Search Software:      

Free Secured Downloads

 

Network Password Manager

Network Password Manager is a multi-functional program for storage, management and protection of valuable information containing passwords. Unlike similar desktop programs, it supports the multi-user mode. It also provides a common information environment and can create centralized data backup. Network Password Manager guarantees the most reliable protection: all your vital data will be secured safely using 256-bit AES encryption. Network Password Manager also supports standard Windows user groups, so you can easily set access rights for any user. It has a built-in customizable password generator. A hot key feature is included in this application to automate the inserting of logins and passwords. More than just passwords and logins can be kept. The program can also store additional information, such as URLs, comments, files, custom fields, etc. Installing and tuning up this program is easy and understandable for everyone. The administration process is simple. Network Password Manager comes with a user-friendly interface that is both flexible and easy to use.

password manage network management security enterprise 256 aes encryption protection storage login

PlexCrypt Compression-Encryption

PlexCrypt protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently altered. PlexCrypt can create self-decrypting files, which can be transfered to other users and can be decrypted without installing PlexCrypt. PlexCrypt can also shred or deletes documents securely. It supports MD5WithRSAEncryption, SHA1WithRSA/ISO9796-2, MD2WithRSAEncryption, RIPEMD160WithRSAEncryption, SHA1WithRSAEncryption, RIPEMD160WithRSAEncryption, MD5WithRSA/ISO9796-2 RIPEMD160WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2 algorithms for digital signatures. PlexCrypt also allows users to archive a set of files and folders in the ZIP format and extract them later. In addition, it allows users to create and manage digital certificates and key-pairs for encryption and digital signatures.

compression encryption decryption public key infrastructure synchronous self decryption digital certificate aes blowfish cast des

LockTheFile

LockTheFile is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy user interface; Ability to send locked files to your friends by email; Ability to unlock received files; Ability to lock/unlock files "on the fly"; Store administrative password at the secured place; Scan hard disk drivers for locked files

encrypt a file encrypt file encrypt text file file encrypt file encryption file lock file lock download file lock programm file lock soft file lock software file password protect

Essen Cyber Outlet

Soup to Nuts, create your own Online E-Store, in under an Hour. Start selling and collecting payments instantaneously. Application helps also in Domain Registration, in case you do not have one already. Collect your customers payments through Secured Online Payment Methods. Application connects you to popular Payment Gateways. Complete Credit Card processing. Create unrestricted number of Groups and represent them in a hierarchical form.(father-child relationship). Create unlimited number of items. Upload Images of your Products from anywhere and link with respective groups. Online Order Tracking. Management Information Report generation. Allows flexible shipping methods.

e-shop e-store cyber shop shopping application online store shopsite cyber outlet online shopping soup nuts create

4t HIT Mail Privacy LITE

4t HIT Mail Privacy Lite sends and receives your private data securely hidden in images of various types. You can use your birthday photo or landscape picture to send some important message to your friend or colegue securely - our application will also use strong encrypting algorithm to make communications really safe. Data is sent and received encrypted, but also nobody even knows that you send or receive any information. Other people only see nice photos; you see important text message. 4t HIT Mail Privacy Lite works with a number of most popular computer graphics formats. It creates BMP, ZIP or HIT files and helps in sending them to the addressee. This tool is free, and everybody can use it to read and write secured messages. Currently 4t Niagara Software is finishing its powerfull 4t HIT Mail Privacy PRO, where you get a modern interface of a mail agent, address book, customized accounts, and absolutelly no any limitations! MAIN FEATURES: - Creates and reads text messages encrypted and hidden in photos and other computer images; - Helps in sending computer images with encrypted and hidden text messages via your favorite email client; - Supports most popular computer image formats (JPG, GIF, TIFF, BMP, etc);

mail email privacy online security crypt decrypt encode decode image picture

Deskman

Deskman allows you to protect desktops easily. Restrict access to system settings and keep your desktop tightly secured from a simple interface. HOME USERS need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. Securing your Desktop has never been so easy.

