Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Privacy, Personal Information Protection and Encryption   
Files
  File Name Rating Downloads
Last Update/Developer
ACleaner 4.5
ACleaner 4.5 ACleaner is a safe and easy-to-use privacy protection tool, that allows you to erase common Internet and computing tracks, including browser cache, cookies, visited websites, typed URLs, recent documents, index.dat files and more. You can also easily erase the tracks of up to 100 popular applications. It also includes an option to overwrite deleted data multiple times, so it cannot be easily recovered. The cookie cleaning feature allows you to specify which cookies to keep, so that you don't erase your important login cookies. You also can schedule automatic erasing for any time you like and use boss key to hide all browser windows in one quick keystroke! In addition, the program comes with a registry scanner to optimize your system registry by finding and removing errors and invalid entries. After fixing the invalid entries, your system will be more stable and run faster. For maximum safety, ACleaner will make a backup of the repaired entries. You will be able to restore any changes made using the software by choosing Restore registry backup. Why do you need ACleaner? • Your Internet activities can be traced through cache, cookies, and history. • Windows and third party software stores information that could compromise your privacy. • The Windows Registry is a crucial part of your PC's operation system. Problems with the Windows Registry are a common cause of Windows crashes and error messages. Key Features: Remove the tracks of your activities completely 1.Windows Item Remove Windows recent documents history Remove Start Menu -- Run/Find history Remove the files in Window recycle bin Remove Windows temporary files directory Remove clipboard Remove memory dumps Remove chkdsk file fragments Remove Windows log files Remove menu order cache Remove open/save dialog history Remove tray notifications cache Remove user assist history Remove Media Player/Real Player history Remove Paint history Remove Microsoft Office ...
5/5 750 Dec 07, 2017
Cleanersoft Software
Alternate File Shredder 1.622
Alternate File Shredder 1.622 This program offers the possiblity to finally delete files and/or folders (no recovery possible). The program also can overwrite the free space on a drive, which means, that already deleted files cannot be restored, too. Open source (MS VC++ 2005)!! Windows NT 4, 95, 98, Me, 2000, XP, Server 2003, Vista, Server 2008, 7, 8, 8.1 Languages included: English, german, spanish, french, italian, chinese, japanese, korean Changes in this version: - Korean translation updated
5/5 1,781 Sep 06, 2016
Alternate Tools
Avira Privacy Pal 1.2.0.1137
Avira Privacy Pal 1.2.0.1137 Did you know that whenever you use your computer, you're leaving digital traces that could expose your personal data? That's why we created Avira Privacy Pal. It's a personal assistant that lets you manage your privacy more quickly, simply, and effectively than ever. You can manually deal with 200+ privacy issues or you can put them all in safe, reliable hands and enjoy the view from a sleek, intuitive dashboard. Wipe away complexity and your digital traces If you'd like to save time, reduce hassle, and safeguard your privacy, you've found a friend in Privacy Pal: Gives you an overview of your privacy status and a quick fix for privacy threats Puts you in control, so you can manage the information collected about you Looks for privacy vulnerabilities and lets you know how you're being tracked Ease of use is built in from the start Take a peek at the dashboard and you'll immediately notice state-of-the-art comfort and simplicity with all the information you need available at a glance. What you won't see are the hundreds of individual privacy issues. They're being quietly sorted. Shhhh. What does it do? Here are just some of the features that keep you and your data safe from snoops: Disable Windows tracking This stops Cortana (Microsoft's personal virtual assistant) from tracking your location and accessing your calendar, contacts, and browsing history Remove chat logs from Skype Skype keeps a history or your private chats. We think that no one needs to know whom you talk to Disable web tracking Limit the information that ad and analytics companies gather about you from your web browsing Pick your preferences We're all different, which is why Privacy Pal offers three user profiles. Each profile comes with a unique balance of privacy and convenience. They're free and easy to use. Choose Basic You ...
5/5 474 May 22, 2018
Avira Operations GmbH
BCTextEncoder 1.01
BCTextEncoder 1.01 Never worry that someone might read a confidential email, BCTextEncoder will easily encrypt part or all of your messages. Easily encrypt your messages using strong and approved symmetric and public key algorithms for data encryption. BCTextEncoderTM utility software simplifies encoding and decoding text data. Plain text data is compressed, encrypted and converted to text format, which can then be easily copied to the clipboard or saved as a text file. BCTextEncoder uses public key encryption methods as well as password-based encryption.
5/5 4,114 Sep 06, 2016
Jetico Inc.
BlackBeltPrivacy Tor+WASTE 3.01.2014.01
BlackBeltPrivacy Tor+WASTE 3.01.2014.01 Tor helps keep you safe online.. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous(). An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE). Features: 4 Modes, Censored Client, Bridge(default), Relay and Exit - chosen by you at install time. Be sure to check-out the screen shots. Friendly support provided. Streamlined Installation Package. No additional configuration necessary for server, client or darkNet() Auto Firefox config. Optional Tor Relaying, bandwidth restricted. From 0->100mb or 0->500mb per day - its your choice. Regularly updated includes auto-configured Obfsproxy, for censored-clients and bridge-operators Screen shots may differ due to our continuous development cycle. •NOTE: Linux/Unix/MacOSX Compatibility is obtained via WINE. (tested working) •NOTE: The core tor team no longer ship a proxy. We have adopted the same.
0/5 4,219 Sep 06, 2016
darkNet()
Blackbird 1.0.27 32bit
Blackbird 1.0.27 32bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free and Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated and Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. Blackbird Changelog v1.0.27 - Latest - Improved STD mode; Now users have the option to confirm or skip force removal of any found task. - Added new switch /W - Enable/disable Task View on Windows 10 (virtual desktops). - Added new hosts to blacklist. - Disabled 'PushToInstall' login/registration scheduled tasks. - Fixed 'Network Connectivity Assistant' service not getting disabled properly, causing Event Viewer error entries. - ...
5/5 1,256 Sep 19, 2018
Blackbird Software
Blackbird 1.0.27 64bit
Blackbird 1.0.27 64bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free and Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated and Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. Blackbird Changelog v1.0.27 - Latest - Improved STD mode; Now users have the option to confirm or skip force removal of any found task. - Added new switch /W - Enable/disable Task View on Windows 10 (virtual desktops). - Added new hosts to blacklist. - Disabled 'PushToInstall' login/registration scheduled tasks. - Fixed 'Network Connectivity Assistant' service not getting disabled properly, causing Event Viewer error entries. - ...
5/5 1,368 Sep 19, 2018
Blackbird Software
Blank And Secure v5.01 32bit
Blank And Secure v5.01 32bit Blank And Secure is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. The other overwriting standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard is not implemented, because in my test i had no measurable improvement, for that reason is that not implemented in "Blank And Secure" ;) # Usage: Add the files or folders via drag and dropp on "Blank And Secure" or program icon on the desktop. Then press "delete". The file(s) will be rewritten with NULL before deleting, so the content is now irreparable. Press the button "Fill the free space with null" this will remove the standard deletion tracks from the harddrive . # Features: # Very Small # Overwrite the Files 1-32 times with NULL and delete. # Fill the free HD space with null # Secure delete and Shutdown the PC # Remove the standard deletion tracks from the harddrive # Optional translation feature # Drag and Drop # Portable # Multilingual # .... # Options: Reset: Clear the List Contents (not delete the files). Delete: Overwrite folder and files with NULL and delete. Overwrite X times: Overwrite the data X times with NULL. Delete Delay X-sec.: At this time you can stop the erasing procedure with the key [ESC]. Fill the free space with null: This will remove the standard deletion tracks from the harddrive. # Operating systems: Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Home, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8, Windows 8 Enterprise, Windows 8 Pro, Windows 7, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, ...
