ModelRight, Inc. provides a fresh approach to data modeling - and at an affordable price. ModelRight, our flagship product, streamlines the design process for database professionals and software developers, empowering you to design, visualize and document your databases.
Cross-Database Comparator Pro is a single comprehensive and integrated enterprise working environment to compare database data and structure across any database types. Usually ODBC drivers delivered together with DBMS by the vendor, however there are companies developing high-quality ODBC drivers standalone.
Today more than ever employers need to be concerned about what their employees are doing on their computers. What seems to be harmless personal use of your company's computers can lead to time consuming and costly legal and security nightmares. The statistics speak for themselves. Don't let your company become one of them. You need to keep a closer eye on what your staff is doing in Cyberspace.
All In One Keylogger implements the state-of-art technology, and guarantees you full control over your computer. Have you ever thought what site your children are surfing when you are not at home? What your employees are doing when you are not at work? Now you can monitor chats,e-mails,keystrokes typed,desktop activities, microphone...It can even send you logs by email/FTP or via your Network.
Video Surveillance Monitor is an advanced video surveillance software. Users can effortlessly monitor home, office, cradle, parking area, storehouse, UFO or any other premises 24-hours a day. Timestamped image recording let users capture details of events precisely when they happen. Simply connect a USB or FireWire Camera to your computer, run this program, then you will have an inexpensive and effective video surveillance system.
To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer. Be used to hide all the sensitive data and important that we want to keep away from prying eyes.
OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN is not a web application proxy and does not operate through a web browser.
Audit and recovery of CouchDB passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
Hash based File Integrity Comparison tool
Aloahas´s Smart Card Connector, including a Microsoft approved CSP and a PKCS #11, provides native, plug & play security enhancement to Microsoft Windows operating systems and Applications using various Smart Cards such as the German Health Insurance Card, Health Professional Card, Belgium e-ID (Belpic), Swiss GS1/SuisseID, Italian Infocamere, SagemOrga Micardo, CardOS, Sicrypt, and more..., Smartcard based hard disk encryption included!