Free Software Downloads


Privacy and Security Software

     


Privacy and Security

Access Control
Anti-Spam & Anti-Spy Tools
Anti-Virus Tools
Covert Surveillance
Encryption Tools
Other
Password Managers



 

 

 

 

 


Cresotech TaschenTresor

Cresotech TaschenTresor

German version. Convenient PocketPC-based tool for safe storage of confidential information. PocketSafe provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data on your PDA.

Whitenoise Email Attachment Encryption

Whitenoise Email Attachment Encryption

The Whitenoise encrypted e-mail attachment utility allows users of the Whitenoise E-Mail Attachment Utility to send securely encrypted e-mail attachments to recipients even if they do not have the Whitenoise e-mail encryption software.

SLC Security Console

SLC Security Console

The SLC Security console is an integrated security console that supports Snort, Intruvert and Dragon IDS monitoring. Linksys wireless routers, Linux and Windows syslog devices for security events.

Mil Firewall

Mil Firewall

Mil Firewall blocks all network attacks and information leaks from your computer. With Mil Firewall you can use Internet and local networks for work or entertainment while keeping full control over what goes in and what goes out of your computer.

CA Internet Security Suite Plus 2008

CA Internet Security Suite Plus 2008

Comprehensive protection against viruses, hackers, identity thieves, spyware, spam, offensive websites, and other online threats. This internet security suite features low overhead, automatic updates, easy-to-use user interface and 24x7 tech support.

ID Image Protector

ID Image Protector

ID Image Protector is one of the most efficient protection programs for your personal data that insures reliable encryption of files with perfect decoding to original content.

SoftActivity Keylogger

SoftActivity Keylogger

Record used applications with timestamps, work duration, keystrokes, passwords, WWW surfing history. Create screenshots of the desktop, record emails sent and chart conversations.

Stealth WebSite Logger

Stealth WebSite Logger

Stealth Website Logger is an invisible, easy to use surveillance application that monitors and records all websites visited by a user or computer.

Registration Backup

Registration Backup

Discover how this Product Key Manager will help you keep an up-to-date backup of all your software product keys in a safe and central location (+ download site). Your data will be very securely encrypted and password protected. Very easy to use.

MG-Shadow: Computer monitoring software

MG-Shadow: Computer monitoring software

The most stable and easy to use software to secretly monitor anyone's computer. MG-Shadow records programs, windows, all keystrokes, websites, emails, chats, instant messengers, screenshots and more. 100% invisible and light on computer resources.

Privacy Eraser Pro

Privacy Eraser Pro

Privacy Eraser Pro is an Internet Eraser that protects your Internet privacy by permanently erase Internet history and past computer activities.

Spam Hound

Spam Hound

Spam Hound is a program that works with your current email reader and blocks spam. Zero configuration is required. Spam Hound automatically detects all email settings. Spam Hound uses Neural Networks to automatically learn to block spam better.

Phishing Doctor

Phishing Doctor

phishing doctor provides Mail Protection, WebSite Protection, and Alerts and Logs. It keeps you aware of what's happening on your computer without being overly intrusive, and enables you to go back at any time to investigate past alerts.

Stealth KeyLogger

Stealth KeyLogger

Stealth KeyLogger is an invisible, easy-to-use surveillance tool for recording all keystrokes, e-mails, chat / instant messenger discussions, web sites visited, applications run, changes in files or folders and clipboard operations.

Red Pill Spy

Red Pill Spy

Red Pill Spy is a discreet covert surveillance application. You can see screenshots of what the user have been doing, view a list of websites and a log of everything the user have typed. You can also secretly record conversations near your computer.

Hide-A-File

Hide-A-File

Hide and password protect files or entire folders on your hard drive. Give different passwords to different files and folders and give these passwords to different people so you to control who can access different files.

Omniquad Total Security 2005

Omniquad Total Security 2005

Omniquad Total Security 2005 includes everything you need to protect your small office or home computer in one modular package featuring MyPrivacy, AntiSpy, Personal Firewall, Anonymous Surfing,Spam Blocker & Antivirus

SecureIT Encryption Software

SecureIT Encryption Software

SecureIT- encrypt, compress and shred any file or folder on any Windows PC with its 448 Bit Blowfish encryption. Shred any file or folder. Send Secure e-mail. Full command line Support. Zero learning curve.

MDW Password Recovery

MDW Password Recovery

MDWRecovery recovers users and admin passwords from MDW files. MDWRecovery can also recover passwords from Simply Accounting Security files (*.SDW)

AnyPassword Pro

AnyPassword Pro

All passwords in one secure place? AnyPassword Pro is a reliable solution: a hierarchical structure, an advanced password record search, a strong encryption mechanism, and a clear interface. Besides, it can be installed on any portable device.

PCSnapShot Keylogger

PCSnapShot Keylogger

PCSnapShot is a keylogger that records activity on a computer including chats, instant messages, emails, web sites visited, searches, activity on MySpace, the pictures and images posted and looked at, keystrokes being typed and much more.

Avira WinRollBack

Avira WinRollBack

Avira WinRollBack provides maximum security against changes or contamination of any kind. It achieves this by automatically restoring the PCs original state when it is restarted.

TrueBug PHP Encoder

TrueBug PHP Encoder

Protects PHP applications for secure deployment, without exposing the source code. PHP Encoder allows encoding PHP scripts before distributing them. The script code is encrypted before saving.

The Fast File Encryptor

The Fast File Encryptor

Fast File Encryptor is designed for fast processing of extremely large files. It can encrypt or decrypt files, contents of folders and contains a lot of additional tools. Presents a flexible user interface with detailed messages about all operations.

MAXA Cookie Manager

MAXA Cookie Manager

First Cookie Manager supporting the new browser independent cookies (Flash Cookies, Silverlight Isolated Storage) together with conventional cookies of Internet Explorer, Firefox and many more browsers. Allows deleting, viewing, blocking and more.

Mince

Mince

This is an easy to use and very reliable text encryption tool. Right click a text file, select 'Mince-Encrypt', type a password and your file will be secure from unwanted prying eyes. Double-click to decrypt.

TheLaptopLock

TheLaptopLock

If a computer is lost the hardware can be replaced, but the data is priceless. The LaptopLock allows you to remain in control of your data. Encrypt or delete files if the computer is lost, or execute custom instructions.

ID Manager

ID Manager

In the Internet world, you need to memorize a lot of IDs and passwords. ID Manager helps you to manage many passwords and IDs in easy and secure. Smart Paste function automaic fills your IDs and password fields on Web browser.

Whitenoise Computer File Security

Whitenoise Computer File Security

Simply point and click to secure files on your computer's hard drive with lightning fast Whitenoise encryption. Computer File Security is 35-50 times faster and more secure than any comparable product.

CryptoLab

CryptoLab

CryptoLab is a freeware cryptography application for Microsoft Windows, and incorporates text-based encryption through the use of plug-in cipher modules. Advanced features include SMTP email support, a Key Manager and pseudo-random key generation.

Page 5 out of 14    1 2 3 4 5 6 7 8 9 10 11 12 13 14


 
 

 

Products or company names referred to herein are trademarks of the respective owners or mark holders.
Copyright © 2005-2012 TverSoft