5/5 701 Dec 09, 2018
Nenad Hrg
Blank And Secure v5.01 64bit
Blank And Secure v5.01 64bit Blank And Secure is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. The other overwriting standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard is not implemented, because in my test i had no measurable improvement, for that reason is that not implemented in "Blank And Secure" ;) # Usage: Add the files or folders via drag and dropp on "Blank And Secure" or program icon on the desktop. Then press "delete". The file(s) will be rewritten with NULL before deleting, so the content is now irreparable. Press the button "Fill the free space with null" this will remove the standard deletion tracks from the harddrive . # Features: # Very Small # Overwrite the Files 1-32 times with NULL and delete. # Fill the free HD space with null # Secure delete and Shutdown the PC # Remove the standard deletion tracks from the harddrive # Optional translation feature # Drag and Drop # Portable # Multilingual # .... # Options: Reset: Clear the List Contents (not delete the files). Delete: Overwrite folder and files with NULL and delete. Overwrite X times: Overwrite the data X times with NULL. Delete Delay X-sec.: At this time you can stop the erasing procedure with the key [ESC]. Fill the free space with null: This will remove the standard deletion tracks from the harddrive. # Operating systems: Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Home, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8, Windows 8 Enterprise, Windows 8 Pro, Windows 7, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, ...
5/5 687 Dec 09, 2018
Nenad Hrg
BleachBit 2.0
BleachBit 2.0 BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows and more. Features simple: just check the boxes quick: clean all applications in one place secure: overwrite files to hide contents powerful: clean 1000+ applicationdq safe: options are clearly labeled to avoid surprises Changes These are the changes since version 1.12: Add drag-and-drop support (thanks to contractor Pavel). Try dropping files onto the main application window. Fix preservation of thumbnails on Google Chrome and Chromium . Fix error Favicons is version 36 or 38 when cleaning Google Chrome and Chromium. Clean site engagement history on Google Chrome and Chromium. Enable secure delete for SQLite. Fix DatabaseError: no such table: moz_favicons for some Firefox profiles. Use HTTPS encryption when automatically checking for software updates. The bleachbit.org web site requires HTTPS encryption. Specific to Linux Add journald cleaner (thanks to tstenner). Add software categories to bleachbit.desktop (thanks to Hugo Lefeuvre). Add appdata.xml file for Linux app stores (thanks to Mailaender). Call apt-get command for apt clean to respect the dpkg lock (reported by Danilo Piazzalunga). Whitelist Bluetooth daemon (reported by Timo Ollech). Fix error when cleaning APT autoremove (reported by vladislavyuzbekov). Fix purging of GTK recently used resources list. ...
5/5 1,003 Feb 28, 2018
Andrew Ziem
BMP Wrap 2.0
BMP Wrap 2.0 Ever needed to email a file but it keeps on bouncing because it's an illegal attachment? Renaming the file or storing it in a ZIP archive sometimes works, but many ISP can detect that low-tech obfuscation. You need BMP Wrap. BMP Wrap temporarily hides a file inside a valid .BMP image. Once hidden, you can send the BMP file to anybody you wish and they can then extract that file from the BMP image using BMP Wrap. Now you can send EXEs, DLLs, or whatever file format you want, and the destination mail server will never be the wiser. No installation is required - just save the EXE file to your desktop, and then drag the file you want to wrap/unwrap onto the the BMPWrap Icon (a new .BMP file is created, the original file is left unmodified). This program is free & does not include any ad-ware or other malware.
5/5 653 Jan 27, 2017
HCI Design
CrococryptFile 1.6
CrococryptFile 1.6 CrococryptFile is a file encryption tool which creates encrypted archives of arbitrary files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256) Features file encryption encryption aes twofish pbkdf2 cloak pgp Version History 1.6 (05/13/2017): New: Support for Russian added (Special thanks to Aleksey Cheremnykh
5/5 672 Apr 02, 2018
Frank Hissen
Crypter Geek 2.0
Crypter Geek 2.0 Encrypt / Decrypt text files by this mysterious encryption tool, No installation required. Warning: Windows Defender and other anti-malware programs may incorrectly detect this as malicious. It is a clean file.
5/5 1,481 Feb 25, 2017
Christos Beretas
DeepSound 2.0
DeepSound 2.0 DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE). System requirements: - Windows XP/Vista/7/8 - Microsoft .NET Framework 3.5 Documentation: 1 DeepSound 2.0 1.1 Hide data into carrier audio file To hide data into audio file, follow these steps: Select carrier audio file or drag and drop audio file (flac, wav, wma, mp3, ape) into the file explorer. Click to 'Add files' or drag and drop secret files into the panel on the right side of application. Press F3 key or click to encode secret files. You can choose output audio format (wav, flac or ape). DeepSound does not support wma output format. If you want to hide data into wma, hide secret data into wav file and then use external software such as Windows Media Encoder for convert wav to wma lossless file. In settings dialog you can turn On/Off encrypting and set password. Modified audio file will be copied to output directory. Click Ok to start hiding secret files into carrier audio file. 1.2 Extract secret data from audio file or audio CD track To extract secret data from audio file, follow these steps: In the file explorer, select audio file or audio CD track, which contains secret data. If the secret files are encrypted, enter ...
5/5 1,543 Mar 16, 2016
Jozef Bátora
DeleteOnClick 2.3.0.0
DeleteOnClick 2.3.0.0 DeleteOnClick is a very simple to use file secure delete utility for Microsoft Windows 98SE/ME/ 2000/XP/2003 and Vista. Any type of file can be deleted, including NTFS compressed and NTFS encrypted files. DeleteOnClick completely deletes files in one click and the data becomes unrecoverable, and also has the option to wipe free disk space. For this reason you must use the program carefully. Once a file is 'Securely Deleted' no one can undelete it.
0/5 3,871 Feb 24, 2014
2brightsparks
Demonsaw 4.0.3 Linux Client
Demonsaw 4.0.3 Linux Client Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Debian 8+ and most 64 bit GNU derivatives 784ff00387d46fc2a83d5d303a68fa5ab9a7096e8c285fe8c4ebf853bb10f078 SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 448 May 24, 2018
Eijah: Demonsaw, LLC.
Demonsaw 4.0.3 Mac OSX Client
Demonsaw 4.0.3 Mac OSX Client Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Yosemite and up 26442007e9e4ff889af488f8f31d1679a6c294f799dd579b0730d450c02adc17 SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 446 May 24, 2018
Eijah: Demonsaw, LLC.
Demonsaw 4.0.3 Router
Demonsaw 4.0.3 Router Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Windows, Linux, OSX, and ARM e61640f3bf1346704ba87e6c806c89fa5b4b99f6a602dbcbf2afa93ef4c54119 SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 449 May 24, 2018
Eijah: Demonsaw, LLC.
Demonsaw 4.0.3 Windows Client
Demonsaw 4.0.3 Windows Client Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Windows 7 and up 5acb61867558a6d7212c9a1e0b6f416d4d7537374068fc4bba4249e1216dc05e SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 466 May 24, 2018
Eijah: Demonsaw, LLC.
