There are many programs to protect your privacy and system security, but this easy-to-use collection combines 6 fantastic modules to improve your data security and will guide you step by step on your way to a safer system! Including Password Organizer, Personal Diary, File Encrypter, File Washer, Backup and Synchronizer. This suite protects your personal data, encrypts or wipes files and saves your important files scheduled and automatically!
* Secure Wipe is small utility that runs in the background which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. * Most people have some data that they would rather not share with others – passwords, personal information. * Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time
Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms (any of the following modern cryptographic algorithms can be used: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6), and takes place in real time without affecting computer performance. Cryptic Disk provides its use
This is a comprehensive monitoring software. Free Keylogger allows you to record nearly all user activities on computer invisibly. It saves all recorded information to encrypted reports, and you can read it with a special Report Viewer. The key logger remains invisible to users at all times, and only the owner can press a secret hotkey combination to make it visible again, change settings and access the reports.
Send e-mail messages easily and securely from your portable PC while you are traveling around the world! Using this program instead of your ISP's SMTP server you will increase your e-mail security and privacy as well as get rid of annoying change of settings for your e-mail program. Easy SMTP Server is easy to configure!
CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
The Fast File Encryptor is designed for fast processing of extremely large files. It can encrypt or decrypt files, contents of folders and contains a lot of additional tools. The Fast File Encryptor presents a flexible user interface with detailed messages about all operations. The Fast File Encryptor features the following tools: Encrypt File, Encrypt Folder, Often Used Files, File Shredder, Folder Drive.
Use the SurfEasy VPN to protect your privacy, security and online identity on any Windows computer. SurfEasy encrypts the Internet connection through a high speed Virtual Private Network, ensuring your web browsing, email and programs are kept private and secure. SurfEasy Free VPN gives you the ability to connect up to 5 devices and get 500mb of encrypted data for free each month. Earn unlimited free data upgrades by telling your friends
PassKeeper is a free password manager that allows you to store your passwords in an encrypted database protected by a password. Thanks to PassKeeper is no longer necessary to remember hundreds of passwords, just remember the database one, or use only the security key and forever rid of the problem of having to remember passwords.
Application for encryption and decryption of files with symmetric key. Features: * Encryption based on a chaotic pseudo-random generator. * Secure file deletion. * High speed. * Multi thread. * Multi-language. * Multi-platform. * GUI / Shell. * Documentation. * Open source. Requirements: * Java-8
Secretly records all key strokes (entered text) including passwords on any Windows computer Records for every Windows user Recorded text is viewed by date using a secret key combination You can pause then resume key logging You can delete unneeded logs Supports all versions of Windows including the latest version of Windows (Administrator user privileges required to install app and to view the logs)
