it keeps on bouncing because it's an illegal attachment? Renaming the file or storing it in a ZIP archive sometimes works, but many ISP can detect that low-tech obfuscation. You need BMP Wrap. BMP Wrap temporarily hides a file inside a valid .BMP image. Once hidden, you can send the BMP file to anybody you wish and they can then extract that file from the BMP image using BMP Wrap. Now you can send EXEs, DLLs, or whatever file format you want, and the destination mail server will never be the wiser. No installation is required - just save the EXE file to your desktop, and then drag the file you want to wrap/unwrap onto the the BMPWrap Icon (a new .BMP file is created, the original file is left unmodified). This program is free & does not include any ad-ware or other malware.
5/5 3 Jan 27, 2017
HCI Design
Crypter 1.0
Crypter 1.0 Encrypt / Decrypt text files by this mysterious encryption tool, No installation required. Warning: Windows Defender and other anti-malware programs may incorrectly detect this as malicious. It is a clean file.
0/5 810 Nov 22, 2015
Christos Beretas
DeepSound 2.0
DeepSound 2.0 DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE). System requirements: - Windows XP/Vista/7/8 - Microsoft .NET Framework 3.5 Documentation: 1 DeepSound 2.0 1.1 Hide data into carrier audio file To hide data into audio file, follow these steps: Select carrier audio file or drag and drop audio file (flac, wav, wma, mp3, ape) into the file explorer. Click to 'Add files' or drag and drop secret files into the panel on the right side of application. Press F3 key or click to encode secret files. You can choose output audio format (wav, flac or ape). DeepSound does not support wma output format. If you want to hide data into wma, hide secret data into wav file and then use external software such as Windows Media Encoder for convert wav to wma lossless file. In settings dialog you can turn On/Off encrypting and set password. Modified audio file will be copied to output directory. Click Ok to start hiding secret files into carrier audio file. 1.2 Extract secret data from audio file or audio CD track To extract secret data from audio file, follow these steps: In the file explorer, select audio file or audio CD track, which contains secret data. If the secret files are encrypted, enter ...
5/5 862 Mar 16, 2016
Jozef Bátora
DeleteOnClick 2.3.0.0
DeleteOnClick 2.3.0.0 DeleteOnClick is a very simple to use file secure delete utility for Microsoft Windows 98SE/ME/ 2000/XP/2003 and Vista. Any type of file can be deleted, including NTFS compressed and NTFS encrypted files. DeleteOnClick completely deletes files in one click and the data becomes unrecoverable, and also has the option to wipe free disk space. For this reason you must use the program carefully. Once a file is 'Securely Deleted' no one can undelete it.
0/5 3,225 Feb 24, 2014
2brightsparks
Easy File Locker 32bit 2.2
Easy File Locker 32bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 3,078 Jan 13, 2017
XOSLAB.COM
Easy File Locker 64bit 2.2
Easy File Locker 64bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 3,104 Jan 13, 2017
XOSLAB.COM
Eraser 6.2.0.2979
Eraser 6.2.0.2979 Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8 ,10 and Windows Server 2012. Eraser is Free software and its source code is released under GNU General Public License. Why Use Eraser? Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems, the list continues. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first. Your first thought may be that when you ‘delete’ the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. Eraser Features It works with Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8,10 and Windows Server 2012.Windows 98, ME, NT, 2000 can still be used with version 5.7!.It works with any drive that works with Windows.Secure drive erasure ...
5/5 246 Aug 31, 2016
The Eraser Team
File Access Monitor 1.0.2
File Access Monitor 1.0.2 File Access Monitor is a multipurpose tool that monitors access to your files and provides detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, as well as on a local computer where it will track local users file access. It is similar in nature to Windows auditing features yet is much easier to use and provides flexible reporting capabilities and notifications. Key features Monitors file actions: creating, moving, deleting, reading and writing to files. Records remote user access to shared folders. Keeps track of local users as to what files they access. Features a powerful filter system to include or exclude certain activities. Self-contained, doesn’t require a database server alongside. Supported platforms Windows XP through Windows 10, Windows Server 2003 through 2012 32-bit and 64-bit Changelog: 2016-10-10 1.0.2 This software is now freeware.
5/5 52 Dec 14, 2016
SoftPerfect
Files Terminator Free (PORTABLE) 2.6.0.0
Files Terminator Free (PORTABLE) 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 3,435 Jan 19, 2014
Elefant Software
Files Terminator Free 2.6.0.0
Files Terminator Free 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 3,427 Jan 19, 2014
Elefant Software
Fort - Cryptography Extension for Windows 2.2
Fort - Cryptography Extension for Windows 2.2 Fort takes security seriously and uses AES with 256bit keys. On decryption Fort checks that the data is not tampered in any way and informs if data tampering is detected. For each file, Fort generates a random initialization vector that is used only once. Similarly, for keys a random one time salt is generated by Fort. Fort is free, easy to use and easy to install. Windows Vista, Windows 7, Windows 8.x and Windows 10 are supported, both 32bit and 64bit versions. After installing Fort, simply right click a file and select "Encrypt". If the file is already encrypted with Fort, you can double click the file to decrypt it. Features Screenshot of Fort Windows Explorer integration Open source, study the code Uses AES with 256bit keys Detects data tampering Very lightweight, does not slow down your machine Easy to use and easy to install. Optional file backup before encryption Encrypt and decrypt directories as well as individual files Protect against keyloggers, supports on screen keyboard Encrypt files in Onedrive, Dropbox and similar services Supports Windows Vista, 7, 8 and 10. Both 32bit and 64bit versions No backdoors, no malware Well designed FortMachine.dll cryptography library available for developers It's possible to buy a licence exception to use FortMachine.dll in closed source products Fort has it's own file associations, double click an encrypted file to decrypt it. Why? Cryptography and data encryption is important. In todays world we are connected all the time. We put our files on different cloud services where ...