Easy File Locker 32bit 2.2
Easy File Locker 32bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 3,749 Jan 13, 2017
XOSLAB.COM
Easy File Locker 64bit 2.2
Easy File Locker 64bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 3,807 Jan 13, 2017
XOSLAB.COM
EasyCrypt 2.00
EasyCrypt 2.00 EasyCrypt is a simple and easy to use file encryption and decryption tool. Fast encrypt or decrypt files with AES-256, a very secure encryption algorithm. Features: Lightweight, simple and easy to use UI Secure encryption with AES-256, a random IV and 256-bit (32 bytes) salt Fast encryption and decryption Requirements: .NET Framework 4.5 2 GHz Processor, 128 MB RAM 2 MB of free disk space
5/5 678 Feb 18, 2018
HEXAGON Developments
EncryptPad 0.4.0.2 for Mac
EncryptPad 0.4.0.2 for Mac EncryptPad is an application for viewing and editing symmetrically encrypted text. Using a simple and convenient graphical and command line interface, EncryptPad provides a tool for encrypting and decrypting binary files on disk while offering effective measures for protecting information, and it uses the most widely chosen quality file format **OpenPGP** [RFC 4880](https://tools.ietf.org/html/rfc4880). Unlike other OpenPGP software which main purpose is asymmetric encryption, the primary focus of EncryptPad is symmetric encryption. Features Symmetric encryption Passphrase protection Key file protection Combination of passphrase and key file Random key file generator Key repository in a hidden directory in the user's home folder Path to a key file can be stored in an encrypted file. If enabled, you do not need to specify the key file every time you open files. Encryption of binary files (images, videos, archives etc.) Read only mode to prevent accidental file modification UTF8 text encoding Windows/Unix configurable line endings Customisable passphrase generator helps create strong random passphrases. File format compatible with OpenPGP Iterated and salted S2K Passphrases are not kept in the memory for reuse, only S2K results (more ...) Cipher algorithms: CAST5, TripleDES, AES128, AES256 Hash algorithms: SHA-1, SHA-256, SHA-512 Integrity protection: SHA-1 Compression: ZLIB, ZIP Large multi-gigabyte files are supported Why use EncryptPad? Multi-platform codebase: it has been compiled on three popular operating systems and can be adapted to more. Portable: simply copy the executable to a ...
5/5 296 Jul 24, 2018
Evgeny Pokhilko
EncryptPad 0.4.0.2 for Windows
EncryptPad 0.4.0.2 for Windows EncryptPad is an application for viewing and editing symmetrically encrypted text. Using a simple and convenient graphical and command line interface, EncryptPad provides a tool for encrypting and decrypting binary files on disk while offering effective measures for protecting information, and it uses the most widely chosen quality file format **OpenPGP** [RFC 4880](https://tools.ietf.org/html/rfc4880). Unlike other OpenPGP software which main purpose is asymmetric encryption, the primary focus of EncryptPad is symmetric encryption. Features Symmetric encryption Passphrase protection Key file protection Combination of passphrase and key file Random key file generator Key repository in a hidden directory in the user's home folder Path to a key file can be stored in an encrypted file. If enabled, you do not need to specify the key file every time you open files. Encryption of binary files (images, videos, archives etc.) Read only mode to prevent accidental file modification UTF8 text encoding Windows/Unix configurable line endings Customisable passphrase generator helps create strong random passphrases. File format compatible with OpenPGP Iterated and salted S2K Passphrases are not kept in the memory for reuse, only S2K results (more ...) Cipher algorithms: CAST5, TripleDES, AES128, AES256 Hash algorithms: SHA-1, SHA-256, SHA-512 Integrity protection: SHA-1 Compression: ZLIB, ZIP Large multi-gigabyte files are supported Why use EncryptPad? Multi-platform codebase: it has been compiled on three popular operating systems and can be adapted to more. Portable: simply copy the executable to a ...
5/5 300 Jul 24, 2018
Evgeny Pokhilko
Eraser 6.2.0.2979
Eraser 6.2.0.2979 Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8 ,10 and Windows Server 2012. Eraser is Free software and its source code is released under GNU General Public License. Why Use Eraser? Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems, the list continues. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first. Your first thought may be that when you ‘delete’ the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. Eraser Features It works with Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8,10 and Windows Server 2012.Windows 98, ME, NT, 2000 can still be used with version 5.7!.It works with any drive that works with Windows.Secure drive erasure ...
5/5 965 Aug 31, 2016
The Eraser Team
ExtractFace 6.3.2
ExtractFace 6.3.2 Investigators, researchers or other analysts often have to get local copies of Facebook data. It can be necessary for a lot of reasons like submitting Facebook data as evidence, doing advanced offline analysis, etc. But Facebook interface has not been designed for that and does not provide printing or saving functions. Even for a user that want a copy of a conversation in his profile, there is no simple solution. ExtractFace has been designed to help people to extract data from Facebook. It provides usefull functions to automate a lot of tasks that have to be done manually otherwise. See documentation for more details. How it works ExtractFace can be installed using the installer or used as a standalone application. In order to start using it, just run the executable file from the start menu or the directory you install it. While running, you can access functions by right clicking the ExtractFace tray icon in the taskbar. I recommend you to customize your taskbar to make this tray icon always visible. If you don't know how to do it, look at this page: How to Customize and Tweak Your System Tray Icons in Windows. ExtractFace uses MozRepl add-on* to automate Mozilla Firefox browser. So you can crawl Facebook as normal with Firefox and use ExtractFace to automate some annoying things like scrolling or clicking in order to get additional content. When the content is fully loaded in your browser, you can print to PDF, capture screen, or use ExtractFace again to dump the data in a usefull way. Be aware that you better should not use Firefox when a ExtractFace function is running. What do you need Windows XP SP2 or newer Mozilla Firefox MozRepl add-on https://addons.mozilla.org/en-US/firefox/addon/mozrepl/ A Facebook account Version History 6.3.2 ...
5/5 712 Jan 07, 2018
Alain Rioux
Fastlock v1.2
Fastlock v1.2 Fastlock is a small and fast utility to hide the screen activity with a security password. This tool blocks any windows control components: Alt+F4, Alt+Tab, Task Manager, Windows Keys, Security Screen. There is no way to kill Fastlock's process and get access to your desktop. Difference to system's lock screen: There is no CPU deceleration, which enables you an instant access to your programs after unlocking. Notice, that Fastlock is only a temporary solution to lock your screen. Changelog: Version 1.2: - Fixed taskbar and starbutton flickering - Fixed possible access to the startmenu by spamming winbutton - Implemented new error exceptions - Changes in the Fastlock's Password Tool are now being processed in real-time - Locked keys and changing keyboard layout are now being displayed
5/5 669 May 30, 2017
2xDSoft
File Access Monitor 1.0.2
File Access Monitor 1.0.2 File Access Monitor is a multipurpose tool that monitors access to your files and provides detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, as well as on a local computer where it will track local users file access. It is similar in nature to Windows auditing features yet is much easier to use and provides flexible reporting capabilities and notifications. Key features Monitors file actions: creating, moving, deleting, reading and writing to files. Records remote user access to shared folders. Keeps track of local users as to what files they access. Features a powerful filter system to include or exclude certain activities. Self-contained, doesn’t require a database server alongside. Supported platforms Windows XP through Windows 10, Windows Server 2003 through 2012 32-bit and 64-bit Changelog: 2016-10-10 1.0.2 This software is now freeware.
