Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

  Our merchandise, sold here, helps keep the site alive.  


Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Privacy, Personal Information Protection and Encryption   
Files
  File Name Rating Downloads
Last Update/Developer
ACleaner v4.5
ACleaner v4.5 ACleaner is a safe and easy-to-use privacy protection tool, that allows you to erase common Internet and computing tracks, including browser cache, cookies, visited websites, typed URLs, recent documents, index.dat files and more. You can also easily erase the tracks of up to 100 popular applications. It also includes an option to overwrite deleted data multiple times, so it cannot be easily recovered. The cookie cleaning feature allows you to specify which cookies to keep, so that you don't erase your important login cookies. You also can schedule automatic erasing for any time you like and use boss key to hide all browser windows in one quick keystroke! In addition, the program comes with a registry scanner to optimize your system registry by finding and removing errors and invalid entries. After fixing the invalid entries, your system will be more stable and run faster. For maximum safety, ACleaner will make a backup of the repaired entries. You will be able to restore any changes made using the software by choosing Restore registry backup. Why do you need ACleaner? • Your Internet activities can be traced through cache, cookies, and history. • Windows and third party software stores information that could compromise your privacy. • The Windows Registry is a crucial part of your PC's operation system. Problems with the Windows Registry are a common cause of Windows crashes and error messages. Key Features: Remove the tracks of your activities completely 1.Windows Item Remove Windows recent documents history Remove Start Menu -- Run/Find history Remove the files in Window recycle bin Remove Windows temporary files directory Remove clipboard Remove memory dumps Remove chkdsk file fragments Remove Windows log files Remove menu order cache Remove open/save dialog history Remove tray notifications cache Remove user assist history Remove Media Player/Real Player history Remove Paint history Remove Microsoft Office ...
5/5 1,311 Mar 20, 2019
Cleanersoft Software
Alternate File Shredder 1.622
Alternate File Shredder 1.622 This program offers the possiblity to finally delete files and/or folders (no recovery possible). The program also can overwrite the free space on a drive, which means, that already deleted files cannot be restored, too. Open source (MS VC++ 2005)!! Windows NT 4, 95, 98, Me, 2000, XP, Server 2003, Vista, Server 2008, 7, 8, 8.1 Languages included: English, german, spanish, french, italian, chinese, japanese, korean Changes in this version: - Korean translation updated
5/5 2,310 Sep 06, 2016
Alternate Tools
AskAdmin v1.6
AskAdmin v1.6 AskAdmin is designed to restrict an Application a Folder or a File, ideal for those who have small children or for Computer used in business , In a few seconds and in a simple way you can block any program installed on your computer such as Microsoft Store , Microsoft EDGE , Google Chrome , Build-in Apps (UWP) , Skype or Files like bat,cmd,reg data…etc , The program have a password to prevent blocked programs are easily unlocked by any user . AskAdmin is a Portable Application. What is New (Friday 8th February 2019) 1. [ ADDED ] – Blocking all application in a folder and it’s subfolders feature 2. [ ADDED ] – Blocking Microsoft Store and Build-in (UWP) Application feature 3. [ ADDED ] – Blocking exe and folder via context menu feature 4. [ ADDED ] – Block windows components,settings pages,Remove security tab … 5. [ ADDED ] – Disallow Network Browsing feature 6. [ FIXED ] – Export-Import Minor BUGS 7. [ FIXED ] – An error while creating a new-Text Document (Critical) 8. [ FIXED ] – Password saving problem (Rare) How to use it There are two ways to create a block list: 1. The easiest way is to drag and drop Application/s, a Folder/s or a File/s you wish to block to the AskAdmin interface. If you wish, you can drag several applications on GUI at once. 2. Click the ‘Add File’ button (Plus icon) browse to the application you wish to block. How to block an Application a Folder or a File if an Application , Folder or File name is on the list , mean: it is Automotically blocked (Folder inhalt will be blocked not folder itself) , but on some cases you should use the “Restart” buton (Guarantee) , if you accidentally block any windows System ...
5/5 213 May 19, 2019
Sordum.org
Avira Privacy Pal v1.9.1.1886
Avira Privacy Pal v1.9.1.1886 Did you know that whenever you use your computer, you're leaving digital traces that could expose your personal data? That's why we created Avira Privacy Pal. It's a personal assistant that lets you manage your privacy more quickly, simply, and effectively than ever. You can manually deal with 200+ privacy issues or you can put them all in safe, reliable hands and enjoy the view from a sleek, intuitive dashboard. Wipe away complexity and your digital traces If you'd like to save time, reduce hassle, and safeguard your privacy, you've found a friend in Privacy Pal: Gives you an overview of your privacy status and a quick fix for privacy threats Puts you in control, so you can manage the information collected about you Looks for privacy vulnerabilities and lets you know how you're being tracked Ease of use is built in from the start Take a peek at the dashboard and you'll immediately notice state-of-the-art comfort and simplicity with all the information you need available at a glance. What you won't see are the hundreds of individual privacy issues. They're being quietly sorted. Shhhh. What does it do? Here are just some of the features that keep you and your data safe from snoops: Disable Windows tracking This stops Cortana (Microsoft's personal virtual assistant) from tracking your location and accessing your calendar, contacts, and browsing history Remove chat logs from Skype Skype keeps a history or your private chats. We think that no one needs to know whom you talk to Disable web tracking Limit the information that ad and analytics companies gather about you from your web browsing Pick your preferences We're all different, which is why Privacy Pal offers three user profiles. Each profile comes with a unique balance of privacy and convenience. They're free and easy to use. Choose Basic You ...
5/5 1,026 May 10, 2019
Avira Operations GmbH
BCTextEncoder 1.01
BCTextEncoder 1.01 Never worry that someone might read a confidential email, BCTextEncoder will easily encrypt part or all of your messages. Easily encrypt your messages using strong and approved symmetric and public key algorithms for data encryption. BCTextEncoderTM utility software simplifies encoding and decoding text data. Plain text data is compressed, encrypted and converted to text format, which can then be easily copied to the clipboard or saved as a text file. BCTextEncoder uses public key encryption methods as well as password-based encryption.
5/5 4,651 Sep 06, 2016
Jetico Inc.
BlackBeltPrivacy Tor+WASTE 3.01.2014.01
BlackBeltPrivacy Tor+WASTE 3.01.2014.01 Tor helps keep you safe online.. WASTE enables secure content exchange. A usability enhanced Tor+WASTE+darkRendezvous(). An installer, for Windows XP 32/64, Vista 32/64, Win7 32/64, Linux (WINE). Features: 4 Modes, Censored Client, Bridge(default), Relay and Exit - chosen by you at install time. Be sure to check-out the screen shots. Friendly support provided. Streamlined Installation Package. No additional configuration necessary for server, client or darkNet() Auto Firefox config. Optional Tor Relaying, bandwidth restricted. From 0->100mb or 0->500mb per day - its your choice. Regularly updated includes auto-configured Obfsproxy, for censored-clients and bridge-operators Screen shots may differ due to our continuous development cycle. •NOTE: Linux/Unix/MacOSX Compatibility is obtained via WINE. (tested working) •NOTE: The core tor team no longer ship a proxy. We have adopted the same.
0/5 4,760 Sep 06, 2016
darkNet()
Blackbird v1.0.7 32bit
Blackbird v1.0.7 32bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free and Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated and Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. Blackbird Changelog v1.0.7 - Latest - Added /G switch: Disable/enable Games Explorer (gameux.dll; injects into games at startup and connects to MS servers) - Added an update to blacklist: KB4493132 (Windows 7 end-of-support nagware) - Added more hosts to blacklist - Disabled additional Nvidia telemetry tasks and registry keys. - Disabled scheduled tasks: Metadata Refresh, Notify1/Notify2 (Win7 end-of-support) - Fixed username not getting defined in ...
5/5 1,847 Jul 02, 2019
Blackbird Software
Blackbird v1.0.7 64bit
Blackbird v1.0.7 64bit Don't want Windows spying on your every move? Don't feel like spending hours messing with privacy settings that ultimately still result in data collection? Think your private information belongs to you and no one else? Or maybe you just want a faster PC and don't like all the new "features" Windows has to offer. We think so too, so we made Blackbird V6. Blocks Telemetry Completely Block Windows spyware, on both the application and network level, without editing the HOSTS file or firewall settings and remove all Windows telemetry updates. Supports Wireless and Ethernet connections, IPv4/IPv6. Restores Privacy Prevent diagnostic data, passwords, contacts, URL, SMS, handwritting, location, and P2P-update sharing. Remove unique ad-ID tracking token and built-in advertising. Disable 60+ data collection tasks and consequently speed up your PC. Get Blackbird instead and keep your Windows nag-free. Portable, Restorable, Flexible No installation, with a focus on leaving the smallest possible footprint, Blackbird is a single, portable exe with granular switches available. Want to restore everything back? We got you covered. Works on Windows Vista, 7, 8/8.1, 10 (Home/Pro) Free and Ad-free Forever We do not collect ANY data from our software and all website logs are purged twice a day. All expenses are paid from our own pockets because we believe in privacy and are in a position to do something about it. Updated and Simple to Use Blackbird is regularly updated with new features and whenever critical Windows updates get released. Press a key, grab some coffee, restart and you're done. Blackbird Changelog v1.0.7 - Latest - Added /G switch: Disable/enable Games Explorer (gameux.dll; injects into games at startup and connects to MS servers) - Added an update to blacklist: KB4493132 (Windows 7 end-of-support nagware) - Added more hosts to blacklist - Disabled additional Nvidia telemetry tasks and registry keys. - Disabled scheduled tasks: Metadata Refresh, Notify1/Notify2 (Win7 end-of-support) - Fixed username not getting defined in ...