No Votes 828 Dec 30, 2016
Niko Rosvall
Free File Camouflage 1.22
Free File Camouflage 1.22 Want to save a copy of your personal file on a USB Pendrive but you are worried that, in case of theft, someone will be able to access your data? With Free File Camouflage you can hide your files inside a JPEG image! The software can be used with the main interface or via the explorer "send to" context menu (the first time you only need to select a directory with some images). All the files are encrypted using AES and hidden inside an image. What happens if someone tries to open a camouflaged image? Well... nothing! He will only see the image. Change Info: - updated registration library code Note: Requires Microsoft .NET Framework
0/5 2,992 Apr 07, 2014
My Portable Software
Free File Wiper 1.76
Free File Wiper 1.76 Delete files securely with this software! Just right click on files or directories and select "Send to / Free File Wiper" to erase them completely! Or ... you can drag and drop them on the trashcan to perform the wipe operation. The files will be overwritten with standard and random patterns. After the wipe, the files cannot be undeleted and restored. Up to four wipe methods (from 1 pass to 7 passes). Change Info: -updated registration library code
5/5 3,002 Apr 01, 2014
My Portable Software
Free Hide IP 4.1.1.2
Free Hide IP 4.1.1.2 Free Hide IP - The best free privacy protection software. Free Hide IP the best way is to keep your IP address from being shown to others. Hackers and identity thieves are becoming more and more rampant in today's society. They may break into anyone's computer and monitor one's activity or steal one's identity or other personal information. To stay safe online, the best way is to keep your IP address from being shown to others. Now we provide you a FREE solution to hide your IP address. Use Free Hide IP to hide your real IP address for free, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click.
5/5 3,475 Mar 08, 2016
Free Hide IP
G Security 1.0
G Security 1.0 G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys like Alt+tab, Ctrl+Alt+Esc, Alt+F4 etc will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time on a single computer with settings stored for each user individually so that each user can use G Security with its own preferences. G Security also supports hotkey to lock the system. In a few words its extremely secure, easy to use and configurable desktop locking solution available for everyone free of cost. Some of its key features include : Its easy to use. Its a Freeware. Fully locks down your computer. Can protect Windows on startup. Suitable for all kinds of users. Multi user support. ...
5/5 386 Jun 20, 2016
Malik Usman Aura
GuardAxon 3.9
GuardAxon 3.9 GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
5/5 1,352 Apr 18, 2015
The Geneosoft Team
GuardAxon 3.9 PORTABLE
GuardAxon 3.9 PORTABLE GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
No Votes 1,365 Apr 18, 2015
The Geneosoft Team
Hardwipe 5.1.3
Hardwipe 5.1.3 Hardwipe is the free data sanitization toolset used by activists, journalists, IT technicians and anyone needing to ensure that discarded, but sensitive, information can never be recovered by someone else. Freedom to Securely Erase Sensitive Information Use Hardwipe to permanently erase (or "hard wipe") data on disk and portable storage media. Hardwipe for Desktop provides a slick user interface with optional support for "right-click" context menus in Windows File Explorer. It can conveniently destroy files and folder contents on-demand, erase drives and USB media, and sanitize the Windows Recycler. Hardwipe for Desktop is free for non-commercial use.
5/5 651 Feb 16, 2016
Big Angry Dog
idoo File Encryption Free 7.1
idoo File Encryption Free 7.1 idoo File Encryption Free is easy-to-use File Encryption freeware by password protect. Free encrypt Microsoft Office documents (MS Word .doc, .docx,Excel .xls,Powerpoint .ppt. text), Images (PNG,TIFF photo,Lotus,PDF files,BMP,Jpg/Jpeg photos,GIF picture ), Media Video files (mp4 ,WMV,AVI,3gp,mp3,music,RMVB movies, RM films,audio) Features: Hide data hide your private files, folders, drives, to make them completely invisible to users programs. Lock data the locked files/folders/drives, can not open, be read, modified, moved, deleted, copied, or renamed. Protected files/folders without password. Files and sub-folders in a locked folder are also protected. Encrypt data it can encrypt files and folders of any type. Portable encryption packs and encrypts a folder into an executable (.exe file) with AES encryption. Safe delete no one can recover deleted data from your disk if you secure delete it. Password protected there's no other way to run or uninstall it if you do not have the password. Idoo is a very easy to use program with a user-friendly interface. Changelog: improve funtion from my user suggestions
0/5 2,394 Jul 17, 2014
Idoo Software
KeyLock 1.1.4
KeyLock 1.1.4 KeyLock is a program to lock your computer with an USB Flash Drive. Read all the features below: Safe: It's not possible to use your computer after you've locked it with KeyLock. Our exclusive technologies disable task manager, and disrupt the mouse, making it impossible to reach the desktop. After unlocking, everything will be recovered immediately and you can use your computer again. Easy and Fast: You quickly need your computer with the common Windows security? First you need to unlock, type your password, have a typo, type in again and finally, your pc is unlocked. With KeyLock, all these problems are solved: Put your USB Flash Drive in your computer and you can use it immediately. Energy Saving: Careful with your laptop battery? No problem with KeyLock. In the program, there are built-in features to save energy, like dimming the screen or slowing down the reaction speed. That way, you can have the best use of your battery with KeyLock! Customizable: Do you want to have another background or do you want to surprise the person that wants to unlock your computer with a different text? This is possible with the customizable options in KeyLock. Customize the lock-screen to your liking! System requirements: - Windows XP or higher (32/64 bit) - 512 MB of RAM (recommended) - 25 MB available hard-disk space - Intel Celeron D 430 @ 1.80 GHZ / AMD Athlon 64 3300 + (minimal), Intel Celeron N2820 @ 2.13 GHZ / AMD Athlon X2 Dual Core LS-5800 (recommended) - .NET Framework 2.0 or later New Features: Version 1.1.4 - Security improved - Minor changes in GUI - Added option to hide battery status - Added option to hide clock / date - Added option to hide warnings when unusual events occur (UWS) - Removed LPS - Added possibility to import / export settings - Bug fixes