5/5 729 Dec 14, 2016
SoftPerfect
FileCrypt R1.0 Rev4
FileCrypt R1.0 Rev4 FileCrypt is a fast, free and secure file encryption software. It's portable and very easy to use. Supported algorithms: AES, RC2 and TripleDES. All are available in their supported key sizes. More algorithms may be added in the future. It encrypts your files very securely using 32-bit long salts and a IV. You can drag and drop files into FileCrypt to quickly add them. Press F10 on your keyboard while not setting a password to switch between visible and non visible password mode. System Requirements: 1,2 GHz Single-Processor, 512 MB RAM, Windows Vista or higher, .NET Framework 4.5.2
5/5 682 Aug 01, 2017
Davaxyr
Files Terminator Free (PORTABLE) 2.6.0.0
Files Terminator Free (PORTABLE) 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 4,084 Jan 19, 2014
Elefant Software
Files Terminator Free 2.6.0.0
Files Terminator Free 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 4,087 Jan 19, 2014
Elefant Software
Free File Camouflage 1.25
Free File Camouflage 1.25 Want to save a copy of your personal file on a USB Pendrive but you are worried that, in case of theft, someone will be able to access your data? With Free File Camouflage you can hide your files inside a JPEG image! The software can be used with the main interface or via the explorer "send to" context menu (the first time you only need to select a directory with some images). All the files are encrypted using AES and hidden inside an image. What happens if someone tries to open a camouflaged image? Well... nothing! He will only see the image. Change Info: Version 1.25: - added a new registration method: SMS. Useful if you don't have a credit card or PayPal - new error reporting system engine - various code fix - updated internal libraries code
5/5 3,683 May 31, 2017
My Portable Software
Free File Wiper 1.76
Free File Wiper 1.76 Delete files securely with this software! Just right click on files or directories and select "Send to / Free File Wiper" to erase them completely! Or ... you can drag and drop them on the trashcan to perform the wipe operation. The files will be overwritten with standard and random patterns. After the wipe, the files cannot be undeleted and restored. Up to four wipe methods (from 1 pass to 7 passes). Change Info: -updated registration library code
5/5 3,662 Apr 01, 2014
My Portable Software
Free Hide IP 4.1.8.8
Free Hide IP 4.1.8.8 Free Hide IP - The best free privacy protection software. Free Hide IP the best way is to keep your IP address from being shown to others. Hackers and identity thieves are becoming more and more rampant in today's society. They may break into anyone's computer and monitor one's activity or steal one's identity or other personal information. To stay safe online, the best way is to keep your IP address from being shown to others. Now we provide you a FREE solution to hide your IP address. Use Free Hide IP to hide your real IP address for free, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click.
5/5 4,276 Jun 07, 2017
Free Hide IP
Free VPN Test 1.1.0.3
Free VPN Test 1.1.0.3 Free program to detect DNS traffic and IP leaks from your VPN. What DNS traffic is your VPN leaking? Your computer uses DNS to lookup the location of web sites and services in order to connect to them. Even if you use a proxy or VPN, your DNS traffic can still be exposed. Your ISP, governments, WiFi hotspot providers and other users on your WiFi hotspot can all see your DNS requests.
5/5 275 Aug 13, 2018
Free VPN Test
fSekrit v1.4
fSekrit v1.4 fSekrit is a small application for keeping securely encrypted notes. These notes are truly stand-alone; the editor program and your note are merged together into a tiny self-contained program file, bypassing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives. Another advantage of using fSekrit is that your un-encrypted data is never stored on your harddisk. With a traditional encryption utility you would have to decrypt your file to disk, view or edit it, and then re-encrypt it. Unless you use secure file wiping tools, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you deleted the temporary file. This is not a viable attack against fSekrit, though, since it never stores your un-encrypted data on disk. (See security notes about swapping and hibernation, though!) fSekrit uses very strong encryption to ensure that your data is never at risk. Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize. Self contained fSekrit notefiles are tiny! Only around 50k plus the size of your encrypted text. Release History: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ version 1.40 - December 3, 2009 - 90kb/45.5kb - fixed: long-standing bug where failing to save changes when closing fSekrit with a modified document would cause fSekrit to exit, rather than notifying of error and let user attempt to save again. - fixed: saves are *finally* done properly, by saving to a temporary file and replacing the current file only when all the file writing business is done. - added: font selection dialog, no longer do you need to much around with the registry to set another default font. The font is still not stored in your document, ...
5/5 438 May 29, 2018
f0dder
G Security 1.0
G Security 1.0 G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys like Alt+tab, Ctrl+Alt+Esc, Alt+F4 etc will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time on a single computer with settings stored for each user individually so that each user can use G Security with its own preferences. G Security also supports hotkey to lock the system. In a few words its extremely secure, easy to use and configurable desktop locking solution available for everyone free of cost. Some of its key features include : Its easy to use. Its a Freeware. Fully locks down your computer. Can protect Windows on startup. Suitable for all kinds of users. Multi user support. ...
5/5 1,047 Jun 20, 2016
Malik Usman Aura
GuardAxon 3.9
GuardAxon 3.9 GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
5/5 1,996 Apr 18, 2015
The Geneosoft Team
GuardAxon 3.9 PORTABLE
GuardAxon 3.9 PORTABLE GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
0/5 2,009 Apr 18, 2015
The Geneosoft Team
Hardwipe 5.2.1
Hardwipe 5.2.1 Hardwipe is the free data sanitization toolset used by activists, journalists, IT technicians and anyone needing to ensure that discarded, but sensitive, information can never be recovered by someone else. Freedom to Securely Erase Sensitive Information Use Hardwipe to permanently erase (or "hard wipe") data on disk and portable storage media. Hardwipe for Desktop provides a slick user interface with optional support for "right-click" context menus in Windows File Explorer. It can conveniently destroy files and folder contents on-demand, erase drives and USB media, and sanitize the Windows Recycler. Hardwipe for Desktop is free for non-commercial use.
5/5 1,375 Nov 21, 2017
Big Angry Dog
idoo File Encryption Free 7.1
idoo File Encryption Free 7.1 idoo File Encryption Free is easy-to-use File Encryption freeware by password protect. Free encrypt Microsoft Office documents (MS Word .doc, .docx,Excel .xls,Powerpoint .ppt. text), Images (PNG,TIFF photo,Lotus,PDF files,BMP,Jpg/Jpeg photos,GIF picture ), Media Video files (mp4 ,WMV,AVI,3gp,mp3,music,RMVB movies, RM films,audio) Features: Hide data hide your private files, folders, drives, to make them completely invisible to users programs. Lock data the locked files/folders/drives, can not open, be read, modified, moved, deleted, copied, or renamed. Protected files/folders without password. Files and sub-folders in a locked folder are also protected. Encrypt data it can encrypt files and folders of any type. Portable encryption packs and encrypts a folder into an executable (.exe file) with AES encryption. Safe delete no one can recover deleted data from your disk if you secure delete it. Password protected there's no other way to run or uninstall it if you do not have the password. Idoo is a very easy to use program with a user-friendly interface. Changelog: improve funtion from my user suggestions
0/5 3,038 Jul 17, 2014
Idoo Software
KeyLock 2.1.0
KeyLock 2.1.0 KeyLock is a program to lock your computer with a USB Flash Drive or a phone. Safe: It's not possible to use your computer after you've locked it with KeyLock. Our exclusive technologies use the Windows lock screen to lock your PC, making it impossible to reach the desktop. After unlocking, you can immediately use your computer again. Easy and Quick: You quickly need your computer with the common Windows security? First you need to unlock, type your password, have a typo, type in again and finally, your pc is unlocked. With KeyLock, all these problems are solved: Press "Unlock" on your phone or put your USB Flash Drive in your computer and you can use it immediately. Changelog: 2.1.0 28 December 2017 - Added the possibility to use two-factor authentication - Security improvements - Bug fixes
5/5 2,630 Dec 29, 2017
Brabonet
KeyScrambler 3.8.0.0
KeyScrambler 3.8.0.0 KeyScrambler encrypts your keystrokes deep in the kernel, foiling keylogging attacks with scrambled, undecipherable data. This advanced method of keystroke protection defeats both known and unknown keyloggers. The friendly interface displays realtime encrypted stream of keystrokes so you see when and how KeyScrambler is working. Strengthens where defenses are the weakest in your traditional anti-virus, anti-malware programs and PC security. Compare Editions A free browser add-on, KeyScrambler Personal protects all your inputs in IE, Firefox, and Flock. KeyScrambler Pro and Premium are paid programs that protect a wide array of apps. How It Works KeyScrambler encrypts your keystrokes at the keyboard driver level and decrypts them at the destination application, giving keyloggers "scrambled," useless keys to record. For Online Games Both KeyScrambler Pro and Premium protect your player's IDs, passwords and digital assets in over two dozen online games. For Business Read how and why KeyScrambler is important for your business. KeyScrambler Premium protects critical systems and reduces risks of information theft at the workplace. Features KeyScrambler defeats known and unknown keyloggers; also protects Chinese, Japanese, and Korean inputs; is compatible with other security programs, tokens and smart cards; and requires no user effort. How To The user-friendly interface allows you to do things on KeyScrambler for a more comfortable, personalized fit. Supports: Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser.