5/5 1,971 Jul 02, 2019
Blackbird Software
Blank And Secure v5.33 32bit
Blank And Secure v5.33 32bit Blank And Secure is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. The other overwriting standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard is not implemented, because in my test i had no measurable improvement, for that reason is that not implemented in "Blank And Secure" ;) # Usage: Add the files or folders via drag and dropp on "Blank And Secure" or program icon on the desktop. Then press "delete". The file(s) will be rewritten with NULL before deleting, so the content is now irreparable. Press the button "Fill the free space with null" this will remove the standard deletion tracks from the harddrive . # Features: # Very Small # Overwrite the Files 1-32 times with NULL and delete. # Fill the free HD space with null # Secure delete and Shutdown the PC # Remove the standard deletion tracks from the harddrive # Optional translation feature # Drag and Drop # Portable # Multilingual # .... # Options: Reset: Clear the List Contents (not delete the files). Delete: Overwrite folder and files with NULL and delete. Overwrite X times: Overwrite the data X times with NULL. Delete Delay X-sec.: At this time you can stop the erasing procedure with the key [ESC]. Fill the free space with null: This will remove the standard deletion tracks from the harddrive. # Operating systems: Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Home, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8, Windows 8 Enterprise, Windows 8 Pro, Windows 7, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, ...
5/5 1,235 Aug 22, 2019
Nenad Hrg
Blank And Secure v5.33 64bit
Blank And Secure v5.33 64bit Blank And Secure is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. The other overwriting standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard is not implemented, because in my test i had no measurable improvement, for that reason is that not implemented in "Blank And Secure" ;) # Usage: Add the files or folders via drag and dropp on "Blank And Secure" or program icon on the desktop. Then press "delete". The file(s) will be rewritten with NULL before deleting, so the content is now irreparable. Press the button "Fill the free space with null" this will remove the standard deletion tracks from the harddrive . # Features: # Very Small # Overwrite the Files 1-32 times with NULL and delete. # Fill the free HD space with null # Secure delete and Shutdown the PC # Remove the standard deletion tracks from the harddrive # Optional translation feature # Drag and Drop # Portable # Multilingual # .... # Options: Reset: Clear the List Contents (not delete the files). Delete: Overwrite folder and files with NULL and delete. Overwrite X times: Overwrite the data X times with NULL. Delete Delay X-sec.: At this time you can stop the erasing procedure with the key [ESC]. Fill the free space with null: This will remove the standard deletion tracks from the harddrive. # Operating systems: Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Home, Windows 8.1, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8, Windows 8 Enterprise, Windows 8 Pro, Windows 7, Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Starter, ...
5/5 1,227 Aug 22, 2019
Nenad Hrg
BleachBit v2.2
BleachBit v2.2 When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source. BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy. Delete your private files so completely that "even God can't read them" according to South Carolina Representative Trey Gowdy. Simple operation: read the descriptions, check the boxes you want, click preview, and click delete. Multi-platform: Linux and Windows Free of charge and no money trail Free to share, learn, and modify (open source) No adware, spyware, malware, backdoors, browser toolbars, or "value-added software" Translated to 64 languages besides American English Shred files to hide their contents and prevent data recovery Shred any file (such as a spreadsheet on your desktop) Overwrite free disk space to hide previously deleted files Portable app for Windows: run without installation Command line interface for scripting and automation CleanerML allows anyone to write a new cleaner using XML Automatically import and update ...
5/5 1,556 Mar 21, 2019
Andrew Ziem
BMP Wrap 2.0
BMP Wrap 2.0 Ever needed to email a file but it keeps on bouncing because it's an illegal attachment? Renaming the file or storing it in a ZIP archive sometimes works, but many ISP can detect that low-tech obfuscation. You need BMP Wrap. BMP Wrap temporarily hides a file inside a valid .BMP image. Once hidden, you can send the BMP file to anybody you wish and they can then extract that file from the BMP image using BMP Wrap. Now you can send EXEs, DLLs, or whatever file format you want, and the destination mail server will never be the wiser. No installation is required - just save the EXE file to your desktop, and then drag the file you want to wrap/unwrap onto the the BMPWrap Icon (a new .BMP file is created, the original file is left unmodified). This program is free & does not include any ad-ware or other malware.
5/5 1,192 Jan 27, 2017
HCI Design
CipherShed v0.7.4.0
CipherShed v0.7.4.0 CipherShed is free (as in free-of-charge and free-speech) encryption software for keeping your data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. Learn more about how CipherShed works and the project behind it. The CipherShed project is open-source, meaning the program source code is available for anyone to view. We encourage everyone to examine and audit our code, as well as encourage new ideas and improvements. Click here to visit the author's website.
5/5 242 Jun 25, 2019
The CipherShed Project
ClearClipboard v1.06
ClearClipboard v1.06 ClearClipboard is a simple tool that will periodically clear your clipboard. This is useful, for example, to hide sensitive information, such as passwords. The clear timeout can be configured freely and defaults to 30 seconds. Also, the clipboard will not simply be cleared at a fixed interval. Instead, the clear timer will be reset every time that new content is copied to the clipboard. This ensures that only "stale" content will be cleared; recently copied content will never be cleared away. Note: The ClearClipboard program runs "hidden" in the background. However, there will be an icon in the notification area, which can be used to control or terminate ClearClipboard. Only one instance of ClearClipboard can be running at a time. System requirements ClearClipboard runs on Windows Vista or newer. The "x64" version requires a 64-Bit version of Windows Vista or newer. Windows XP is not supported due to the lack of the AddClipboardFormatListener system function! Windows 10 Warning Windows 10 contains some "problematic" features that can put a risk on sensitive information copied to the clipboard: The first of those features is called Clipboard History, which will silently keep a history (copy) of all data that has been copied to clipboard at some time. This history will persist even after the clipboard has been cleared! The second feature is called Automatic Syncing (Cloud Clipboard), which will automatically upload all data that is copied to clipboard to the Microsoft cloud servers – purportedly to synchronize the clipboard between your devices! We highly recommend to disable both of these features in order to keep your data safe and allow ClearClipboard to function as expected. To the best of our knowledge, the most reliable way to achieve this is to completely disabled the "Clipboard History" (cbdhsvc) system service. ClearClipboard will now detect ...
5/5 173 Jun 07, 2019
LoRd_MuldeR
CrococryptFile 1.6
CrococryptFile 1.6 CrococryptFile is a file encryption tool which creates encrypted archives of arbitrary files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256) Features file encryption encryption aes twofish pbkdf2 cloak pgp Version History 1.6 (05/13/2017): New: Support for Russian added (Special thanks to Aleksey Cheremnykh
5/5 1,205 Apr 02, 2018
Frank Hissen
Crypt It v1.4.3.0
Crypt It v1.4.3.0 Crypt it is a portable software to encrypt and decrypt files and texts. It uses AES official code to encrypt and decrypt files and Rijndael algorithm to encrypt and decrypt strings. Change Log: Version 1.4.3.0 [9/2/2019] GUI changes New: Encrypted files can be saved in their own folders by selecting “Save to original folder” option. Output folder section will be disabled when “Save to original folder” option is enabled. New: Crypt it main form is now resizable and also files list rows and columns can be resized too. Crypt it background is now white and not gray Internal fixes CRC32: 5E0BCEE9 MD5: 494309AA1658230843B4534473709993 SHA-1: BBE545C603B08EA90A2514CA48122CAF42B9D2E8 SHA-256: EB18E25668E6DDA5DA5D9C1CDFF2FF012B53F133DBE098A1726736C68CEE36D3 Requirements: .NET 4.6 minimum Click here to visit the author's website.
5/5 95 Jul 15, 2019
Sami Jildeh
Crypter Geek 2.0
Crypter Geek 2.0 Encrypt / Decrypt text files by this mysterious encryption tool, No installation required. Warning: Windows Defender and other anti-malware programs may incorrectly detect this as malicious. It is a clean file.
5/5 2,021 Feb 25, 2017
Christos Beretas
Crypto Notepad v1.4.0
Crypto Notepad v1.4.0 Notepad-like simple text editor for Windows, where files are saved and loaded encrypted with AES algorithms. Features Drag and Drop support Detect URLs and email links Fully customizable editor. Able to customize the colors and fonts Able to customize different parameters of the encryption (hash algorithm, key size, password iterations) Included all the features of the default Windows Notepad Association with the application extension Easily search through the content System requirements Windows Vista SP2 and higher .NET Framework 4.5 License Distributed under MIT license v1.4.0 (2019-01-08) added Redo function in the editor. added New icons added Icons in the main menu (optional). added Able to make toolbar color like editor background color. fixed Vertical scroll bar position shifted #17 fixed Right-to-left reading work incorrect #18 fixed Change Key and Lock toolbar icons was inactive. fixed Returned missing backward compatibility for decryption with custom salt. fixed Issue when file name on Save/Open was incorrect or empty. improved Undo function for editor. improved Settings window. dev Added debug menu. dev Source code now is more readable. dev All elements and variables now have more clear names (no more button1 textBox2 names and etc). dev Сhanged work logic of most functions. dev Project was moved to own company dev Updater was moved to own repo dev Simplified some variables. Click here to visit the author's ...
5/5 564 Jan 09, 2019
Sigmanor
Cryptomator v1.4.11 (Linux64)
Cryptomator v1.4.11 (Linux64) Free client-side encryption for your cloud files. Open source software: No backdoors, no registration. How does Cryptomator protect your cloud files? Transparent encryption Transparent encryption means you will not notice any difference in working with your files. While the vault containing your encrypted data resides somewhere in your cloud folder, Cryptomator provides a virtual hard drive through which you can access your files. You can work on this drive as if it were a conventional USB flash drive. Files get encrypted individually Everything you put onto the virtual hard drive ends up encrypted in your vault. Compared to other disk encryption utilities, Cryptomator encrypts each file individually. So if you edit just a small text file, only the corresponding encrypted file is changed. This way the synchronization client of your cloud storage provider knows exactly what needs to be uploaded and what doesn't. What you need to do… Create Create vaults in your Dropbox, Google Drive or wherever you like. Assign a passphrase and you're ready to go. Drag & Drop Store your sensitive data on the virtual drive provided by Cryptomator. Wasn't that easy? Relax Cryptomator encrypts everything you put into the drive on-the-fly. Your cloud is now secure. The Concept of Cryptomator Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator is free and open source software, so you can rest assured there are no backdoors. Easy and Reliable We understand simplicity as a key aspect of security. With Cryptomator you don't have to deal with accounts, key management, cloud access grants or cipher configurations. Just choose a password and you're ready to go. You don't even need to specify what cloud you use. Cryptomator encrypts files and doesn't care where you store them. This makes it a lightweight application, which we believe is a huge benefit for reliability. Complexity would kill security. Cryptomator is a so-called transparent encryption utility. This ...