0/5 1,919 Jan 23, 2015
Brabonet
KeyScrambler 3.8.0.0
KeyScrambler 3.8.0.0 KeyScrambler encrypts your keystrokes deep in the kernel, foiling keylogging attacks with scrambled, undecipherable data. This advanced method of keystroke protection defeats both known and unknown keyloggers. The friendly interface displays realtime encrypted stream of keystrokes so you see when and how KeyScrambler is working. Strengthens where defenses are the weakest in your traditional anti-virus, anti-malware programs and PC security. Compare Editions A free browser add-on, KeyScrambler Personal protects all your inputs in IE, Firefox, and Flock. KeyScrambler Pro and Premium are paid programs that protect a wide array of apps. How It Works KeyScrambler encrypts your keystrokes at the keyboard driver level and decrypts them at the destination application, giving keyloggers "scrambled," useless keys to record. For Online Games Both KeyScrambler Pro and Premium protect your player's IDs, passwords and digital assets in over two dozen online games. For Business Read how and why KeyScrambler is important for your business. KeyScrambler Premium protects critical systems and reduces risks of information theft at the workplace. Features KeyScrambler defeats known and unknown keyloggers; also protects Chinese, Japanese, and Korean inputs; is compatible with other security programs, tokens and smart cards; and requires no user effort. How To The user-friendly interface allows you to do things on KeyScrambler for a more comfortable, personalized fit. Supports: Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser.
5/5 2,752 Jul 29, 2015
QFX Software
KORO File Shredder 4.2.3.0
KORO File Shredder 4.2.3.0 KORO File Shredder is a program to erase sensitive data in a way that a recovery will be impossible. Data will be overwritten several times e.g. using the US DoD 5220.22-M ( ECE ) erasure method. Using File Shredder you can delete files and documents from your hard drive and must not worry about that they could be recovered anytime later. Software tools offered for retrieval of deleted files under Windows, usually called "file recovery" software, are taking advantage of the shortcoming of the Windows "delete" command we are normally using to delete files. In fact, the "delete" operation in Windows only removes some bits of information from file directories so that the files disappear from thefile manager view. To undelete such a file, it is just necessary to repair the entry in the file directory. To remove files permanently from your system, like a shredder does with your paper documents, you have to use a program that is capable of overwriting the files with a series of random generated binary data for multiple times. Thus, the current contents of the files will be overwritten in a way that a recovery is practically unpossible. Wiping out method Before deletion all files are overwritten using one of the following algorithms Zero (1 Pass): Overwrite the files with zeros. DoD (7 Passes): Overwrite files in accordance with the US Department of Defense regulation DoD 5220.22-M(ECE). Gutmann (35 Passes): Overwrite files using the method developed by Peter Gutmann.. This method is considered to be the most secure, but slow. KORO File Shredder will operate on the following versions of Microsoft Windows: Windows 8.1, 8, 7, Vista, XP, 2000 32-bit és 64-bit Operating system. Special features Easy to use interface Multiple preset shredding methods Support for internal and external drives Support for removable media (SD Flash, Compact Flash, USB drives) Fool proof warnings before deleting any files Custom shredding settings to fit your needs Protects system files ...
No Votes 683 Jan 14, 2016
Robert Kovacs
KryptoFiler 1.0.2
KryptoFiler 1.0.2 Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Encrypt & Decrypt Large Files. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1.0.2 : added drag and drop
0/5 907 Sep 29, 2015
3nity Softwares
KryptoMessage 1.0
KryptoMessage 1.0 Encrypt and decrypt messages, mails and conversations through cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Unicode support. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1 : first release
0/5 907 Sep 29, 2015
3nity Softwares
Leo Folder Locker 2.0
Leo Folder Locker 2.0 Leo Folder Locker is a software to secure your data in a smart, fast , effective and secure way. Although your operating system may offer you the possibility to hide folders, they are easy to find and reveal, since they are not protected by anything else. Thus, they cannot be considered as an option if you need to secure your sensitive data, especially on computers shared by more users at once. Leo Folder Locker comes in handy when these situations occur. This software does not encrypt your data instead it relies on some Windows OS based techniques to lock down folders. This software uses some basic techniques which are pretty good to be used on usual data. This software is not recommended to be used in high sensitivity situations where hard core encryption is required. This software was only designed to be used in general situations. Some of its key features include : Lock Down Mode As a defense from password guessing. Self Destruction Mode to provide a high level security. An Beep System used as an alert. Fully Customizable Settings. A Password Recovery System just in case you forgot yours. A new CLI based easy-to-use UI. A Freeware By Malik Usman Aura.