5/5 3,412 Jul 29, 2015
QFX Software
KORO File Shredder 4.2.3.0
KORO File Shredder 4.2.3.0 KORO File Shredder is a program to erase sensitive data in a way that a recovery will be impossible. Data will be overwritten several times e.g. using the US DoD 5220.22-M ( ECE ) erasure method. Using File Shredder you can delete files and documents from your hard drive and must not worry about that they could be recovered anytime later. Software tools offered for retrieval of deleted files under Windows, usually called "file recovery" software, are taking advantage of the shortcoming of the Windows "delete" command we are normally using to delete files. In fact, the "delete" operation in Windows only removes some bits of information from file directories so that the files disappear from thefile manager view. To undelete such a file, it is just necessary to repair the entry in the file directory. To remove files permanently from your system, like a shredder does with your paper documents, you have to use a program that is capable of overwriting the files with a series of random generated binary data for multiple times. Thus, the current contents of the files will be overwritten in a way that a recovery is practically unpossible. Wiping out method Before deletion all files are overwritten using one of the following algorithms Zero (1 Pass): Overwrite the files with zeros. DoD (7 Passes): Overwrite files in accordance with the US Department of Defense regulation DoD 5220.22-M(ECE). Gutmann (35 Passes): Overwrite files using the method developed by Peter Gutmann.. This method is considered to be the most secure, but slow. KORO File Shredder will operate on the following versions of Microsoft Windows: Windows 8.1, 8, 7, Vista, XP, 2000 32-bit és 64-bit Operating system. Special features Easy to use interface Multiple preset shredding methods Support for internal and external drives Support for removable media (SD Flash, Compact Flash, USB drives) Fool proof warnings before deleting any files Custom shredding settings to fit your needs Protects system files ...
5/5 1,335 Jan 14, 2016
Robert Kovacs
KryptoFiler 1.0.2
KryptoFiler 1.0.2 Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Encrypt & Decrypt Large Files. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1.0.2 : added drag and drop
0/5 1,537 Sep 29, 2015
3nity Softwares
KryptoMessage 1.0
KryptoMessage 1.0 Encrypt and decrypt messages, mails and conversations through cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Unicode support. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1 : first release
0/5 1,542 Sep 29, 2015
3nity Softwares
Leo Folder Locker 2.0
Leo Folder Locker 2.0 Leo Folder Locker is a software to secure your data in a smart, fast , effective and secure way. Although your operating system may offer you the possibility to hide folders, they are easy to find and reveal, since they are not protected by anything else. Thus, they cannot be considered as an option if you need to secure your sensitive data, especially on computers shared by more users at once. Leo Folder Locker comes in handy when these situations occur. This software does not encrypt your data instead it relies on some Windows OS based techniques to lock down folders. This software uses some basic techniques which are pretty good to be used on usual data. This software is not recommended to be used in high sensitivity situations where hard core encryption is required. This software was only designed to be used in general situations. Some of its key features include : Lock Down Mode As a defense from password guessing. Self Destruction Mode to provide a high level security. An Beep System used as an alert. Fully Customizable Settings. A Password Recovery System just in case you forgot yours. A new CLI based easy-to-use UI. A Freeware By Malik Usman Aura.
5/5 1,037 Jun 20, 2016
Malik Usman Aura
MRU-Blaster 1.5
MRU-Blaster 1.5 Protect your privacy, and keep your PC free from clutter. Find and remove over 30,000 MRU lists. MRU-Blaster is a program made to do one large task - detect and clean MRU (most recently used) lists on your computer. These MRU lists contain information such as the names and/or locations of the last files you have accessed. They are located ALL OVER your registry, and for almost ANY file type. By looking at these MRU lists, someone could determine what files you opened/saved/looked at, what their file names were, and much more! (And, in many cases, the lists are displayed in drop-down menus automatically.) With additional plug-ins that allow you to clean out your Temporary Internet Files and Cookies, MRU-Blaster enhances the protection of your privacy! Clean Up Clutter MRU-Blaster safely, efficiently, and rapidly handles cleaning up tens of thousands of "usage tracks" and other remnants that most programs leave behind. These remnants aren't just a potential privacy concern - they can clog up your registry, and take up valuable space on your hard drive. Windows as well as most third-party programs are culprits. And MRU-Blaster can detect and remove over 30,000 different MRUs and usage tracks. Securely Erase Browsing Tracks MRU-Blaster also supports secure removal of Internet Explorer Temporary Internet Files (cache) and Cookies, with its built-in Plugins. The Internet Explorer cache alone can take up GB (gigabytes) of space on your hard drive. System Requirements MRU-Blaster works on Windows 95, 98, ME, NT, 2000, XP, Vista, 7.
5/5 667 Jan 27, 2017
Brightfort LLC
OandO ShutUp10 1.6.1395
OandO ShutUp10 1.6.1395 Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! Freeware More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Further information Portable Version – no installation required Operating System: Microsoft® Windows 10 OandO ShutUp10 EULA Important Features at ...
5/5 1,689 Jan 01, 2018
OandO Software GmbH
Password Safe 3.46
Password Safe 3.46 How many passwords do you have to secure? Start your safe and simplified digital life Free open source software Installation in minutes on Vista, 7, 8 and 10 Designed by renowned security technologist Bruce Schneier Over 4 million downloads Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work).
5/5 2,074 Apr 11, 2018
Password Safe
Pixeloid 1.1
Pixeloid 1.1 Pixeloid A novel and uber-secure way to store data The Pixeloid Matrix The all new Pixeloid Matrix is extremely dense and enables encoding of both text and images(β) along with an automatic ciphering of the data Password Protection Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices with Triple Data Encryption Standard (TripleDES) encryption over the automatic ciphering Licensing Pixeloid is Licensed to Ajay Menon and is completely free to use.
5/5 678 Aug 25, 2017
Ajay Menon
Privacy Eraser 4.1.1.1291
Privacy Eraser 4.1.1.1291 Privacy Eraser is an easy to use solution for protecting your privacy by deleting your browsing history and other computer activities. All main popular web browsers are supported, including Internet Explorer, Firefox, Chrome, Safari and Opera. With literally one click, Privacy Eraser will erase all digital footprints - web browser cache, cookies, browsing history, address bar history, typed urls, autocomplete form history, saved passwords, index.dat files, Windows' run history, search history, open/save history, recent documents, temporary files, recycle bin, clipboard, dns cache, log files, error reporting and more. Privacy Eraser also supports plugins to further extend the software's cleaning features. Meaning you can also delete whatever tracks are left behind by other applications with your own plugins. Privacy Eraser embedded more than 250 free plugins, supporting many popular programs such as ACDSee, Adobe Reader, Microsoft Office, WinZip, WinRAR, Windows Media Player, VLC Player, BitTorrent, Google Toolbar and many others. Privacy Eraser works with Windows 8.1/8/7/Vista/XP/2012/2008 (32/64-bit), and also supports Windows FAT16/FAT32/exFAT/NTFS file systems. The software implements and exceeds the US Department of Defense and NSA clearing and sanitizing standards, giving you the confidence that once erased, your file data is gone forever and can never be recovered. Main Features: Internet Explorer (IE), Firefox, Chrome, Safari and Opera Cleans internet cache, browsing history, cookies, typed urls, download history, autocomplete & autofill form history, saved password and much more. Windows Better computer security: cleans run history, search history, open & save history, recent documents, temporary files, recycle bin, clipboard, taskbar jump lists, dns cache, log files, memory dumps, error reporting and more. Third party applications More than 250 free, pre-configured plugins to clean the traces of many popular applications. You can also extend cleaning features by ...