5/5 24 Aug 12, 2019
Skymatic
Cryptomator v1.4.12 (Mac64)
Cryptomator v1.4.12 (Mac64) Free client-side encryption for your cloud files. Open source software: No backdoors, no registration. How does Cryptomator protect your cloud files? Transparent encryption Transparent encryption means you will not notice any difference in working with your files. While the vault containing your encrypted data resides somewhere in your cloud folder, Cryptomator provides a virtual hard drive through which you can access your files. You can work on this drive as if it were a conventional USB flash drive. Files get encrypted individually Everything you put onto the virtual hard drive ends up encrypted in your vault. Compared to other disk encryption utilities, Cryptomator encrypts each file individually. So if you edit just a small text file, only the corresponding encrypted file is changed. This way the synchronization client of your cloud storage provider knows exactly what needs to be uploaded and what doesn't. What you need to do… Create Create vaults in your Dropbox, Google Drive or wherever you like. Assign a passphrase and you're ready to go. Drag & Drop Store your sensitive data on the virtual drive provided by Cryptomator. Wasn't that easy? Relax Cryptomator encrypts everything you put into the drive on-the-fly. Your cloud is now secure. The Concept of Cryptomator Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator is free and open source software, so you can rest assured there are no backdoors. Easy and Reliable We understand simplicity as a key aspect of security. With Cryptomator you don't have to deal with accounts, key management, cloud access grants or cipher configurations. Just choose a password and you're ready to go. You don't even need to specify what cloud you use. Cryptomator encrypts files and doesn't care where you store them. This makes it a lightweight application, which we believe is a huge benefit for reliability. Complexity would kill security. Cryptomator is a so-called transparent encryption utility. This ...
5/5 22 Aug 12, 2019
Skymatic
Cryptomator v1.4.13 (Win64)
Cryptomator v1.4.13 (Win64) Free client-side encryption for your cloud files. Open source software: No backdoors, no registration. How does Cryptomator protect your cloud files? Transparent encryption Transparent encryption means you will not notice any difference in working with your files. While the vault containing your encrypted data resides somewhere in your cloud folder, Cryptomator provides a virtual hard drive through which you can access your files. You can work on this drive as if it were a conventional USB flash drive. Files get encrypted individually Everything you put onto the virtual hard drive ends up encrypted in your vault. Compared to other disk encryption utilities, Cryptomator encrypts each file individually. So if you edit just a small text file, only the corresponding encrypted file is changed. This way the synchronization client of your cloud storage provider knows exactly what needs to be uploaded and what doesn't. What you need to do… Create Create vaults in your Dropbox, Google Drive or wherever you like. Assign a passphrase and you're ready to go. Drag & Drop Store your sensitive data on the virtual drive provided by Cryptomator. Wasn't that easy? Relax Cryptomator encrypts everything you put into the drive on-the-fly. Your cloud is now secure. The Concept of Cryptomator Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator is free and open source software, so you can rest assured there are no backdoors. Easy and Reliable We understand simplicity as a key aspect of security. With Cryptomator you don't have to deal with accounts, key management, cloud access grants or cipher configurations. Just choose a password and you're ready to go. You don't even need to specify what cloud you use. Cryptomator encrypts files and doesn't care where you store them. This makes it a lightweight application, which we believe is a huge benefit for reliability. Complexity would kill security. Cryptomator is a so-called transparent encryption utility. This ...
5/5 26 Aug 12, 2019
Skymatic
CyberShredder v1.12
CyberShredder v1.12 CyberShredder is a quick, safe and handy utility that lets you erase confidential files from your computer permanently. Normal file deletion will remove a file's directory entry and allocation table information. The actual disk clusters that contained the file's data remains intact on your hard disk and can be recovered later. CyberShredder overwrites the space occupied from a file with random data and erases the file, so an unerase utility will never be able to recover it. CyberShredder's simple interface will help you get rid of confidential data permanently. It deletes files using three different shredding methods, including the NSA approved seven-pass file deletion method. Please note that files and directories erased by CyberShredder can not be recovered using an undelete program. Make sure you use it with care. We recommend that you learn how to use the program by testing its behaviour with some test data first. Version 1.12: Quicker abort, abandons operation even at the end of a file operation File operation progress gauge, shows progress of each file operation (pass) Renames file multiple (26) times, not just once Remembers form position Click here to visit the author's website.
5/5 379 Mar 02, 2019
CyLog Software
DeepSound 2.0
DeepSound 2.0 DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE). System requirements: - Windows XP/Vista/7/8 - Microsoft .NET Framework 3.5 Documentation: 1 DeepSound 2.0 1.1 Hide data into carrier audio file To hide data into audio file, follow these steps: Select carrier audio file or drag and drop audio file (flac, wav, wma, mp3, ape) into the file explorer. Click to 'Add files' or drag and drop secret files into the panel on the right side of application. Press F3 key or click to encode secret files. You can choose output audio format (wav, flac or ape). DeepSound does not support wma output format. If you want to hide data into wma, hide secret data into wav file and then use external software such as Windows Media Encoder for convert wav to wma lossless file. In settings dialog you can turn On/Off encrypting and set password. Modified audio file will be copied to output directory. Click Ok to start hiding secret files into carrier audio file. 1.2 Extract secret data from audio file or audio CD track To extract secret data from audio file, follow these steps: In the file explorer, select audio file or audio CD track, which contains secret data. If the secret files are encrypted, enter ...
5/5 2,087 Mar 16, 2016
Jozef Bátora
DeleteOnClick 2.3.0.0
DeleteOnClick 2.3.0.0 DeleteOnClick is a very simple to use file secure delete utility for Microsoft Windows 98SE/ME/ 2000/XP/2003 and Vista. Any type of file can be deleted, including NTFS compressed and NTFS encrypted files. DeleteOnClick completely deletes files in one click and the data becomes unrecoverable, and also has the option to wipe free disk space. For this reason you must use the program carefully. Once a file is 'Securely Deleted' no one can undelete it.
0/5 4,412 Feb 24, 2014
2brightsparks
Demonsaw 4.0.3 Linux Client
Demonsaw 4.0.3 Linux Client Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Debian 8+ and most 64 bit GNU derivatives 784ff00387d46fc2a83d5d303a68fa5ab9a7096e8c285fe8c4ebf853bb10f078 SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 966 May 24, 2018
Eijah: Demonsaw, LLC.
Demonsaw 4.0.3 Mac OSX Client
Demonsaw 4.0.3 Mac OSX Client Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Yosemite and up 26442007e9e4ff889af488f8f31d1679a6c294f799dd579b0730d450c02adc17 SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 964 May 24, 2018
Eijah: Demonsaw, LLC.
Demonsaw 4.0.3 Router
Demonsaw 4.0.3 Router Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Windows, Linux, OSX, and ARM e61640f3bf1346704ba87e6c806c89fa5b4b99f6a602dbcbf2afa93ef4c54119 SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 973 May 24, 2018
Eijah: Demonsaw, LLC.
Demonsaw 4.0.3 Windows Client
Demonsaw 4.0.3 Windows Client Note: This download is provided by special permission of the author. Demonsaw: The Future is Clear Demonsaw 4 is an encrypted communications platform that allows you to chat, message, and transfer files without fear of data collection or surveillance from governments or corporations. Demonsaw 4 is free for individual and commercial use. Compatible with Windows 7 and up 5acb61867558a6d7212c9a1e0b6f416d4d7537374068fc4bba4249e1216dc05e SHA-256 Quick Start Demonsaw 4 has a completely re-written UI, making it the easiest version of Demonsaw to use thus far. For more detailed FAQ, advanced configuration options, and information on how to setup your own secure network; check out the community-sponsored site: Demonsaw Wiki.
5/5 992 May 24, 2018
Eijah: Demonsaw, LLC.
Easy File Locker 32bit 2.2
Easy File Locker 32bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 4,286 Jan 13, 2017
XOSLAB.COM
Easy File Locker 64bit 2.2
Easy File Locker 64bit 2.2 Easy File Locker is a light-weight and easy-to-use file lock software product for Windows. It can protect your private files and folders. With its great protection, users will not be able to open, read, modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden files/folders will be totally invisible to all users and to any program. Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for protecting files/folders on your local computer. it doesn't change the protected files and folders, it will not slow down the system speeds and it will never have the chance to destroy your data. Lock files, Lock folders: The locked files/folders are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders. Files and sub-folders in a locked folder are also protected. Hide files, Hide folders: You can hide your private files and folders, to make them completely invisible to users and programs. Password protected GUI and uninstaller: Once you set a password, no one can launch the application or uninstall the software without the correct password.