5/5 386 Jun 20, 2016
Malik Usman Aura
MRU-Blaster 1.5
MRU-Blaster 1.5 Protect your privacy, and keep your PC free from clutter. Find and remove over 30,000 MRU lists. MRU-Blaster is a program made to do one large task - detect and clean MRU (most recently used) lists on your computer. These MRU lists contain information such as the names and/or locations of the last files you have accessed. They are located ALL OVER your registry, and for almost ANY file type. By looking at these MRU lists, someone could determine what files you opened/saved/looked at, what their file names were, and much more! (And, in many cases, the lists are displayed in drop-down menus automatically.) With additional plug-ins that allow you to clean out your Temporary Internet Files and Cookies, MRU-Blaster enhances the protection of your privacy! Clean Up Clutter MRU-Blaster safely, efficiently, and rapidly handles cleaning up tens of thousands of "usage tracks" and other remnants that most programs leave behind. These remnants aren't just a potential privacy concern - they can clog up your registry, and take up valuable space on your hard drive. Windows as well as most third-party programs are culprits. And MRU-Blaster can detect and remove over 30,000 different MRUs and usage tracks. Securely Erase Browsing Tracks MRU-Blaster also supports secure removal of Internet Explorer Temporary Internet Files (cache) and Cookies, with its built-in Plugins. The Internet Explorer cache alone can take up GB (gigabytes) of space on your hard drive. System Requirements MRU-Blaster works on Windows 95, 98, ME, NT, 2000, XP, Vista, 7.
5/5 7 Jan 27, 2017
Brightfort LLC
OandO ShutUp10 1.4.1385
OandO ShutUp10 1.4.1385 Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! Freeware More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Further information Portable Version – no installation required Operating System: Microsoft® Windows 10 OandO ShutUp10 EULA Important Features at ...
5/5 966 Dec 08, 2016
OandO Software GmbH
Password Safe 3.38.1
Password Safe 3.38.1 How many passwords do you have to secure? Start your safe and simplified digital life Free open source software Installation in minutes on Windows XP, Vista, 7 and 8 Designed by renowned security technologist Bruce Schneier Over 4 million downloads Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work).
No Votes 1,371 Jan 20, 2016
Password Safe
Privacy Eraser 4.1.1.1291
Privacy Eraser 4.1.1.1291 Privacy Eraser is an easy to use solution for protecting your privacy by deleting your browsing history and other computer activities. All main popular web browsers are supported, including Internet Explorer, Firefox, Chrome, Safari and Opera. With literally one click, Privacy Eraser will erase all digital footprints - web browser cache, cookies, browsing history, address bar history, typed urls, autocomplete form history, saved passwords, index.dat files, Windows' run history, search history, open/save history, recent documents, temporary files, recycle bin, clipboard, dns cache, log files, error reporting and more. Privacy Eraser also supports plugins to further extend the software's cleaning features. Meaning you can also delete whatever tracks are left behind by other applications with your own plugins. Privacy Eraser embedded more than 250 free plugins, supporting many popular programs such as ACDSee, Adobe Reader, Microsoft Office, WinZip, WinRAR, Windows Media Player, VLC Player, BitTorrent, Google Toolbar and many others. Privacy Eraser works with Windows 8.1/8/7/Vista/XP/2012/2008 (32/64-bit), and also supports Windows FAT16/FAT32/exFAT/NTFS file systems. The software implements and exceeds the US Department of Defense and NSA clearing and sanitizing standards, giving you the confidence that once erased, your file data is gone forever and can never be recovered. Main Features: Internet Explorer (IE), Firefox, Chrome, Safari and Opera Cleans internet cache, browsing history, cookies, typed urls, download history, autocomplete & autofill form history, saved password and much more. Windows Better computer security: cleans run history, search history, open & save history, recent documents, temporary files, recycle bin, clipboard, taskbar jump lists, dns cache, log files, memory dumps, error reporting and more. Third party applications More than 250 free, pre-configured plugins to clean the traces of many popular applications. You can also extend cleaning features by ...
0/5 1,269 Jul 10, 2015
Cybertron Software
Privacy Guardian
Keep your what you do on your computer and the Internet protected from prying eyes! Internet and Online Privacy PC Tools Privacy Guardian works with popular Internet browsers to erase your browsing history, search history, cookies, passwords, and download logs to help keep your Internet activities private. It even works with chat programs, media players, FTP browsers, email clients, and peer-to-peer file transfer programs to protect your other online activities as well. Everyday Computing Privacy PC Tools Privacy Guardian also helps maintain your day-to-day computing privacy. Temporary and recent file history erasers clear your temporary file folders, as well as your recently opened files lists, keeping your PC use and file access history private. Other cleaners erase Windows® history, including the ones found in Microsoft® Office, the Recycle Bin, your Recently Run programs, and the Find and Search bar. Secure File Deletion PC Tools Privacy Guardian helps ensure that the files you delete stay deleted with secure file shredding. And to further safeguard your Recycle Bin, a disk-bleaching tool wipes your free hard disk space, preventing of your deleted files from being restored by file recovery tools.