0/5 1,914 Jul 10, 2015
Cybertron Software
Privacy Guardian
Keep your what you do on your computer and the Internet protected from prying eyes! Internet and Online Privacy PC Tools Privacy Guardian works with popular Internet browsers to erase your browsing history, search history, cookies, passwords, and download logs to help keep your Internet activities private. It even works with chat programs, media players, FTP browsers, email clients, and peer-to-peer file transfer programs to protect your other online activities as well. Everyday Computing Privacy PC Tools Privacy Guardian also helps maintain your day-to-day computing privacy. Temporary and recent file history erasers clear your temporary file folders, as well as your recently opened files lists, keeping your PC use and file access history private. Other cleaners erase Windows® history, including the ones found in Microsoft® Office, the Recycle Bin, your Recently Run programs, and the Find and Search bar. Secure File Deletion PC Tools Privacy Guardian helps ensure that the files you delete stay deleted with secure file shredding. And to further safeguard your Recycle Bin, a disk-bleaching tool wipes your free hard disk space, preventing of your deleted files from being restored by file recovery tools.
0/5 5,678 Mar 01, 2012
Pctools
PrivaZer v3.0.57
PrivaZer v3.0.57 With simply one click, PrivaZer is able to clean securely . Internet browsers . Index.dat . Cookies . Cookies Tor . Cookies Flash . Cookies Silverlight . DOM Storage . IndexedDB . AppCache . Registry . RAM . Pagefile.sys and Hiberfil.sys files . Use of software . Messengers . Histories of visited websites, viewed videos, use of software, opened docs, etc . Jumplists . Recycle bin . Temp files . Log files . Invalid Prefetch entries . Indexing service . ThumbCaches, Thumbs.db . Residual traces of deleted files . Free space . File table (MFT or FAT) . INDEX attributes in MFT . USN Journal, etc 1- Detection of residual traces in free space Visualization of residual traces of old files remaining in free space 2- Smart cleanup of free space Cleanup of residual traces in free space areas needing a reset to zero We assure no useless cleanups. Areas already reset to zero are not cleaned which can speed up cleanup by 2x to 100x. Cleanup runs faster after each run. 3- File table cleanup Cleanup of residual traces in file tables, not only in MFT but in FAT as well Additional cleanup of INDEX attributes in MFT 4- Smart overwriting Recognition of type of storage medium of your storage device : magnetic disk, SSD, etc Adaptation of overwriting algorithms to storage medium 5- Smart cleanup of Jumplists Cleanup of your Jumplists without deleting your pinned items/ websites which are preserved 6- Smart cleanup of Prefetch Removing of invalid Prefetch entries. Old valid entries are preserved. 7- Deletion of USB history Deletion of remaining traces of disconnected device (name, date, etc) 8- Scan and cleanup of Pagefile.sys / Hiberfil.sys content Visualization of Pagefile.sys / Hiberfil.sys content Pagefile.sys cleanup options : at each PC shutdown, or at next shutdown only Control of Hiberfil.sys cleanup : PrivaZer controls that the system has reset to zero Hiberfil.sys. If not, ...
5/5 4,487 Nov 17, 2018
Goversoft LLC
Program Blocker
Program Blocker Program Blocker is a portable TWC freeware that lets you block any desktop application. You can block it with a password or simply make it non-functional on your computer. The program is completely based on the idea of simply blocking applications from running, without taking any chances with the system, as a result of which the program does not make any changes in the registry and operates independently of the system. Features: Password protection Block applications Task manager Hidden mode
0/5 3,739 Mar 20, 2014
The Windows Club
Proxy Mask - Proxy Switcher 3.4.4
Proxy Mask - Proxy Switcher 3.4.4 Proxy Checker and Switcher allow access to blocked websites Access blocked websites, and you can watch blocked YouTube videos such as This Video Is Not Available In Your Country (by changing your IP to different country), hide your IP address, surf anonymously without a trace on the Internet. You can access many of blocked websites without using proxy with Smart DNS Changer Free. Supports HTTP and HTTPS proxy servers You can define different proxy setting for different processes at the same time At least several hundred working proxies (always) Updates Working proxy list automatically Supports all windows (XP to windows 10, 32 and 64-bits) When to use Proxy Mask or Proxy Switcher Accessing blocked websites: Your ISP (Internet Service Provider) may block some websites. Normally, network adapters on your computer, uses your IPS DNS server, and most of blocked websites blocking by your ISP's DNS server. This type of restrictions can be bypassed by changing DNS server settings of network adapters. You can use the Smart DNS Changer Free to change your DNS settings. Some websites blocks by their IP addresses and this type of restriction cannot be bypassed by changing DNS server settings. In this case you should use Proxy Mask (Proxy Switcher) to access blocked websites. Bypassing websites region (country) restrictions: Some videos on YouTube cannot be watched from some countries (because of publisher restriction or copyright etc.), In this case YouTube shows text message on video player like This Video Is Not Available In Your Country. To bypass such restrictions you can use Proxy Mask (Proxy Switcher) to access restricted contents by changing your IP address to different country (by using Elite proxy ...
5/5 1,526 Feb 25, 2017
Rentanadviser.com
Psiphon v3
Psiphon v3 The Psiphon 3 Circumvention System is a relay-based Internet censorship circumventer. The system consists of a client application, which configures a users computer to direct Internet traffic; and a set of servers, which proxy client traffic to the Internet. As long as a client can connect to a Psiphon server, it can access Internet services that may be blocked to the user via direct connection. Features: Automatic discovery. Psiphon 3 clients ship with a set of known Psiphon servers to connect to. Over time, clients discover additional servers that are added to a backup server list. As older servers become blocked, each client will have a reserve list of new servers to draw from as it reconnects. To ensure that an adversary cannot enumerate and block a large number of servers, the Psiphon 3 system takes special measures to control how many servers may be discovered by a single client. Mobile ready. A Psiphon 3 client Android app will be available as part of the beta launch, and other mobile platforms are in the works. Zero install. Psiphon 3 is delivered to users as a minimal footprint, zero install application that can be downloaded from any webpage, file sharing site or shared by e-mail and passed around on a USB key. We keep the file size small and avoid the overhead of having to install an application. Custom branding. Psiphon 3 offers a flexible sponsorship system which includes sponsor-branded clients. Dynamic branding includes graphics and text on the client UI; and a region-specific dynamic homepage mechanism that allows a different home page to open depending on where in the world the client is run. Chain of trust. Each client instance may be digitally signed to ...
5/5 716 Sep 10, 2018
Psiphon Inc.