5/5 4,348 Jan 13, 2017
XOSLAB.COM
EasyCrypt v2.01
EasyCrypt v2.01 EasyCrypt is a simple and easy to use file encryption and decryption tool. Fast encrypt or decrypt files with AES-256, a very secure encryption algorithm. Features: Lightweight, simple and easy to use UI Secure encryption with AES-256, a random IV and 256-bit (32 bytes) salt Fast encryption and decryption Requirements: .NET Framework 4.5 2 GHz Processor, 128 MB RAM 2 MB of free disk space MD5 · 4fbc229845a7cef249ac4fed5e1d2c14 SHA1 · 731b6853575c60bc382f0978d939a9365019be88 SHA256 · de595d00b24412be4916c19f3e081d79e319217b3dc30f0cd8104ab4601bb102 Changes: v2.01 Small Improvements
5/5 1,225 Jun 13, 2019
HEXAGON Developments
EncryptPad 0.4.0.2 for Mac
EncryptPad 0.4.0.2 for Mac EncryptPad is an application for viewing and editing symmetrically encrypted text. Using a simple and convenient graphical and command line interface, EncryptPad provides a tool for encrypting and decrypting binary files on disk while offering effective measures for protecting information, and it uses the most widely chosen quality file format **OpenPGP** [RFC 4880](https://tools.ietf.org/html/rfc4880). Unlike other OpenPGP software which main purpose is asymmetric encryption, the primary focus of EncryptPad is symmetric encryption. Features Symmetric encryption Passphrase protection Key file protection Combination of passphrase and key file Random key file generator Key repository in a hidden directory in the user's home folder Path to a key file can be stored in an encrypted file. If enabled, you do not need to specify the key file every time you open files. Encryption of binary files (images, videos, archives etc.) Read only mode to prevent accidental file modification UTF8 text encoding Windows/Unix configurable line endings Customisable passphrase generator helps create strong random passphrases. File format compatible with OpenPGP Iterated and salted S2K Passphrases are not kept in the memory for reuse, only S2K results (more ...) Cipher algorithms: CAST5, TripleDES, AES128, AES256 Hash algorithms: SHA-1, SHA-256, SHA-512 Integrity protection: SHA-1 Compression: ZLIB, ZIP Large multi-gigabyte files are supported Why use EncryptPad? Multi-platform codebase: it has been compiled on three popular operating systems and can be adapted to more. Portable: simply copy the executable to a ...
5/5 817 Jul 24, 2018
Evgeny Pokhilko
EncryptPad 0.4.0.2 for Windows
EncryptPad 0.4.0.2 for Windows EncryptPad is an application for viewing and editing symmetrically encrypted text. Using a simple and convenient graphical and command line interface, EncryptPad provides a tool for encrypting and decrypting binary files on disk while offering effective measures for protecting information, and it uses the most widely chosen quality file format **OpenPGP** [RFC 4880](https://tools.ietf.org/html/rfc4880). Unlike other OpenPGP software which main purpose is asymmetric encryption, the primary focus of EncryptPad is symmetric encryption. Features Symmetric encryption Passphrase protection Key file protection Combination of passphrase and key file Random key file generator Key repository in a hidden directory in the user's home folder Path to a key file can be stored in an encrypted file. If enabled, you do not need to specify the key file every time you open files. Encryption of binary files (images, videos, archives etc.) Read only mode to prevent accidental file modification UTF8 text encoding Windows/Unix configurable line endings Customisable passphrase generator helps create strong random passphrases. File format compatible with OpenPGP Iterated and salted S2K Passphrases are not kept in the memory for reuse, only S2K results (more ...) Cipher algorithms: CAST5, TripleDES, AES128, AES256 Hash algorithms: SHA-1, SHA-256, SHA-512 Integrity protection: SHA-1 Compression: ZLIB, ZIP Large multi-gigabyte files are supported Why use EncryptPad? Multi-platform codebase: it has been compiled on three popular operating systems and can be adapted to more. Portable: simply copy the executable to a ...
5/5 811 Jul 24, 2018
Evgeny Pokhilko
Eraser v6.2.0.2983
Eraser v6.2.0.2983 Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7, 8, 10 and Windows Server 2012, 2016. Eraser is Free software and its source code is released under GNU General Public License. Why Use Eraser? Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems, the list continues. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first. Your first thought may be that when you ‘delete’ the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. Eraser Features It works with Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8,10 and Windows Server 2012.Windows 98, ME, NT, 2000 can still be used with version 5.7!.It works with any drive that works with Windows.Secure ...
5/5 1,683 Jul 03, 2019
The Eraser Team
Fastlock v1.2
Fastlock v1.2 Fastlock is a small and fast utility to hide the screen activity with a security password. This tool blocks any windows control components: Alt+F4, Alt+Tab, Task Manager, Windows Keys, Security Screen. There is no way to kill Fastlock's process and get access to your desktop. Difference to system's lock screen: There is no CPU deceleration, which enables you an instant access to your programs after unlocking. Notice, that Fastlock is only a temporary solution to lock your screen. Changelog: Version 1.2: - Fixed taskbar and starbutton flickering - Fixed possible access to the startmenu by spamming winbutton - Implemented new error exceptions - Changes in the Fastlock's Password Tool are now being processed in real-time - Locked keys and changing keyboard layout are now being displayed
5/5 1,204 May 30, 2017
2xDSoft
File Access Monitor 1.0.2
File Access Monitor 1.0.2 File Access Monitor is a multipurpose tool that monitors access to your files and provides detailed history of who read, wrote and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, as well as on a local computer where it will track local users file access. It is similar in nature to Windows auditing features yet is much easier to use and provides flexible reporting capabilities and notifications. Key features Monitors file actions: creating, moving, deleting, reading and writing to files. Records remote user access to shared folders. Keeps track of local users as to what files they access. Features a powerful filter system to include or exclude certain activities. Self-contained, doesn’t require a database server alongside. Supported platforms Windows XP through Windows 10, Windows Server 2003 through 2012 32-bit and 64-bit Changelog: 2016-10-10 1.0.2 This software is now freeware.
5/5 1,265 Dec 14, 2016
SoftPerfect
FileCrypt R1.0 Rev4
FileCrypt R1.0 Rev4 FileCrypt is a fast, free and secure file encryption software. It's portable and very easy to use. Supported algorithms: AES, RC2 and TripleDES. All are available in their supported key sizes. More algorithms may be added in the future. It encrypts your files very securely using 32-bit long salts and a IV. You can drag and drop files into FileCrypt to quickly add them. Press F10 on your keyboard while not setting a password to switch between visible and non visible password mode. System Requirements: 1,2 GHz Single-Processor, 512 MB RAM, Windows Vista or higher, .NET Framework 4.5.2
5/5 1,215 Aug 01, 2017
Davaxyr
Files Terminator Free (PORTABLE) 2.6.0.0
Files Terminator Free (PORTABLE) 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 4,630 Jan 19, 2014
Elefant Software
Files Terminator Free 2.6.0.0
Files Terminator Free 2.6.0.0 Secure deletion of sensitive data! Files Terminator Free is an easy to use application that allows users to permanently delete their files and wipe free disk space. Portable version available. The utility protects the users privacy by permanently delete sensitive documents, images, videos and other files and by overwriting the free disk space. The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and supports drag and drop for easier use. During file shredding the content of the selected files are overwritten several times with random data and predefined characters and cannot be recovered any more. Finally, Files Terminator Free is a quick and easy to use application with a user-friendly interface that helps users permanently delete sensitive documents and swap free disk space.
0/5 4,622 Jan 19, 2014
Elefant Software
Free File Camouflage 1.25
Free File Camouflage 1.25 Want to save a copy of your personal file on a USB Pendrive but you are worried that, in case of theft, someone will be able to access your data? With Free File Camouflage you can hide your files inside a JPEG image! The software can be used with the main interface or via the explorer "send to" context menu (the first time you only need to select a directory with some images). All the files are encrypted using AES and hidden inside an image. What happens if someone tries to open a camouflaged image? Well... nothing! He will only see the image. Change Info: Version 1.25: - added a new registration method: SMS. Useful if you don't have a credit card or PayPal - new error reporting system engine - various code fix - updated internal libraries code
5/5 4,229 May 31, 2017
My Portable Software
Free File Wiper 1.76
Free File Wiper 1.76 Delete files securely with this software! Just right click on files or directories and select "Send to / Free File Wiper" to erase them completely! Or ... you can drag and drop them on the trashcan to perform the wipe operation. The files will be overwritten with standard and random patterns. After the wipe, the files cannot be undeleted and restored. Up to four wipe methods (from 1 pass to 7 passes). Change Info: -updated registration library code
5/5 4,199 Apr 01, 2014
My Portable Software
Free Hide IP 4.1.8.8
Free Hide IP 4.1.8.8 Free Hide IP - The best free privacy protection software. Free Hide IP the best way is to keep your IP address from being shown to others. Hackers and identity thieves are becoming more and more rampant in today's society. They may break into anyone's computer and monitor one's activity or steal one's identity or other personal information. To stay safe online, the best way is to keep your IP address from being shown to others. Now we provide you a FREE solution to hide your IP address. Use Free Hide IP to hide your real IP address for free, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click.
5/5 4,835 Jun 07, 2017
Free Hide IP
Free VPN Test 1.1.0.3
Free VPN Test 1.1.0.3 Free program to detect DNS traffic and IP leaks from your VPN. What DNS traffic is your VPN leaking? Your computer uses DNS to lookup the location of web sites and services in order to connect to them. Even if you use a proxy or VPN, your DNS traffic can still be exposed. Your ISP, governments, WiFi hotspot providers and other users on your WiFi hotspot can all see your DNS requests.
5/5 800 Aug 13, 2018
Free VPN Test
fSekrit v1.4
fSekrit v1.4 fSekrit is a small application for keeping securely encrypted notes. These notes are truly stand-alone; the editor program and your note are merged together into a tiny self-contained program file, bypassing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives. Another advantage of using fSekrit is that your un-encrypted data is never stored on your harddisk. With a traditional encryption utility you would have to decrypt your file to disk, view or edit it, and then re-encrypt it. Unless you use secure file wiping tools, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you deleted the temporary file. This is not a viable attack against fSekrit, though, since it never stores your un-encrypted data on disk. (See security notes about swapping and hibernation, though!) fSekrit uses very strong encryption to ensure that your data is never at risk. Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize. Self contained fSekrit notefiles are tiny! Only around 50k plus the size of your encrypted text. Release History: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ version 1.40 - December 3, 2009 - 90kb/45.5kb - fixed: long-standing bug where failing to save changes when closing fSekrit with a modified document would cause fSekrit to exit, rather than notifying of error and let user attempt to save again. - fixed: saves are *finally* done properly, by saving to a temporary file and replacing the current file only when all the file writing business is done. - added: font selection dialog, no longer do you need to much around with the registry to set another default font. The font is still not stored in your document, ...