0/5 4,949 Mar 01, 2012
Pctools
PrivaZer 3.0.15
PrivaZer 3.0.15 With simply one click, PrivaZer is able to clean securely . Internet browsers . Index.dat . Cookies . Cookies Tor . Cookies Flash . Cookies Silverlight . DOM Storage . IndexedDB . AppCache . Registry . RAM . Pagefile.sys and Hiberfil.sys files . Use of software . Messengers . Histories of visited websites, viewed videos, use of software, opened docs, etc . Jumplists . Recycle bin . Temp files . Log files . Invalid Prefetch entries . Indexing service . ThumbCaches, Thumbs.db . Residual traces of deleted files . Free space . File table (MFT or FAT) . INDEX attributes in MFT . USN Journal, etc 1- Detection of residual traces in free space Visualization of residual traces of old files remaining in free space 2- Smart cleanup of free space Cleanup of residual traces in free space areas needing a reset to zero We assure no useless cleanups. Areas already reset to zero are not cleaned which can speed up cleanup by 2x to 100x. Cleanup runs faster after each run. 3- File table cleanup Cleanup of residual traces in file tables, not only in MFT but in FAT as well Additional cleanup of INDEX attributes in MFT 4- Smart overwriting Recognition of type of storage medium of your storage device : magnetic disk, SSD, etc Adaptation of overwriting algorithms to storage medium 5- Smart cleanup of Jumplists Cleanup of your Jumplists without deleting your pinned items/ websites which are preserved 6- Smart cleanup of Prefetch Removing of invalid Prefetch entries. Old valid entries are preserved. 7- Deletion of USB history Deletion of remaining traces of disconnected device (name, date, etc) 8- Scan and cleanup of Pagefile.sys / Hiberfil.sys content Visualization of Pagefile.sys / Hiberfil.sys content Pagefile.sys cleanup options : at each PC shutdown, or at next shutdown only Control of Hiberfil.sys cleanup : PrivaZer controls that the system has reset to zero Hiberfil.sys. If not, ...
5/5 3,710 Jan 14, 2017
Goversoft LLC
Program Blocker
Program Blocker Program Blocker is a portable TWC freeware that lets you block any desktop application. You can block it with a password or simply make it non-functional on your computer. The program is completely based on the idea of simply blocking applications from running, without taking any chances with the system, as a result of which the program does not make any changes in the registry and operates independently of the system. Features: Password protection Block applications Task manager Hidden mode
No Votes 3,093 Mar 20, 2014
The Windows Club
Proxy Mask - Proxy Switcher 2.6.1.0
Proxy Mask - Proxy Switcher 2.6.1.0 Proxy Checker and Switcher allow access to blocked websites Access blocked websites, and you can watch blocked YouTube videos such as This Video Is Not Available In Your Country (by changing your IP to different country), hide your IP address, surf anonymously without a trace on the Internet. You can access many of blocked websites without using proxy with Smart DNS Changer Free. Supports HTTP and HTTPS proxy servers You can define different proxy setting for different processes at the same time At least several hundred working proxies (always) Updates Working proxy list automatically Supports all windows (XP to windows 10, 32 and 64-bits) When to use Proxy Mask or Proxy Switcher Accessing blocked websites: Your ISP (Internet Service Provider) may block some websites. Normally, network adapters on your computer, uses your IPS DNS server, and most of blocked websites blocking by your ISP's DNS server. This type of restrictions can be bypassed by changing DNS server settings of network adapters. You can use the Smart DNS Changer Free to change your DNS settings. Some websites blocks by their IP addresses and this type of restriction cannot be bypassed by changing DNS server settings. In this case you should use Proxy Mask (Proxy Switcher) to access blocked websites. Bypassing websites region (country) restrictions: Some videos on YouTube cannot be watched from some countries (because of publisher restriction or copyright etc.), In this case YouTube shows text message on video player like This Video Is Not Available In Your Country. To bypass such restrictions you can use Proxy Mask (Proxy Switcher) to access restricted contents by changing your IP address to different country (by using Elite proxy ...
0/5 801 Nov 28, 2015
Rentanadviser.com
SafeIP 2.0.0.2595
SafeIP 2.0.0.2595 Hide your IP address and protect your online identity with SafeIP by hiding your IP from websites, email, games, and more. Features: Encrypt all your Internet traffic with a private proxy, either browsing at home or on public WiFi hotspots Choose the anonymous IP location closest to you for the fastest connection speeds SafeIP can be used completely free for unlimited use, without advertisements and never expires
No Votes 3,723 Jan 19, 2014
SafeIP, LLC.
Secret Disk 3.14
Secret Disk 3.14 Secret Disk can create additional disk on your PC, which can be invisible and locked with a password within one second. You can make your private files and folders invisible and protected. You don't need to format your hard disk or make any changes to boot sector. Our program will create new disk automatically very quickly. You can make this disk invisible, including all contents, and protect it with a password. You can store any files and folders on the disk. Secret disk works as usual hard disk and compatible with any other programs which you have installed. You can have more than one secret disk and you can also choose disk letter. In case of power outage or fatal error of OS Windows your secret disk will be locked and become invisible automatically. It happens automatically because information are stored in the virtual memory. Secret Disk does not encrypt any files, it just limits access to your files (you can use password). Software ties virtual disk to your files. This will provide you enough security to hide your files from any person. Changes in version 3.14 ... • This release includes only one change but this is very important change - an updated security certificate. Current certificate will expire in March, thus we have decided to release this update early so you wont be locked in March by the Windows security system. • Date of release: 4 February 2017.