QuickStego 1.2.1
QuickStego 1.2.1 Free Steganography Software QuickStego lets you hide text in pictures so that only other users of QuickStego can retrieve and read the hidden secret messages. Once text is hidden in an image the saved picture is still a 'picture', it will load just like any other image and appear as it did before. The image can be saved, emailed, uploaded to the web What is Steganography? Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. An Example of Image Steganography ... A perfectly innocuous picture? Nothing special about it? Well if you download QuickStego and copy the above image into the system, you will see that there is a lot of 'secret text' hidden in this image. Try it and see! Or if you can't wait, move further down this page for a screen shot of what will be revealed ... QuickStego - Screenshots Load the image from above into QuickStego and the secret text that was hidden in the photograph is revealed: System Requirements & FAQ * Operating System - Windows XP or Vista or 7. * Display - 32 bit color depth required * Image Types that can be opened - .jpg/.jpeg, .gif, or .bmp formats * Saved Hidden Text Images - .bmp format only * Approximately 2MB of free hard disk space (plus extra space for any images)
5/5 657 Mar 31, 2017
Cybernescence ltd.
SafeIP 2.0.0.2595
SafeIP 2.0.0.2595 Hide your IP address and protect your online identity with SafeIP by hiding your IP from websites, email, games, and more. Features: Encrypt all your Internet traffic with a private proxy, either browsing at home or on public WiFi hotspots Choose the anonymous IP location closest to you for the fastest connection speeds SafeIP can be used completely free for unlimited use, without advertisements and never expires
0/5 4,364 Jan 19, 2014
SafeIP, LLC.
Secret Disk 4.04
Secret Disk 4.04 Secret Disk can create additional disk on your PC, which can be invisible and locked with a password within one second. You can make your private files and folders invisible and protected. You don't need to format your hard disk or make any changes to boot sector. Our program will create new disk automatically very quickly. You can make this disk invisible, including all contents, and protect it with a password. You can store any files and folders on the disk. Secret disk works as usual hard disk and compatible with any other programs which you have installed. You can have more than one secret disk and you can also choose disk letter. In case of power outage or fatal error of OS Windows your secret disk will be locked and become invisible automatically. It happens automatically because information are stored in the virtual memory. Secret Disk does not encrypt any files, it just limits access to your files (you can use password). Software ties virtual disk to your files. This will provide you enough security to hide your files from any person. What's new in version 4.04? • Security improved: the program has been signed by new code signing certificate. • Fixed bug that prevented virtual disk from resuming from stand by mode. • Improved updates notification. • Small visual bug fixes. • Date of release: 1 March 2018.
5/5 1,768 Mar 02, 2018
PrivacyRoot
SecretFolder 3.0.0.0
SecretFolder 3.0.0.0 SecretFolder is a security tool to hide and lock your sensitive folder out from the other users. It provides immediate data protection (protect and unprotect commands are executed in no time). Features: Free to use at both home and in the office Support for 64-bit Windows. NTFS, FAT32, exFAT and FAT volumes are supported. Unlimited number of folders can be protected at the same time. No limits on the size of protected data. No file system structure modifications will occur. Protected uninstall. When you create a secret folder, using your own password, you can manage folder. CMD command will not be able to access the folders.
0/5 3,303 Jun 05, 2014
Oh!Soft
SecureMyBit 2.3
SecureMyBit 2.3 SecureMyBit is a free, portable, and light application , which allows to encrypt any type of file with password (using AES 256 Bit encryption method) and then, decrypt them. SecureMyBit provide, for this purpose, also a secure and strong random password generator, which can generate passwords, as long as you want. Another utility of SecureMyBit is the Secure File Shredder, which can delete a file permanently with an irreversible shredding operation. Our software provides also an utility which can validate the strength of user’s passwords; and a System Specs utility, which can tell us all the informations about our computer. SecureMyBit provides also, in addition, a secure virtual keyboard which doesn’t produce any keystroke, so this guarantee a protection while entering your password. Finally, you can also get information about your files: hashes, file type, file attributes, etc. and compress your text easily and fast! When you encrypt your file(s) or folder(s) the Smart Monitor will check in real-time if they are modified, renamed or changed/deleted. Key Features Secure File Password Encryption (AES 256 Bit) Secure File Shredder System Specs Password Generator File Info Viewer Text Compressor Smart Monitor Compatibility Windows Vista Windows 7 Windows 8/8.1 Windows 10 Special Requirement: Microsoft .NET Framework 4.5 Languages: English F.A.Q. -Why SecureMyBit is detected by my antivirus/antimalware? We want to specify that this is surely a false positive. SecureMyBit is a clean file. Do I need to install SecureMyBit? No, SecureMyBit is avalaible only in “portable” version, so it doesn’t require any installation. -Is SecureMyBit free? Yes, SecureMyBit is absolutely FREE and WITHOUT advertisements! -Does SecureMyBit protect files against ransomware? Well, SecureMyBit provides surely additional protection to the encrypted files, against ransomware, also because the extension of the encrypted files are encoded. This doesn’t mean SecureMyBit protects files against all type of ransomware. -Why SecureMyBit gives me an error message when I ...
5/5 677 Jan 24, 2018
JM Security
Spybot Anti-Beacon for Windows 10 1.6
Spybot Anti-Beacon for Windows 10 1.6 Spybot Anti-Beacon for Windows 10 is a small utility designed to block and stop the various tracking (aka telemetry) issues that come with Windows 10. Seeing the bunch of incomplete or broken scripts to disable tracking in Windows 10, and the tools that install adware or worse in exchange for their function, we wrapped disabling tracking up in a small tool that’s free and clean. With the upcoming news about telemetry in Windows 7 and 8.1, Spybot Anti-Beacon has added support for those as well. Changelog: Spybot Anti-Beacon 1.6 now available December 5th, 2016 Many thanks for all the patience waiting for an update to Spybot Anti-Beacon! We spent a lot of time working on Spybot 3. And now that Spybot Anti-Beacon will also be integrated into Spybot 3, we found time to continue work. Today’s update to Anti-Beacon 1.6 will add two new immunizers and a few new blocked hosts. More updates are already pending since we’re actively working on this feature again (including a new look, but mostly focused on function of course)! Spybot Anti-Beacon 1.6 can be downloaded from here. Updates: Additional Telemetry Immunization Categories Additional Blocked Hosts Fixes: Immunization of Office 13/16 Telemetry Scheduled Tasks and Options is possible even if Microsoft Office is not installed (previously they appeared to immunize correctly, but the immunization could not be undone in Anti-Beacon) Don’t forget to always run Spybot Anti-Beacon as an administrator by right-clicking the downloaded installer, and choosing the option to “Run as administrator”. This will ensure that Anti-Beacon has the permissions it needs to function correctly.
5/5 1,739 Dec 06, 2016
Safer-Networking Limited
SpyDetectFree 32bit 1.0
SpyDetectFree 32bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
0/5 1,446 Dec 07, 2015
NesterSoft Inc.
SpyDetectFree 64bit 1.0
SpyDetectFree 64bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
1/5 1,468 Dec 07, 2015
NesterSoft Inc.
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 32bit
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 1,958 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 64bit
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 1,974 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Mac OS X
Tor Browser Bundle 8.0 for Mac OS X What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the ...
5/5 2,141 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Windows 32bit
Tor Browser Bundle 8.0 for Windows 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 4,238 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Windows 64bit
Tor Browser Bundle 8.0 for Windows 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 249 Sep 06, 2018
The Tor Project
USB Raptor 0.1.2.71
USB Raptor 0.1.2.71 Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function Features Automated Windows lock/unlock with the use of common USB flash drives Compatible with all types of USB flash drives Robust design Easy to setup and use High security option to verify the serial number of the flash drive Various alternative unlock methods Supports LAN lockdown (and unlock) function Synchronized lock and unlock on LAN for multiple PCs Status report over internet and LAN Supports serial command integration (beta stage) Tray icon based application Option to delay and cancel the lock, to avoid unwanted locks Windows 10, Windows 7, Windows 8 and Windows XP compatible Multi screen systems ...