5/5 960 May 29, 2018
f0dder
G Security 1.0
G Security 1.0 G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys like Alt+tab, Ctrl+Alt+Esc, Alt+F4 etc will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time on a single computer with settings stored for each user individually so that each user can use G Security with its own preferences. G Security also supports hotkey to lock the system. In a few words its extremely secure, easy to use and configurable desktop locking solution available for everyone free of cost. Some of its key features include : Its easy to use. Its a Freeware. Fully locks down your computer. Can protect Windows on startup. Suitable for all kinds of users. Multi user support. ...
5/5 1,586 Jun 20, 2016
Malik Usman Aura
GuardAxon 3.9
GuardAxon 3.9 GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
5/5 2,530 Apr 18, 2015
The Geneosoft Team
GuardAxon 3.9 PORTABLE
GuardAxon 3.9 PORTABLE GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of files (MD-5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256).
0/5 2,548 Apr 18, 2015
The Geneosoft Team
Hardwipe v5.2.1
Hardwipe v5.2.1 Hardwipe is the free data sanitization toolset used by activists, journalists, IT technicians and anyone needing to ensure that discarded, but sensitive, information can never be recovered by someone else. Freedom to Securely Erase Sensitive Information Use Hardwipe to permanently erase (or "hard wipe") data on disk and portable storage media. Hardwipe for Desktop provides a slick user interface with optional support for "right-click" context menus in Windows File Explorer. It can conveniently destroy files and folder contents on-demand, erase drives and USB media, and sanitize the Windows Recycler. Hardwipe for Desktop is free for non-commercial use.
5/5 1,920 Mar 08, 2019
Big Angry Dog
idoo File Encryption Free 7.1
idoo File Encryption Free 7.1 idoo File Encryption Free is easy-to-use File Encryption freeware by password protect. Free encrypt Microsoft Office documents (MS Word .doc, .docx,Excel .xls,Powerpoint .ppt. text), Images (PNG,TIFF photo,Lotus,PDF files,BMP,Jpg/Jpeg photos,GIF picture ), Media Video files (mp4 ,WMV,AVI,3gp,mp3,music,RMVB movies, RM films,audio) Features: Hide data hide your private files, folders, drives, to make them completely invisible to users programs. Lock data the locked files/folders/drives, can not open, be read, modified, moved, deleted, copied, or renamed. Protected files/folders without password. Files and sub-folders in a locked folder are also protected. Encrypt data it can encrypt files and folders of any type. Portable encryption packs and encrypts a folder into an executable (.exe file) with AES encryption. Safe delete no one can recover deleted data from your disk if you secure delete it. Password protected there's no other way to run or uninstall it if you do not have the password. Idoo is a very easy to use program with a user-friendly interface. Changelog: improve funtion from my user suggestions
0/5 3,571 Jul 17, 2014
Idoo Software
KCleaner v3.6.1.100
KCleaner v3.6.1.100 KCleaner is designed to be the most efficient Hard Disk cleaner, tracking every useless byte in order to give you all the ressources you may need for your documents, music, pictures, movies,... It is the first product of this kind featuring a full automatic mode, which works in background so that you don't have to care about when to launch it. As a proof of its efficiency, it often finds up to many Gb not even seen by its competitors so... give KCleaner a try ! And if data security is something you are interested in, you'll love the secured file deletion methods proposed by KCleaner, making deleted files unrecoverable by any known mean. Features Detects and cleans temporary and useless files (cache, unused setup files...) Automatic mode working in background Secured file deletion method Expert mode : let users control any file deletion done by KCleaner Internationalization support. Changes: KCleaner - 3.6.1 Released 2019-01-02 0004835: [Bug] German sentence is broken (Kyle_Katarn) 0005137: [Bug] Crash when closing Portable version ran from a read only folder (eg : NAS,...) (Kyle_Katarn) 0005181: [Refactoring] Updated Hungarian translation (Kyle_Katarn) 0005168: [Refactoring] Licence manager shall not accept "null name" de facto invalid licence (Kyle_Katarn) 0005112: [New Feature] Greek translation (Kyle_Katarn) Click here to visit the author's website.
5/5 508 Jan 07, 2019
KC Softwares
KeyLock v2.1.20101.1
KeyLock v2.1.20101.1 KeyLock is a program to lock your computer with a USB Flash Drive or a phone. Safe: It's not possible to use your computer after you've locked it with KeyLock. Our exclusive technologies use the Windows lock screen to lock your PC, making it impossible to reach the desktop. After unlocking, you can immediately use your computer again. Easy and Quick: You quickly need your computer with the common Windows security? First you need to unlock, type your password, have a typo, type in again and finally, your pc is unlocked. With KeyLock, all these problems are solved: Press "Unlock" on your phone or put your USB Flash Drive in your computer and you can use it immediately. Changelog: 2.1.1 18 August 2018 - Bug fixes There are two malware hits on Virus Total. These are false positives. The program has been tested malware free. Click here to visit the author's website.
5/5 3,189 Dec 28, 2018
Brabonet
KeyScrambler 3.8.0.0
KeyScrambler 3.8.0.0 KeyScrambler encrypts your keystrokes deep in the kernel, foiling keylogging attacks with scrambled, undecipherable data. This advanced method of keystroke protection defeats both known and unknown keyloggers. The friendly interface displays realtime encrypted stream of keystrokes so you see when and how KeyScrambler is working. Strengthens where defenses are the weakest in your traditional anti-virus, anti-malware programs and PC security. Compare Editions A free browser add-on, KeyScrambler Personal protects all your inputs in IE, Firefox, and Flock. KeyScrambler Pro and Premium are paid programs that protect a wide array of apps. How It Works KeyScrambler encrypts your keystrokes at the keyboard driver level and decrypts them at the destination application, giving keyloggers "scrambled," useless keys to record. For Online Games Both KeyScrambler Pro and Premium protect your player's IDs, passwords and digital assets in over two dozen online games. For Business Read how and why KeyScrambler is important for your business. KeyScrambler Premium protects critical systems and reduces risks of information theft at the workplace. Features KeyScrambler defeats known and unknown keyloggers; also protects Chinese, Japanese, and Korean inputs; is compatible with other security programs, tokens and smart cards; and requires no user effort. How To The user-friendly interface allows you to do things on KeyScrambler for a more comfortable, personalized fit. Supports: Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser.
5/5 3,944 Jul 29, 2015
QFX Software
KORO File Shredder 4.2.3.0
KORO File Shredder 4.2.3.0 KORO File Shredder is a program to erase sensitive data in a way that a recovery will be impossible. Data will be overwritten several times e.g. using the US DoD 5220.22-M ( ECE ) erasure method. Using File Shredder you can delete files and documents from your hard drive and must not worry about that they could be recovered anytime later. Software tools offered for retrieval of deleted files under Windows, usually called "file recovery" software, are taking advantage of the shortcoming of the Windows "delete" command we are normally using to delete files. In fact, the "delete" operation in Windows only removes some bits of information from file directories so that the files disappear from thefile manager view. To undelete such a file, it is just necessary to repair the entry in the file directory. To remove files permanently from your system, like a shredder does with your paper documents, you have to use a program that is capable of overwriting the files with a series of random generated binary data for multiple times. Thus, the current contents of the files will be overwritten in a way that a recovery is practically unpossible. Wiping out method Before deletion all files are overwritten using one of the following algorithms Zero (1 Pass): Overwrite the files with zeros. DoD (7 Passes): Overwrite files in accordance with the US Department of Defense regulation DoD 5220.22-M(ECE). Gutmann (35 Passes): Overwrite files using the method developed by Peter Gutmann.. This method is considered to be the most secure, but slow. KORO File Shredder will operate on the following versions of Microsoft Windows: Windows 8.1, 8, 7, Vista, XP, 2000 32-bit és 64-bit Operating system. Special features Easy to use interface Multiple preset shredding methods Support for internal and external drives Support for removable media (SD Flash, Compact Flash, USB drives) Fool proof warnings before deleting any files Custom shredding settings to fit your needs Protects system files ...
5/5 1,871 Jan 14, 2016
Robert Kovacs
KryptoFiler 1.0.2
KryptoFiler 1.0.2 Encrypt and decrypt files, documents, and archives through major cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Encrypt & Decrypt Large Files. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1.0.2 : added drag and drop
0/5 2,062 Sep 29, 2015
3nity Softwares
KryptoMessage 1.0
KryptoMessage 1.0 Encrypt and decrypt messages, mails and conversations through cryptographic standards, including, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Features: Strong encryption : Support for cryptographic standards, TripleDES, Blowfish, TwoFish, Cast128, DES, Ice, Ice2, RC2, RC4, RijnDael, Serpent, Tea, Thin Ice. Hash data through various secure algorithms including Haval 256, MD4, MD5, RipeMD-128, RipeMd-160, SHA1, SHA256, SHA384, SHA512, Tiger. Using 'salts' in order to defend against dictionary attacks versus a list of password hashes and against pre-computed rainbow table attacks. Unicode support. OS: Windows Xp/ Vista/ 7/ 8/ 10. What's New version 1 : first release
0/5 2,060 Sep 29, 2015
3nity Softwares
Leo Folder Locker 2.0
Leo Folder Locker 2.0 Leo Folder Locker is a software to secure your data in a smart, fast , effective and secure way. Although your operating system may offer you the possibility to hide folders, they are easy to find and reveal, since they are not protected by anything else. Thus, they cannot be considered as an option if you need to secure your sensitive data, especially on computers shared by more users at once. Leo Folder Locker comes in handy when these situations occur. This software does not encrypt your data instead it relies on some Windows OS based techniques to lock down folders. This software uses some basic techniques which are pretty good to be used on usual data. This software is not recommended to be used in high sensitivity situations where hard core encryption is required. This software was only designed to be used in general situations. Some of its key features include : Lock Down Mode As a defense from password guessing. Self Destruction Mode to provide a high level security. An Beep System used as an alert. Fully Customizable Settings. A Password Recovery System just in case you forgot yours. A new CLI based easy-to-use UI. A Freeware By Malik Usman Aura.
