Security & Privacy

No Image

Leak Blocker 1.1.2

Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can allow only read operations.

device blocking, data leak preventing, device auditing

Device Seizure 6.6: Recover & analyze mobile phone data like text messages, photos, & call history

Device Seizure 6.6

Perform logical and physical forensic extractions of mobile phone & device data such as iPhone, iPads, Androids, BlackBerry, & more. Forensically acquire user data such as contacts, call logs, SMS, MMS, pictures, videos, and much more. Recovers deleted cell phone data such as text messages, contacts, call logs, calendar entries, photos, videos, and more all in one affordable tool.

iphone, recovery, recover, acquisition, android, deleted, mobile, phone, forensics, text message, cell

Spybot 2.4.40: Searches for and removes ad- and spyware

Spybot 2.4.40

Spybot searches your hard disk for so-called spy- or adbots; little modules that are responsible for the ads many programs show. But many of these modules also transmit information about your surfing behaviour and more to the net. If Spybot finds such modules, it can remove them - or replace them with empty dummies in case their host won`t work any more with its bot removed.

spyware, adware, antispyware, privacy, antivirus

Proxy Switcher Standard 5.11.1: Provides flexible proxy settings management and anonymous surfing capabilities

Proxy Switcher Standard 5.11.1

Different internet connections do often require completely different proxy server settings and it`s a real pain to change them manually. Proxy Switcher provides proxy settings management solution and anonymous surfing capabilities. This includes flexible proxy server list management, proxy server tester and anonymous proxy server list downloader.

anonymous surfing, internet explorer, proxy settings

Olive 1.0.11: Olive is our attempt to create a more open internet.

Olive 1.0.11

Olive is a free software that will let you bypass restrictions and access global content and in the meantime, protect your online activity to a certain extent. You can use it to get access to services available in only certain areas, for example the US Netflix library, Hulu, BBC iPlayer, etc.

bandwidth sharing, netflix outside us, bypass censorship, unblock sites, hulu outside us

Aloaha PDF Crypter.NET 6.0.16: Strong AES256 Certificate based encryption for your confidential PDFs

Aloaha PDF Crypter.NET 6.0.16

Strong AES 256 Certificate based encryption for your confidential PDFs. Features: portable – only one single EXE, free edition available, AES256 Encryption, 32 and 64 Bit, no Adobe Software required, fully PDF compliant

certifiate, public key, free, aes256, public, encryption, portable

Exterminate It! Stay protected with custom updates, a huge malware database, and smart removal!

Exterminate It!

Exterminate It! is a powerful antimalware solution that defends your PC and notebook with ease. Now you can feel the meaning of Real Protection with "Submit State" - the fastest possible responder to malware threats. Get a personal update within 24 hours! Huge, daily-updated Malware Database ensures your protection. Exterminate It! is compatible with other security suites. Guard Yourself, Your House, and Your Family against Digital Threats!

antimalware tools, remove malware, computer malware removal, antispyware software, anti malware, trojan removal, antimalware download, antirootkit, anti spyware, trojan remover, rootkit removal software, antimalware, antispyware tools

Results 1-7 of 5829      Page 1 2 3 4 5 ... 833 | Next