5/5 1,412 Dec 29, 2017
Nikos Georgousis
VeraCrypt 1.23 for Linux
VeraCrypt 1.23 for Linux VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.23 (September 12th, 2018): Windows: VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption. Fix EFI system encryption issues on some machines (e.g. HP, Acer). Support EFI system encryption on Windows LTSB. Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector. Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks. Add internal verification of binaries embedded signature to protect against some types to tampering attacks. Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances. when Secure Desktop is enabled, use it for Mount Options dialog ...
5/5 1,671 Sep 14, 2018
IDRIX
VeraCrypt 1.23 for Mac
VeraCrypt 1.23 for Mac VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.23 (September 12th, 2018): Windows: VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption. Fix EFI system encryption issues on some machines (e.g. HP, Acer). Support EFI system encryption on Windows LTSB. Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector. Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks. Add internal verification of binaries embedded signature to protect against some types to tampering attacks. Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances. when Secure Desktop is enabled, use it for Mount Options dialog ...
5/5 1,642 Sep 14, 2018
IDRIX
VeraCrypt 1.23 for Windows
VeraCrypt 1.23 for Windows VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.23 (September 12th, 2018): Windows: VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption. Fix EFI system encryption issues on some machines (e.g. HP, Acer). Support EFI system encryption on Windows LTSB. Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector. Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks. Add internal verification of binaries embedded signature to protect against some types to tampering attacks. Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances. when Secure Desktop is enabled, use it for Mount Options dialog ...
5/5 1,705 Sep 14, 2018
IDRIX
W10Privacy 3.1.0.3
W10Privacy 3.1.0.3 The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea for the development of this little program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! This program may trigger anti-virus warnings since it changes core Windows settings.. These are false warnings. This program contains no viruses or malware. Changelog: 3.1.0.3 (10.07.2018) - Starting with Windows 10 1709, another registry key will be set for the setting "Do not show app suggestions (advertising) in the start menu". This has now been taken into account. Many thanks to Winfried for the hint!
5/5 1,345 Aug 08, 2018
Bernd Schuster
WebCam On-Off v1.2
WebCam On-Off v1.2 Webcams may let you stay in touch with friends and family also a webcam allows you to record and stream video from your computer or laptop to the Internet or a video file. When you are not using your webcam, you may wish to disable it to ensure it is not recording by accident and they also pose risks of people hacking into them and spying on you surely ,Malware can take over webcams, so there is potential for your camera to spy on you , Most hackers utilize so-called Trojan horse attacks , they can take control of your webcam and make videos and take pictures of you without your knowledge. If you’re a parent, there are a few reasons why you may want to disable your webcam, all of them having to do with safety. Video instant messaging and websites aren’t always child-friendly, and you may decide disabling your webcam is your best recourse. If you have an external webcam, unplug the USB cord that connects the camera to the computer, and hide the camera somewhere your kid won’t find it! , But it is not the best way because if you need it every 2 – 3 hours will you hide it again and again ? and what about if you have a built-in camera ? the Washington Post highlighted an unnerving study published at Johns Hopkins University which found that a laptop webcam can function in relative secrecy-a slightly subtler Eye of Sauron Webcam-spying—particularly the variant that involves disabling LED indicator lights—takes quite a bit of effort, but the practice isn’t limited to the realm of benevolent academics. The FBI has also publicly acknowledged its ability to employ such techniques when investigating criminal activity As you see disable the webcam completely is the safest way to ...
5/5 1,814 Jun 04, 2015
Sordum.org
Who Stalks My Cam V2.0
Who Stalks My Cam V2.0 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ...
5/5 1,409 Mar 07, 2017
PHROZEN SAS
Win.Privacy v3.2.0.1
Win.Privacy v3.2.0.1 Privacy made ​​easy. From the author: The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea to develop this program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! Installation W10Privacy does not need to be installed, but consists of a single executable file. This must be stored in a folder in which the program has write access. Start W10Privacy is started by a simple double-click. During startup, the program reads in the current settings and then displays the main window. At the beginning, the settings of the "Privacy" tab will be displayed. Depending on the settings currently set on the system, checkmarks are placed in front of the various menu items. A checkmark means that the respective option is set on the system. If one of the options is unchecked, this naturally means that the respective option is not activated on the system. Using the Main Window If an option is to be set, a check mark must first be set or removed (for deactivation). To activate the option via the program, a click on the button "Set changed settings" is necessary. Options that ...
5/5 706 Nov 08, 2018
Bernd Schuster
WinGuard Pro 2014 8.9.2.3
WinGuard Pro 2014 8.9.2.3 Secure your computer by password protecting your Windows applications, programs and EXE files. Plus, protect your data with encryption for your files, folders and drives - directly from Windows Explorer. Extra features allow you to disable the Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and more. Features: Lock Programs, Applications, EXE Files with a Password Lock any folder with a password Disable Windows at Boot Disable Software Installation and Downloads Password Protect Windows Explorer Password Protect your Web Browser, inc. Internet Explorer, FireFox, Opera and more Parental Time Control It's FREE, no advertising or spyware Works alongside your firewall and anti-virus program Advanced edition also includes: Add your own program for protection Disable Canceling of Password Prompt Configure Multiple User Accounts Password Windows at Boot Password Internet Explorer Disable Software Installation Use Software in Commercial Enviroment
5/5 4,328 Nov 02, 2013
WGSoft
WinMend Folder Hidden 1.4.9
WinMend Folder Hidden 1.4.9 WinMend Folder Hidden is a free file/folder hiding tool. While ensuring the absolute system safety, this application can quickly hide files and folders on local partitions and/or on removable devices. The hidden files/folders will be safely hidden whether the drive is accessed in another operating system on the same computer or reinstalled on another computer. You can set a password for this application. Hidden data can be displayed and unhidden only when the user enters the valid password. The data is completely invisible to other programs or on other operating systems. However, please keep in mind that this application is for home use only. It’s not recommended for commercial settings where more strict confidentiality is required. Supports Language: English, French, German, Hungarian, Spanish, Dutch, Arabic, Greek, Korean, Itanlian, Slovak, Vietnames. Features 1. Safety First The hiding technology will never damage any file data. It is safe and reliable. 2. High-Speed Hiding and Unhiding Whether it’s a file of dozens of GB, or a folder containing a lot of files, the file or the folder can be hidden and unhidden instantly. 3. Removable Drives Are Supported Files and folders on removable drives such as USB drives hidden by WinMend Folder Hidden are invisible not only in the computer where the hiding was completed, but in any computer.
0/5 1,463 Nov 09, 2015
WinMend.com
Wipe 17.16
Wipe 17.16 This powerful program can remove a lot of gigabytes of garbage on your computer and recover many free disk space. In addition, it will protect your privacy on the Internet - it removes records about personal activity on PC. You will be able to delete browser history and cache, index.dat files, registry, internet cookies files, autocomplete-history, temporary internet files and many many other items. This program also erases any other tracks of personal activity which you made when used your PC, and no matter in which program: Windows, Internet Explorer, FireFox, Chrome, Opera or any other... To prevent recovery of deleted data the program uses the following security methods: DoD 5220.22-M method, Gutmann method ( full 35 steps ), Russian GOST and other. You can also customize cleaning process and choose which items to remove and which is not. Or you can view detailed information about areas where garbage located on your computer. What's new in version 17.16? • This update includes several final changes before big update. We think we will be ready to introduce you completely new version very soon! • Added support for browser Opera 50 (future version). • Added support for browser Torch 57 (current version). • Added support for browser SlimJet 16 (current version). • Several minor bug fixes. • Date of release: 11 November 2017.
5/5 4,398 Dec 05, 2017
Yuri Saprykin
   
 
Showing rows 1 to 81 of 81 Showing Page 1 of 1  1 


Copyright (c) 2018


Tweets by @GeekOnTheLoose