5/5 1,571 Jun 20, 2016
Malik Usman Aura
MRU-Blaster 1.5
MRU-Blaster 1.5 Protect your privacy, and keep your PC free from clutter. Find and remove over 30,000 MRU lists. MRU-Blaster is a program made to do one large task - detect and clean MRU (most recently used) lists on your computer. These MRU lists contain information such as the names and/or locations of the last files you have accessed. They are located ALL OVER your registry, and for almost ANY file type. By looking at these MRU lists, someone could determine what files you opened/saved/looked at, what their file names were, and much more! (And, in many cases, the lists are displayed in drop-down menus automatically.) With additional plug-ins that allow you to clean out your Temporary Internet Files and Cookies, MRU-Blaster enhances the protection of your privacy! Clean Up Clutter MRU-Blaster safely, efficiently, and rapidly handles cleaning up tens of thousands of "usage tracks" and other remnants that most programs leave behind. These remnants aren't just a potential privacy concern - they can clog up your registry, and take up valuable space on your hard drive. Windows as well as most third-party programs are culprits. And MRU-Blaster can detect and remove over 30,000 different MRUs and usage tracks. Securely Erase Browsing Tracks MRU-Blaster also supports secure removal of Internet Explorer Temporary Internet Files (cache) and Cookies, with its built-in Plugins. The Internet Explorer cache alone can take up GB (gigabytes) of space on your hard drive. System Requirements MRU-Blaster works on Windows 95, 98, ME, NT, 2000, XP, Vista, 7.
5/5 1,204 Jan 27, 2017
Brightfort LLC
OandO ShutUp10 v1.6.1401
OandO ShutUp10 v1.6.1401 Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Free antispy tool for Windows 10 OandO ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! Freeware More control over your operating system Adapt your security settings Protect your privacy Control location services Control Windows Updates Do not pass on your user data and diagnostics Further information Portable Version – no installation required Operating System: Microsoft® Windows 10 OandO ShutUp10 EULA Important Features at ...
5/5 2,331 Mar 26, 2019
OandO Software GmbH
OnionShare v1.3.1 for Mac
OnionShare v1.3.1 for Mac OnionShare lets you securely and anonymously send and receive files. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable web address so others can download files from you, or upload files to you. It does not require setting up a separate server or using a third party file-sharing service. If you want to send files to someone, OnionShare hosts them on your own computer and uses a Tor onion service to make them temporarily accessible over the internet. The receiving user just needs to open the web address in Tor Browser to download the files. If you want to receive files, OnionShare hosts an anonymous dropbox directly on your computer and uses a Tor onion service to make it temporarily accessible over the internet. Other users can upload files to you from by loading the web address in Tor Browser. Documentation To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki. Click here to visit the author's website.
5/5 475 Jan 10, 2019
Micah Lee
OnionShare v1.3.1 for Windows
OnionShare v1.3.1 for Windows OnionShare lets you securely and anonymously send and receive files. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable web address so others can download files from you, or upload files to you. It does not require setting up a separate server or using a third party file-sharing service. If you want to send files to someone, OnionShare hosts them on your own computer and uses a Tor onion service to make them temporarily accessible over the internet. The receiving user just needs to open the web address in Tor Browser to download the files. If you want to receive files, OnionShare hosts an anonymous dropbox directly on your computer and uses a Tor onion service to make it temporarily accessible over the internet. Other users can upload files to you from by loading the web address in Tor Browser. Documentation To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki. Click here to visit the author's website.
5/5 491 Jan 10, 2019
Micah Lee
Pixeloid 1.1
Pixeloid 1.1 Pixeloid A novel and uber-secure way to store data The Pixeloid Matrix The all new Pixeloid Matrix is extremely dense and enables encoding of both text and images(β) along with an automatic ciphering of the data Password Protection Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices with Triple Data Encryption Standard (TripleDES) encryption over the automatic ciphering Licensing Pixeloid is Licensed to Ajay Menon and is completely free to use.
5/5 1,219 Aug 25, 2017
Ajay Menon
Privacy Eraser 4.1.1.1291
Privacy Eraser 4.1.1.1291 Privacy Eraser is an easy to use solution for protecting your privacy by deleting your browsing history and other computer activities. All main popular web browsers are supported, including Internet Explorer, Firefox, Chrome, Safari and Opera. With literally one click, Privacy Eraser will erase all digital footprints - web browser cache, cookies, browsing history, address bar history, typed urls, autocomplete form history, saved passwords, index.dat files, Windows' run history, search history, open/save history, recent documents, temporary files, recycle bin, clipboard, dns cache, log files, error reporting and more. Privacy Eraser also supports plugins to further extend the software's cleaning features. Meaning you can also delete whatever tracks are left behind by other applications with your own plugins. Privacy Eraser embedded more than 250 free plugins, supporting many popular programs such as ACDSee, Adobe Reader, Microsoft Office, WinZip, WinRAR, Windows Media Player, VLC Player, BitTorrent, Google Toolbar and many others. Privacy Eraser works with Windows 8.1/8/7/Vista/XP/2012/2008 (32/64-bit), and also supports Windows FAT16/FAT32/exFAT/NTFS file systems. The software implements and exceeds the US Department of Defense and NSA clearing and sanitizing standards, giving you the confidence that once erased, your file data is gone forever and can never be recovered. Main Features: Internet Explorer (IE), Firefox, Chrome, Safari and Opera Cleans internet cache, browsing history, cookies, typed urls, download history, autocomplete & autofill form history, saved password and much more. Windows Better computer security: cleans run history, search history, open & save history, recent documents, temporary files, recycle bin, clipboard, taskbar jump lists, dns cache, log files, memory dumps, error reporting and more. Third party applications More than 250 free, pre-configured plugins to clean the traces of many popular applications. You can also extend cleaning features by ...
0/5 2,446 Jul 10, 2015
Cybertron Software
Privacy Guardian
Keep your what you do on your computer and the Internet protected from prying eyes! Internet and Online Privacy PC Tools Privacy Guardian works with popular Internet browsers to erase your browsing history, search history, cookies, passwords, and download logs to help keep your Internet activities private. It even works with chat programs, media players, FTP browsers, email clients, and peer-to-peer file transfer programs to protect your other online activities as well. Everyday Computing Privacy PC Tools Privacy Guardian also helps maintain your day-to-day computing privacy. Temporary and recent file history erasers clear your temporary file folders, as well as your recently opened files lists, keeping your PC use and file access history private. Other cleaners erase Windows® history, including the ones found in Microsoft® Office, the Recycle Bin, your Recently Run programs, and the Find and Search bar. Secure File Deletion PC Tools Privacy Guardian helps ensure that the files you delete stay deleted with secure file shredding. And to further safeguard your Recycle Bin, a disk-bleaching tool wipes your free hard disk space, preventing of your deleted files from being restored by file recovery tools.
0/5 6,241 Mar 01, 2012
Pctools
PrivaZer v3.0.76
PrivaZer v3.0.76 With simply one click, PrivaZer is able to clean securely . Internet browsers . Index.dat . Cookies . Cookies Tor . Cookies Flash . Cookies Silverlight . DOM Storage . IndexedDB . AppCache . Registry . RAM . Pagefile.sys and Hiberfil.sys files . Use of software . Messengers . Histories of visited websites, viewed videos, use of software, opened docs, etc . Jumplists . Recycle bin . Temp files . Log files . Invalid Prefetch entries . Indexing service . ThumbCaches, Thumbs.db . Residual traces of deleted files . Free space . File table (MFT or FAT) . INDEX attributes in MFT . USN Journal, etc 1- Detection of residual traces in free space Visualization of residual traces of old files remaining in free space 2- Smart cleanup of free space Cleanup of residual traces in free space areas needing a reset to zero We assure no useless cleanups. Areas already reset to zero are not cleaned which can speed up cleanup by 2x to 100x. Cleanup runs faster after each run. 3- File table cleanup Cleanup of residual traces in file tables, not only in MFT but in FAT as well Additional cleanup of INDEX attributes in MFT 4- Smart overwriting Recognition of type of storage medium of your storage device : magnetic disk, SSD, etc Adaptation of overwriting algorithms to storage medium 5- Smart cleanup of Jumplists Cleanup of your Jumplists without deleting your pinned items/ websites which are preserved 6- Smart cleanup of Prefetch Removing of invalid Prefetch entries. Old valid entries are preserved. 7- Deletion of USB history Deletion of remaining traces of disconnected device (name, date, etc) 8- Scan and cleanup of Pagefile.sys / Hiberfil.sys content Visualization of Pagefile.sys / Hiberfil.sys content Pagefile.sys cleanup options : at each PC shutdown, or at next shutdown only Control of Hiberfil.sys cleanup : PrivaZer controls that the system has reset to zero Hiberfil.sys. If not, ...
5/5 5,086 Aug 12, 2019
Goversoft LLC
Program Blocker
Program Blocker Program Blocker is a portable TWC freeware that lets you block any desktop application. You can block it with a password or simply make it non-functional on your computer. The program is completely based on the idea of simply blocking applications from running, without taking any chances with the system, as a result of which the program does not make any changes in the registry and operates independently of the system. Features: Password protection Block applications Task manager Hidden mode
0/5 4,273 Mar 20, 2014
The Windows Club
Proxy Mask - Proxy Switcher 3.4.4
Proxy Mask - Proxy Switcher 3.4.4 Proxy Checker and Switcher allow access to blocked websites Access blocked websites, and you can watch blocked YouTube videos such as This Video Is Not Available In Your Country (by changing your IP to different country), hide your IP address, surf anonymously without a trace on the Internet. You can access many of blocked websites without using proxy with Smart DNS Changer Free. Supports HTTP and HTTPS proxy servers You can define different proxy setting for different processes at the same time At least several hundred working proxies (always) Updates Working proxy list automatically Supports all windows (XP to windows 10, 32 and 64-bits) When to use Proxy Mask or Proxy Switcher Accessing blocked websites: Your ISP (Internet Service Provider) may block some websites. Normally, network adapters on your computer, uses your IPS DNS server, and most of blocked websites blocking by your ISP's DNS server. This type of restrictions can be bypassed by changing DNS server settings of network adapters. You can use the Smart DNS Changer Free to change your DNS settings. Some websites blocks by their IP addresses and this type of restriction cannot be bypassed by changing DNS server settings. In this case you should use Proxy Mask (Proxy Switcher) to access blocked websites. Bypassing websites region (country) restrictions: Some videos on YouTube cannot be watched from some countries (because of publisher restriction or copyright etc.), In this case YouTube shows text message on video player like This Video Is Not Available In Your Country. To bypass such restrictions you can use Proxy Mask (Proxy Switcher) to access restricted contents by changing your IP address to different country (by using Elite proxy ...