5/5 1,007 Feb 06, 2017
PrivacyRoot
SecretFolder 3.0.0.0
SecretFolder 3.0.0.0 SecretFolder is a security tool to hide and lock your sensitive folder out from the other users. It provides immediate data protection (protect and unprotect commands are executed in no time). Features: Free to use at both home and in the office Support for 64-bit Windows. NTFS, FAT32, exFAT and FAT volumes are supported. Unlimited number of folders can be protected at the same time. No limits on the size of protected data. No file system structure modifications will occur. Protected uninstall. When you create a secret folder, using your own password, you can manage folder. CMD command will not be able to access the folders.
No Votes 2,653 Jun 05, 2014
Oh!Soft
Spybot Anti-Beacon for Windows 10 1.6
Spybot Anti-Beacon for Windows 10 1.6 Spybot Anti-Beacon for Windows 10 is a small utility designed to block and stop the various tracking (aka telemetry) issues that come with Windows 10. Seeing the bunch of incomplete or broken scripts to disable tracking in Windows 10, and the tools that install adware or worse in exchange for their function, we wrapped disabling tracking up in a small tool that’s free and clean. With the upcoming news about telemetry in Windows 7 and 8.1, Spybot Anti-Beacon has added support for those as well. Changelog: Spybot Anti-Beacon 1.6 now available December 5th, 2016 Many thanks for all the patience waiting for an update to Spybot Anti-Beacon! We spent a lot of time working on Spybot 3. And now that Spybot Anti-Beacon will also be integrated into Spybot 3, we found time to continue work. Today’s update to Anti-Beacon 1.6 will add two new immunizers and a few new blocked hosts. More updates are already pending since we’re actively working on this feature again (including a new look, but mostly focused on function of course)! Spybot Anti-Beacon 1.6 can be downloaded from here. Updates: Additional Telemetry Immunization Categories Additional Blocked Hosts Fixes: Immunization of Office 13/16 Telemetry Scheduled Tasks and Options is possible even if Microsoft Office is not installed (previously they appeared to immunize correctly, but the immunization could not be undone in Anti-Beacon) Don’t forget to always run Spybot Anti-Beacon as an administrator by right-clicking the downloaded installer, and choosing the option to “Run as administrator”. This will ensure that Anti-Beacon has the permissions it needs to function correctly.
5/5 1,036 Dec 06, 2016
Safer-Networking Limited
SpyDetectFree 32bit 1.0
SpyDetectFree 32bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
0/5 795 Dec 07, 2015
NesterSoft Inc.
SpyDetectFree 64bit 1.0
SpyDetectFree 64bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
1/5 817 Dec 07, 2015
NesterSoft Inc.
Tor Browser Bundle 6.0.6 for Linux, BSD, and Unix 32bit
Tor Browser Bundle 6.0.6 for Linux, BSD, and Unix 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Here is the full changelog since 6.0.5: All Platforms Update Firefox to 45.5.0esr Update Tor to 0.2.8.9 Update OpenSSL to 1.0.1u Update Torbutton to 1.9.5.12 Bug 20414: Add donation banner on about:tor for 2016 campaign Translation updates Update Tor Launcher to 0.2.9.4 Bug 20429: Do not open progress window if tor doesn't get started Bug 19646: Wrong location for meek browser profile on OS X Update HTTPS-Everywhere to 5.2.7 Update meek to 0.25 Bug 19646: Wrong location for meek browser profile on OS X ...
5/5 1,276 Nov 16, 2016
The Tor Project
Tor Browser Bundle 6.0.6 for Linux, BSD, and Unix 64bit
Tor Browser Bundle 6.0.6 for Linux, BSD, and Unix 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Here is the full changelog since 6.0.5: All Platforms Update Firefox to 45.5.0esr Update Tor to 0.2.8.9 Update OpenSSL to 1.0.1u Update Torbutton to 1.9.5.12 Bug 20414: Add donation banner on about:tor for 2016 campaign Translation updates Update Tor Launcher to 0.2.9.4 Bug 20429: Do not open progress window if tor doesn't get started Bug 19646: Wrong location for meek browser profile on OS X Update HTTPS-Everywhere to 5.2.7 Update meek to 0.25 Bug 19646: Wrong location for meek browser profile on OS X ...
5/5 1,280 Nov 16, 2016
The Tor Project
Tor Browser Bundle 6.0.6 for Mac OS X
Tor Browser Bundle 6.0.6 for Mac OS X What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Here is the full changelog since 6.0.5: All Platforms Update Firefox to 45.5.0esr Update Tor to 0.2.8.9 Update OpenSSL to 1.0.1u Update Torbutton to 1.9.5.12 Bug 20414: Add donation banner on about:tor for 2016 campaign Translation updates Update Tor Launcher to 0.2.9.4 Bug 20429: Do not open progress window if tor doesn't get started Bug 19646: Wrong location for meek browser profile on OS X Update HTTPS-Everywhere to 5.2.7 Update meek to 0.25 Bug 19646: Wrong location for meek browser profile on OS X ...
5/5 1,347 Nov 16, 2016
The Tor Project
Tor Browser Bundle 6.0.6 for Windows
Tor Browser Bundle 6.0.6 for Windows What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Here is the full changelog since 6.0.5: All Platforms Update Firefox to 45.5.0esr Update Tor to 0.2.8.9 Update OpenSSL to 1.0.1u Update Torbutton to 1.9.5.12 Bug 20414: Add donation banner on about:tor for 2016 campaign Translation updates Update Tor Launcher to 0.2.9.4 Bug 20429: Do not open progress window if tor doesn't get started Bug 19646: Wrong location for meek browser profile on OS X Update HTTPS-Everywhere to 5.2.7 Update meek to 0.25 Bug 19646: Wrong location for meek browser profile on OS X ...