easy security desktop security desktop restrictions access control security software user control desktop manager security manager system protection access point versatile

Desktop Scout

Desktop Scout is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop programs, launch web sites and documents, log off, restart or shutdown the computer remotely. Beyond surveillance, Desktop Scout allows you to block access to any program, document or web site based on the current user. You can simply deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without administrator privileges to disarm or uninstall.

spy software spy software computer internet email monitoring pc spyware keystroke keyboard

eDock Desktop

eDock Desktop is secure personal storage that will protect your privacy from being compromised. Using the latest SQL file storage technology, eDock Desktop can secure all files with encryption and personal login with password. Even if the security of your computer is compromised, your files are still safe as long as the intruder does not know your login. Let your kids use your computer without fear that they will view, alter or delete your important files. Your privacy is secured with eDock Desktop! All files stored are automatically encrypted and any access to this folder requires a login and password. Multiple user accounts are supported to provide privacy to all computer users. eDock Desktop is independent from the operating system to ensure that only users with a valid eDock Desktop login can access their private files. The Shared Documents folder can be used to securely exchange files between eDock Desktop users. eDock Desktop is integrated into Windows Explorer to provide user friendly access to your encrypted files. Simply use your clipboard to copy and paste any file from a standard Windows folder into eDock Desktop. The number of files and folders stored in eDock Desktop is limited only by the size of your hard drive. eDock Desktop acts as a virtual drive accessible from any application (e.g. Windows Explorer, PC SUITE, MS OFFICE, etc.) through the standard Open/Save dialog. All common file system functions (e.g. rename, delete) are available. Use this secure personal storage for private letters, personal pictures, movies, contracts, bank and credit card statements, saved web pages and more. Save time by using the fast and accurate full-text search in eDock Desktop. The database based search provides fast and convenient access to lost documents regardless of personal storage size. Store hundreds of web pages and then quickly access information you need by using full-text search.

encryption secure personal storage electronic digital document sql storage protect doc xls pdf

Evidence

Whether your `Evidence Room' is just a small secured closet or a large, dedicated building, you need to have an accurate inventory of items in a manner that survives a determined court challenge. EVIDENCE is a program that lets you enter and maintain all evidence collected by your officers, and it works on any personal computer. Powerful, yet easy to learn and use, EVIDENCE has all the features law enforcement needs to maintain a court-quality inventory of evidence. Each entry provides a narrative section where you can keep brief notes, chain-of-custody documentation, etc. This latest version of EVIDENCE will now also let you enter, view, and/or print a digital picture with an entry! EVIDENCE also has very powerful searching options. Resulting sub-lists of matching items are summarized, and can be printed out in a professional report. See why EVIDENCE has been a best seller since 1989!

rad software shareware police cops law enforcement evidence evidence evidence tracking law enforcement

Express Messaging Server

Express Messaging Server 2.0 is the perfect network communications solution for your corporate communication needs - providing you with all the network essentials of a presence and instant messaging solution. It creates fast, reliable and secure instant messaging connections between network associates on local and wide area networks (LAN and WAN). Session authentication and message transfers are automatically secured as they are protected by industry-standard 64-bit encryption. As a private instant messenger client and server solution, Express Messaging Server 2.0 gives corporate message mates unparalleled speed for nonverbal communications using very little bandwidth. Its simple user interface lets you create accounts quickly and administer accounts and services remotely. Express Messaging Server includes a Windows NT account converter to create an Express account database in seconds. Express Messaging Server 2.0 is a secure way to set up a private communications system on your LAN or WAN.

instant messenger communication instant messager network associates server instant messaging server nonverbal communications server software message mates network solutions software

 
Audio Software
Office & Business
Games Software
Graphics Software
Internet Software
Home Software
Developers Tools
System Utilities
 
 
 
 

Page 1 out of 5    1 2 3 4 5

 

Copyright 2004-2010 FilesWeb.com