5/5 2,076 Feb 25, 2017
Rentanadviser.com
Psiphon v3
Psiphon v3 The Psiphon 3 Circumvention System is a relay-based Internet censorship circumventer. The system consists of a client application, which configures a users computer to direct Internet traffic; and a set of servers, which proxy client traffic to the Internet. As long as a client can connect to a Psiphon server, it can access Internet services that may be blocked to the user via direct connection. Features: Automatic discovery. Psiphon 3 clients ship with a set of known Psiphon servers to connect to. Over time, clients discover additional servers that are added to a backup server list. As older servers become blocked, each client will have a reserve list of new servers to draw from as it reconnects. To ensure that an adversary cannot enumerate and block a large number of servers, the Psiphon 3 system takes special measures to control how many servers may be discovered by a single client. Mobile ready. A Psiphon 3 client Android app will be available as part of the beta launch, and other mobile platforms are in the works. Zero install. Psiphon 3 is delivered to users as a minimal footprint, zero install application that can be downloaded from any webpage, file sharing site or shared by e-mail and passed around on a USB key. We keep the file size small and avoid the overhead of having to install an application. Custom branding. Psiphon 3 offers a flexible sponsorship system which includes sponsor-branded clients. Dynamic branding includes graphics and text on the client UI; and a region-specific dynamic homepage mechanism that allows a different home page to open depending on where in the world the client is run. Chain of trust. Each client instance may be digitally signed to ...
5/5 1,260 Sep 10, 2018
Psiphon Inc.
QuickStego 1.2.1
QuickStego 1.2.1 Free Steganography Software QuickStego lets you hide text in pictures so that only other users of QuickStego can retrieve and read the hidden secret messages. Once text is hidden in an image the saved picture is still a 'picture', it will load just like any other image and appear as it did before. The image can be saved, emailed, uploaded to the web What is Steganography? Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. An Example of Image Steganography ... A perfectly innocuous picture? Nothing special about it? Well if you download QuickStego and copy the above image into the system, you will see that there is a lot of 'secret text' hidden in this image. Try it and see! Or if you can't wait, move further down this page for a screen shot of what will be revealed ... QuickStego - Screenshots Load the image from above into QuickStego and the secret text that was hidden in the photograph is revealed: System Requirements & FAQ * Operating System - Windows XP or Vista or 7. * Display - 32 bit color depth required * Image Types that can be opened - .jpg/.jpeg, .gif, or .bmp formats * Saved Hidden Text Images - .bmp format only * Approximately 2MB of free hard disk space (plus extra space for any images)
5/5 1,202 Mar 31, 2017
Cybernescence ltd.
SafeIP 2.0.0.2595
SafeIP 2.0.0.2595 Hide your IP address and protect your online identity with SafeIP by hiding your IP from websites, email, games, and more. Features: Encrypt all your Internet traffic with a private proxy, either browsing at home or on public WiFi hotspots Choose the anonymous IP location closest to you for the fastest connection speeds SafeIP can be used completely free for unlimited use, without advertisements and never expires
0/5 4,901 Jan 19, 2014
SafeIP, LLC.
Secret Disk v5.00
Secret Disk v5.00 Secret Disk can create additional disk on your PC, which can be invisible and locked with a password within one second. You can make your private files and folders invisible and protected. You don't need to format your hard disk or make any changes to boot sector. Our program will create new disk automatically very quickly. You can make this disk invisible, including all contents, and protect it with a password. You can store any files and folders on the disk. Secret disk works as usual hard disk and compatible with any other programs which you have installed. You can have more than one secret disk and you can also choose disk letter. In case of power outage or fatal error of OS Windows your secret disk will be locked and become invisible automatically. It happens automatically because information are stored in the virtual memory. Secret Disk does not encrypt any files, it just limits access to your files (you can use password). Software ties virtual disk to your files. This will provide you enough security to hide your files from any person. What's new in version 5.00? This update includes just few changes and one new function, however, this is a huge change, take a look: • Improved design, more intuitive for Windows 10. • New feature: you can change color of text and background (see preferences area). This option gives you a chance to customize design of the program. • Option to turn off password is now free and available to all users. • Date of release: 31 May 2019. Click here to visit the author's website.
5/5 2,331 Jun 28, 2019
PrivacyRoot
SecretFolder 3.0.0.0
SecretFolder 3.0.0.0 SecretFolder is a security tool to hide and lock your sensitive folder out from the other users. It provides immediate data protection (protect and unprotect commands are executed in no time). Features: Free to use at both home and in the office Support for 64-bit Windows. NTFS, FAT32, exFAT and FAT volumes are supported. Unlimited number of folders can be protected at the same time. No limits on the size of protected data. No file system structure modifications will occur. Protected uninstall. When you create a secret folder, using your own password, you can manage folder. CMD command will not be able to access the folders.
0/5 3,848 Jun 05, 2014
Oh!Soft
SecureMyBit v2.3
SecureMyBit v2.3 SecureMyBit is a free, portable, and light application , which allows to encrypt any type of file with password (using AES 256 Bit encryption method) and then, decrypt them. SecureMyBit provide, for this purpose, also a secure and strong random password generator, which can generate passwords, as long as you want. Another utility of SecureMyBit is the Secure File Shredder, which can delete a file permanently with an irreversible shredding operation. Our software provides also an utility which can validate the strength of user’s passwords; and a System Specs utility, which can tell us all the informations about our computer. SecureMyBit provides also, in addition, a secure virtual keyboard which doesn’t produce any keystroke, so this guarantee a protection while entering your password. Finally, you can also get information about your files: hashes, file type, file attributes, etc. and compress your text easily and fast! When you encrypt your file(s) or folder(s) the Smart Monitor will check in real-time if they are modified, renamed or changed/deleted. Key Features Secure File Password Encryption (AES 256 Bit) Secure File Shredder System Specs Password Generator File Info Viewer Text Compressor Smart Monitor Compatibility Windows Vista Windows 7 Windows 8/8.1 Windows 10 Special Requirement: Microsoft .NET Framework 4.5 Languages: English F.A.Q. -Why SecureMyBit is detected by my antivirus/antimalware? We want to specify that this is surely a false positive. SecureMyBit is a clean file. Do I need to install SecureMyBit? No, SecureMyBit is avalaible only in “portable” version, so it doesn’t require any installation. -Is SecureMyBit free? Yes, SecureMyBit is absolutely FREE and WITHOUT advertisements! -Does SecureMyBit protect files against ransomware? Well, SecureMyBit provides surely additional protection to the encrypted files, against ransomware, also because the extension of the encrypted files are encoded. This doesn’t mean SecureMyBit protects files against all type of ransomware. -Why SecureMyBit gives me an error message when I ...
5/5 1,219 May 19, 2019
JM Security
Spybot Anti-Beacon for Windows 10 1.6
Spybot Anti-Beacon for Windows 10 1.6 Spybot Anti-Beacon for Windows 10 is a small utility designed to block and stop the various tracking (aka telemetry) issues that come with Windows 10. Seeing the bunch of incomplete or broken scripts to disable tracking in Windows 10, and the tools that install adware or worse in exchange for their function, we wrapped disabling tracking up in a small tool that’s free and clean. With the upcoming news about telemetry in Windows 7 and 8.1, Spybot Anti-Beacon has added support for those as well. Changelog: Spybot Anti-Beacon 1.6 now available December 5th, 2016 Many thanks for all the patience waiting for an update to Spybot Anti-Beacon! We spent a lot of time working on Spybot 3. And now that Spybot Anti-Beacon will also be integrated into Spybot 3, we found time to continue work. Today’s update to Anti-Beacon 1.6 will add two new immunizers and a few new blocked hosts. More updates are already pending since we’re actively working on this feature again (including a new look, but mostly focused on function of course)! Spybot Anti-Beacon 1.6 can be downloaded from here. Updates: Additional Telemetry Immunization Categories Additional Blocked Hosts Fixes: Immunization of Office 13/16 Telemetry Scheduled Tasks and Options is possible even if Microsoft Office is not installed (previously they appeared to immunize correctly, but the immunization could not be undone in Anti-Beacon) Don’t forget to always run Spybot Anti-Beacon as an administrator by right-clicking the downloaded installer, and choosing the option to “Run as administrator”. This will ensure that Anti-Beacon has the permissions it needs to function correctly.
5/5 2,294 Dec 06, 2016
Safer-Networking Limited
SpyDetectFree 32bit 1.0
SpyDetectFree 32bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
0/5 1,982 Dec 07, 2015
NesterSoft Inc.
SpyDetectFree 64bit 1.0
SpyDetectFree 64bit 1.0 SpyDetectFree is a FREE tool mainly intended for detecting processes on your computer that might be spying on your keyboard or in other word for detecting processes that might be recording your keystrokes. Just in one click get answers for your questions: -Are my keystrokes being recorded? -Is there any spyware on my computer? -Am I being spied on? -Is my computer being spied on? Why Free? Because NesterSoft Inc. supports Respectful Employee Monitoring Only without any spying functionality. Performance monitoring only. Strictly. SpyDetectFree is a purely free software: no requirements for using it, there are no fees, or hidden functionality. Digital Signature SpyDetectFree is digitally signed by NesterSoft Inc. Our signed software is completely safe to use: there are no bundles, no advertisement, no viruses, no toolbars or other addons. How To Use Easy! Run -> Click the Button -> Get Results No installation is required. To use SpyDetectFree simply run it and click “Check Now” button. The whole process takes just 1 minute: Reading Results Results answer two major questions: 1. Am I Being Spied On? To answer this question, SpyDetectFree is searching if there are any processes on your computer that have installed HOOKS on your keyboard. This is how SpyDetectFree detects processes that might be recording your keystrokes, as using hooks on keyboard is the most common practice when recording keystrokes pressed. 2. Am I Being Monitored? This result answers wether there are any processes that might be monitoring your computer. This result is based on the most common practices among monitoring software present on the market. Positive result means that there are some processes on your computer that periodically check on your windows’ captions. It does not necessarily mean that your computer is being monitored, but even if it is being monitored, then only applications and website usage can be recorded, not keystrokes or content. So, no personal information can be captured. Why ...