5/5 3,422 Nov 16, 2016
The Tor Project
USB Raptor 0.0.8.61
USB Raptor 0.0.8.61 Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function Features Automated Windows lock/unlock with the use of common USB flash drives Compatible with all types of USB flash drives Robust design Easy to setup and use High security option to verify the serial number of the flash drive Various alternative unlock methods Supports LAN lockdown (and unlock) function Synchronized lock and unlock on LAN for multiple PCs Status report over internet and LAN Supports serial command integration (beta stage) Tray icon based application Option to delay and cancel the lock, to avoid unwanted locks Windows 10, Windows 7, Windows 8 and Windows XP compatible Multi screen systems ...
5/5 601 Feb 08, 2017
Nikos Georgousis
VeraCrypt 1.19 for Linux
VeraCrypt 1.19 for Linux VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.19 (October 17th, 2016): All OSs: Fix issues raised by Quarkslab audit. Remove GOST89 encryption algorithm. Make PBKDF2 and HMAC code clearer and easier to analyze. Add test vectors for Kuznyechik. Update documentation to warn about risks of using command line switch ”tokenpin”. Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms). Windows: Fix keyboard issues in EFI Boot Loader. Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF. Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation) Fix failure to ...
5/5 997 Nov 18, 2016
IDRIX
VeraCrypt 1.19 for Mac
VeraCrypt 1.19 for Mac VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.19 (October 17th, 2016): All OSs: Fix issues raised by Quarkslab audit. Remove GOST89 encryption algorithm. Make PBKDF2 and HMAC code clearer and easier to analyze. Add test vectors for Kuznyechik. Update documentation to warn about risks of using command line switch ”tokenpin”. Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms). Windows: Fix keyboard issues in EFI Boot Loader. Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF. Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation) Fix failure to ...
5/5 991 Nov 18, 2016
IDRIX
VeraCrypt 1.19 for Windows
VeraCrypt 1.19 for Windows VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.19 (October 17th, 2016): All OSs: Fix issues raised by Quarkslab audit. Remove GOST89 encryption algorithm. Make PBKDF2 and HMAC code clearer and easier to analyze. Add test vectors for Kuznyechik. Update documentation to warn about risks of using command line switch ”tokenpin”. Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms). Windows: Fix keyboard issues in EFI Boot Loader. Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF. Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation) Fix failure to ...
5/5 1,028 Nov 18, 2016
IDRIX
W10Privacy 2.0.0.1
W10Privacy 2.0.0.1 The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea for the development of this little program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! This program may trigger anti-virus warnings since it changes core Windows settings.. These are false warnings. This program contains no viruses or malware. Changelog: 2.0.0.1 (22.02.2016) - The interim update of Jimdo layout obviously the download links have changed. This now leads to the fact that the automatic update of v.1.8.0.6 fails (it is instead the same version downloaded). Starting from this version of the new link is included, so that future updates should work again. - The designation of progress in the Windows updates search should now be correct in all languages. - Complement the French texts by wiwi2301.
5/5 612 Feb 23, 2016
Bernd Schuster
WebCam On-Off v1.2
WebCam On-Off v1.2 Webcams may let you stay in touch with friends and family also a webcam allows you to record and stream video from your computer or laptop to the Internet or a video file. When you are not using your webcam, you may wish to disable it to ensure it is not recording by accident and they also pose risks of people hacking into them and spying on you surely ,Malware can take over webcams, so there is potential for your camera to spy on you , Most hackers utilize so-called Trojan horse attacks , they can take control of your webcam and make videos and take pictures of you without your knowledge. If you’re a parent, there are a few reasons why you may want to disable your webcam, all of them having to do with safety. Video instant messaging and websites aren’t always child-friendly, and you may decide disabling your webcam is your best recourse. If you have an external webcam, unplug the USB cord that connects the camera to the computer, and hide the camera somewhere your kid won’t find it! , But it is not the best way because if you need it every 2 – 3 hours will you hide it again and again ? and what about if you have a built-in camera ? the Washington Post highlighted an unnerving study published at Johns Hopkins University which found that a laptop webcam can function in relative secrecy-a slightly subtler Eye of Sauron Webcam-spying—particularly the variant that involves disabling LED indicator lights—takes quite a bit of effort, but the practice isn’t limited to the realm of benevolent academics. The FBI has also publicly acknowledged its ability to employ such techniques when investigating criminal activity As you see disable the webcam completely is the safest way to ...
5/5 1,158 Jun 04, 2015
Sordum.org
Who Stalks My Cam V1.3
Who Stalks My Cam V1.3 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ...
