Best Disk Lock can secure data by locking disks in three different levels - elementary, intermediate and advanced lock. After a disk is locked, it can be hidden in the computer. The advanced-locked disk will be hidden completely, which means it cannot be found in any environment. USB devices control feature includes two parts: disable USB devices and set USB devices as read-only. Other enhancements like system settings, system tools and more.
Command-line Tool to Hide DLL in a Windows Process
EraseMaster allows you to clean your Internet history, cookies, cache, index.dat files, temp files, Windows search history, and more. EraseMaster completely cleans your system, ensuring your computer and Internet use cannot be revealed by anyone. It is very easy to use and performs all its cleaning tasks with just a single click of a button! Other features include plug-ins for popular applications, scheduled cleanups and running in stealth mode.
QPass is easy to use password manager which can store your sensitive data crypted with built-in password generator. It uses Qt4 as a GUI library and libgcrypt as cryptographic library.
With this free program you can find all encrypted ZIP archives on a computer or laptop. The main advantage of the program is its high speed. The list of protected ZIP archives can be obtained in just a few seconds. The application has an intuitive and extremely simple interface. Use this software can users with any level of training.
The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
Active Keylogger Pro - the new version is released. Active Keylogger Pro is monitoring all PC activity, from keystrokes to scheduling screenshots at set intervals. Active Keylogger Pro includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords, programs launched and more! For more details: www.activekeylogger.com
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks.
This is a comprehensive monitoring software. Free Keylogger allows you to record nearly all user activities on computer invisibly. It saves all recorded information to encrypted reports, and you can read it with a special Report Viewer. The key logger remains invisible to users at all times, and only the owner can press a secret hotkey combination to make it visible again, change settings and access the reports.
Secure Archive is a powerful File Encryption and Compression tool which allows you to encrypt sensitive data and keep it away from unauthorized users while also compressing it so that it will occupy less space on your computer. In addition, the Secure Delete feature allows you to easily remove the original copies of your unencrypted data.
Aiseesoft FoneEraser is an exclusive eraser for iOS devices. It allows you to remove all data from your iPhone/iPad/iPod completely and permanently. Those data may be contacts, text messages, photo Albums, videos, music, settings, documents and so forth. And the erasing level is optional (Low level, Medium level and High level). In addition, it functions on two or more devices at the same time, which will save lots of time.