1/5 2,014 Dec 07, 2015
NesterSoft Inc.
Tor Browser Bundle v8.5.2 for Linux, BSD, and Unix 32bit
Tor Browser Bundle v8.5.2 for Linux, BSD, and Unix 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 2,493 Jun 21, 2019
The Tor Project
Tor Browser Bundle v8.5.2 for Linux, BSD, and Unix 64bit
Tor Browser Bundle v8.5.2 for Linux, BSD, and Unix 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 2,510 Jun 21, 2019
The Tor Project
Tor Browser Bundle v8.5.2 for Mac OS X
Tor Browser Bundle v8.5.2 for Mac OS X What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the ...
5/5 2,709 Jun 21, 2019
The Tor Project
Tor Browser Bundle v8.5.2 for Windows 32bit
Tor Browser Bundle v8.5.2 for Windows 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 4,888 Jun 21, 2019
The Tor Project
Tor Browser Bundle v8.5.2 for Windows 64bit
Tor Browser Bundle v8.5.2 for Windows 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 823 Jun 21, 2019
The Tor Project
USB Raptor v0.14.77
USB Raptor v0.14.77 Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function Features Automated Windows lock/unlock with the use of common USB flash drives Compatible with all types of USB flash drives Robust design Easy to setup and use High security option to verify the serial number of the flash drive Various alternative unlock methods Supports LAN lockdown (and unlock) function Synchronized lock and unlock on LAN for multiple PCs Status report over internet and LAN Supports serial command integration (beta stage) Tray icon based application Option to delay and cancel the lock, to avoid unwanted locks Windows 10, Windows 7, Windows 8 and Windows XP compatible Multi screen systems ...
5/5 1,979 Dec 28, 2018
Nikos Georgousis
VeraCrypt 1.23 for Linux
VeraCrypt 1.23 for Linux VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.23 (September 12th, 2018): Windows: VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption. Fix EFI system encryption issues on some machines (e.g. HP, Acer). Support EFI system encryption on Windows LTSB. Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector. Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks. Add internal verification of binaries embedded signature to protect against some types to tampering attacks. Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances. when Secure Desktop is enabled, use it for Mount Options dialog ...
5/5 2,205 Sep 14, 2018
IDRIX
VeraCrypt 1.23 for Mac
VeraCrypt 1.23 for Mac VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.23 (September 12th, 2018): Windows: VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption. Fix EFI system encryption issues on some machines (e.g. HP, Acer). Support EFI system encryption on Windows LTSB. Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector. Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks. Add internal verification of binaries embedded signature to protect against some types to tampering attacks. Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances. when Secure Desktop is enabled, use it for Mount Options dialog ...
5/5 2,176 Sep 14, 2018
IDRIX
VeraCrypt 1.23 for Windows
VeraCrypt 1.23 for Windows VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format. This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data. Release Notes 1.23-Hotfix-2 (October 8th, 2018): Windows: Fix low severity vulnerability inherited from TrueCrypt that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison. Disable quick format when creating file containers from command line. Add /quick switch to enable it in this case if needed. Add /nosizecheck switch to disable checking container size against available free space during its creation. This enables to workaround a bug in Microsoft Distributed File System (DFS). Click here to visit the author's website.
5/5 2,274 Dec 21, 2018
IDRIX
W10Privacy 3.1.0.3
W10Privacy 3.1.0.3 The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea for the development of this little program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! This program may trigger anti-virus warnings since it changes core Windows settings.. These are false warnings. This program contains no viruses or malware. Changelog: 3.1.0.3 (10.07.2018) - Starting with Windows 10 1709, another registry key will be set for the setting "Do not show app suggestions (advertising) in the start menu". This has now been taken into account. Many thanks to Winfried for the hint!
5/5 1,888 Aug 08, 2018
Bernd Schuster
WebCam On-Off v1.2
WebCam On-Off v1.2 Webcams may let you stay in touch with friends and family also a webcam allows you to record and stream video from your computer or laptop to the Internet or a video file. When you are not using your webcam, you may wish to disable it to ensure it is not recording by accident and they also pose risks of people hacking into them and spying on you surely ,Malware can take over webcams, so there is potential for your camera to spy on you , Most hackers utilize so-called Trojan horse attacks , they can take control of your webcam and make videos and take pictures of you without your knowledge. If you’re a parent, there are a few reasons why you may want to disable your webcam, all of them having to do with safety. Video instant messaging and websites aren’t always child-friendly, and you may decide disabling your webcam is your best recourse. If you have an external webcam, unplug the USB cord that connects the camera to the computer, and hide the camera somewhere your kid won’t find it! , But it is not the best way because if you need it every 2 – 3 hours will you hide it again and again ? and what about if you have a built-in camera ? the Washington Post highlighted an unnerving study published at Johns Hopkins University which found that a laptop webcam can function in relative secrecy-a slightly subtler Eye of Sauron Webcam-spying—particularly the variant that involves disabling LED indicator lights—takes quite a bit of effort, but the practice isn’t limited to the realm of benevolent academics. The FBI has also publicly acknowledged its ability to employ such techniques when investigating criminal activity As you see disable the webcam completely is the safest way to ...
5/5 2,344 Jun 04, 2015
Sordum.org
Who Stalks My Cam V2.0
Who Stalks My Cam V2.0 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ...
5/5 1,946 Mar 07, 2017
PHROZEN SAS
Win.Privacy v3.2.0.1
Win.Privacy v3.2.0.1 Privacy made ​​easy. From the author: The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea to develop this program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but meets my envisaged purpose. The software is still in an early development phase: suggestions and requests will be gladly accepted and considered, if necessary, in the further development! Installation W10Privacy does not need to be installed, but consists of a single executable file. This must be stored in a folder in which the program has write access. Start W10Privacy is started by a simple double-click. During startup, the program reads in the current settings and then displays the main window. At the beginning, the settings of the "Privacy" tab will be displayed. Depending on the settings currently set on the system, checkmarks are placed in front of the various menu items. A checkmark means that the respective option is set on the system. If one of the options is unchecked, this naturally means that the respective option is not activated on the system. Using the Main Window If an option is to be set, a check mark must first be set or removed (for deactivation). To activate the option via the program, a click on the button "Set changed settings" is necessary. Options that ...
5/5 1,244 Nov 08, 2018
Bernd Schuster
WinGuard Pro 2014 8.9.2.3
WinGuard Pro 2014 8.9.2.3 Secure your computer by password protecting your Windows applications, programs and EXE files. Plus, protect your data with encryption for your files, folders and drives - directly from Windows Explorer. Extra features allow you to disable the Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and more. Features: Lock Programs, Applications, EXE Files with a Password Lock any folder with a password Disable Windows at Boot Disable Software Installation and Downloads Password Protect Windows Explorer Password Protect your Web Browser, inc. Internet Explorer, FireFox, Opera and more Parental Time Control It's FREE, no advertising or spyware Works alongside your firewall and anti-virus program Advanced edition also includes: Add your own program for protection Disable Canceling of Password Prompt Configure Multiple User Accounts Password Windows at Boot Password Internet Explorer Disable Software Installation Use Software in Commercial Enviroment
5/5 4,867 Nov 02, 2013
WGSoft
Wipe v17.34
Wipe v17.34 This powerful program can remove a lot of gigabytes of garbage on your computer and recover many free disk space. In addition, it will protect your privacy on the Internet - it removes records about personal activity on PC. You will be able to delete browser history and cache, index.dat files, registry, internet cookies files, autocomplete-history, temporary internet files and many many other items. This program also erases any other tracks of personal activity which you made when used your PC, and no matter in which program: Windows, Internet Explorer, FireFox, Chrome, Opera or any other... To prevent recovery of deleted data the program uses the following security methods: DoD 5220.22-M method, Gutmann method ( full 35 steps ), Russian GOST and other. You can also customize cleaning process and choose which items to remove and which is not. Or you can view detailed information about areas where garbage located on your computer. What's new in version 17.34? This update improves support for all major browsers (their current and future versions, thus as soon as they will arrive our software will recognize them). • Added support for future version of browser Chrome 74. • Added support for future version of browser FireFox 67. • Added support for future version of browser SlimJet 23. • Added support for future version of browser Comodo Dragon 74. • Updated support for current version of Comodo Dragon 73. • Updated support for current version of Acrobat Reader 19. • Updated support for current version of Yandex Browser 19. • Updated support for current version of Vivaldi browser 2. • Updated support for current version of Palemoon browser 28. • Updated support for current version of Torch browser 65. • Removed few bugs related to the interface of the program. • Date of release: 9 April 2019. Click here to visit the author's website.
5/5 4,976 May 10, 2019
Yuri Saprykin
WipeFile v3.1
WipeFile v3.1 WipeFile deletes files and folders secure and fast. To do this, WipeFile overwrites the information completely, so there is no way to restore the files or reconstruct the file content. WipeFile supports 14 different wipe methods, e.g. two US Navy standards, the standard of the US Department of Defense, US Air Force and the NATO. System Requirements: WinXP / Vista / Win7 / Win8 / Win10 Microsoft .NET Framework 4 Languages: German, English, Japanese, Russian Click here to visit the author's website.
5/5 243 May 10, 2019
Gaijin.at
   
 
Showing rows 1 to 91 of 91 Showing Page 1 of 1  1 


Copyright (c) 2019


Tweets by @GeekOnTheLoose