5/5 714 Jan 16, 2016
PHROZEN SAS
Windows Privacy Tweaker 1.2
Windows Privacy Tweaker 1.2 Windows Privacy Tweaker easily restores all your settings in Windows 10 to their maximum privacy levels. Windows 10, Microsoft’s latest upgrade to its operating system, comes bundled with telemetry and tracking services that are enabled by default. While the company is insisting that it was 'not spying' but simply trying to enhance the program by understanding what users do, Windows 10 is constantly collecting users’ data, sharing Wi-Fi passwords to contacts (albeit with encryption), and collects data and usage patterns exhibited by every user of Windows 10. But don't be fooled, even older versions of Windows shared some information with Microsoft. So, your sense of privacy and security may have been severely compromized for a long time without you knowing about it. But all your suspicions may be resolved because now there is Phrozensoft Windows Privacy Tweaker that easily restores all your settings to it maximum safety levels. Use it and you have no more issues about your privacy or online safety. We take care about that. Is it only for Windows 10? No! it also detect some privacy issues for Windows Vista, Windows 7 and Windows 8/8.1 How it works To achieve the maximum level of privacy and security, simply uncheck all the unsafe Red Fields to the safe Green Fields. Notice: Tweaking Service and Scheduled Tasks might require the reboot of your computer to be 100% applied Extra Feature USB Protection Nowadays security is very important within a company or even at home. You should train yourself or your staff not to open mail attachments from unknown senders or not to download a tool from a suspicious looking website. But all these precautions are still not enough to avoid becoming infected by malware because antivirus programs cannot detect and remove 100% of attacks. Hackers know of different ways to bypass Antivirus detection (crypting ...
0/5 812 Nov 24, 2015
PHROZEN SAS
WinGuard Pro 2014 8.9.2.3
WinGuard Pro 2014 8.9.2.3 Secure your computer by password protecting your Windows applications, programs and EXE files. Plus, protect your data with encryption for your files, folders and drives - directly from Windows Explorer. Extra features allow you to disable the Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and more. Features: Lock Programs, Applications, EXE Files with a Password Lock any folder with a password Disable Windows at Boot Disable Software Installation and Downloads Password Protect Windows Explorer Password Protect your Web Browser, inc. Internet Explorer, FireFox, Opera and more Parental Time Control It's FREE, no advertising or spyware Works alongside your firewall and anti-virus program Advanced edition also includes: Add your own program for protection Disable Canceling of Password Prompt Configure Multiple User Accounts Password Windows at Boot Password Internet Explorer Disable Software Installation Use Software in Commercial Enviroment
5/5 3,684 Nov 02, 2013
WGSoft
WinMend Folder Hidden 1.4.9
WinMend Folder Hidden 1.4.9 WinMend Folder Hidden is a free file/folder hiding tool. While ensuring the absolute system safety, this application can quickly hide files and folders on local partitions and/or on removable devices. The hidden files/folders will be safely hidden whether the drive is accessed in another operating system on the same computer or reinstalled on another computer. You can set a password for this application. Hidden data can be displayed and unhidden only when the user enters the valid password. The data is completely invisible to other programs or on other operating systems. However, please keep in mind that this application is for home use only. It’s not recommended for commercial settings where more strict confidentiality is required. Supports Language: English, French, German, Hungarian, Spanish, Dutch, Arabic, Greek, Korean, Itanlian, Slovak, Vietnames. Features 1. Safety First The hiding technology will never damage any file data. It is safe and reliable. 2. High-Speed Hiding and Unhiding Whether it’s a file of dozens of GB, or a folder containing a lot of files, the file or the folder can be hidden and unhidden instantly. 3. Removable Drives Are Supported Files and folders on removable drives such as USB drives hidden by WinMend Folder Hidden are invisible not only in the computer where the hiding was completed, but in any computer.
0/5 829 Nov 09, 2015
WinMend.com
Wipe 17.00
Wipe 17.00 This powerful program can remove a lot of gigabytes of garbage on your computer and recover many free disk space. In addition, it will protect your privacy on the Internet - it removes records about personal activity on PC. You will be able to delete browser history and cache, index.dat files, registry, internet cookies files, autocomplete-history, temporary internet files and many many other items. This program also erases any other tracks of personal activity which you made when used your PC, and no matter in which program: Windows, Internet Explorer, FireFox, Chrome, Opera or any other... To prevent recovery of deleted data the program uses the following security methods: DoD 5220.22-M method, Gutmann method ( full 35 steps ), Russian GOST and other. You can also customize cleaning process and choose which items to remove and which is not. Or you can view detailed information about areas where garbage located on your computer. What's new in version 17.00? This program release dedicated to the new 2017 year, which is coming very shortly. We wish you all the best, happy new year! • First of all we have changed design of the program. Now it looks different, however, almost all buttons on the same places so you will recognize your favorite program easily. In next year the program will look more classical, with black and dark-red colors. • Fixed critical error which appears sometime during cleanup. • We have identified 755 error and we have provided more information about it. We're working to find a solution. • Added new option in the preferences for the TrayAgent. Now you can hide icons of the programs in the menu for faster load. • Added support for new browser Maxthon 5. • Added support for new browser Cyberfox 50. • Added support for browser Opera 43. • Added support for browser IceDragon 50. • Added ...
5/5 3,692 Jan 08, 2017
Yuri Saprykin
Wise Folder Hider 1.37.73
Wise Folder Hider 1.37.73 Wise Folder Hider is a free file/folder hiding tool. User can use it to hide files and folders on local partitions or removable devices. The data can't be accessed by other programs or on other operating systems such as DOS. The only way to access or unhide these data is to enter the valid password. However, this application is designed for home use only but not recommended for commercial settings which require stricter confidentiality. Safely and quickly hide files and folders in local partitions and removable devices. Safe to Hide file/folder/USB Free and easy to use Double password protection Support of Removable Drivers Support of Drag and Drop
0/5 3,718 Aug 09, 2013
WiseCleaner
   
 
Showing rows 1 to 61 of 61 Showing Page 1 of 1  1 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2017 - 0.0647 seconds


Tweets by @GeekOnTheLoose