|
|
|
ThunderStore introduces the first Information Integrity Solution to manage, monitor, administer and audit the total information flow within borderless networks. X-Tra Secure offers transparent information control, including totally centralized network administration. The unique and strategic position of X-Tra SecureT (below the operating system) is characterized by the fact that the information and data resources are tagged with policies instead of the user. |
« read more about X-Tra Secure 1.3 |
|
|
RECOMMENDED DOWNLOADS IN THIS CATEGORY
|
|
|
» Accent Excel Password Recovery 2.60
|
Accent Excel Password Recovery is a small but very powerful tool. It can recover lost passwords for any document created and protected by Microsoft Excel 97/2000/XP. Its easy-to-use graphic interface and context help are provided to lead you through each ... |
|
AccentSoft Utilities | Shareware | Windows 2000/2003/9x/XP | November 9, 2007 | Downloads: 1330 |
Date added: Jan 17, 2008 |
» Details |
|
|
» Crypto Pilot 1.00
|
Crypto Pilot will protect your files and folders from unauthorized access. Just drag and drop files to protect your data. ... |
|
Two Pilots | Shareware | Windows (All) | December 18, 2003 | Downloads: 942 |
Date added: Oct 09, 2005 |
» Details |
|
|
» iSafeguard Professional 4.5.0
|
iSafeguard Professional is easy to use software that secures your files, emails, instant messages and backup data with strong encryption and digital signature. In addition the secure text editor is a perfect tool to store your passwords and other sensitiv ... |
|
MXC Software | Shareware; $24.95 to buy | Windows (All) | February 20, 2005 | Downloads: 932 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Password Hound 1.0
|
Password Hound will store your passwords with minimal effort from the user, yet maintain ease of use. ... |
|
Sault Custom Programming | Shareware | Windows (All) | July 17, 2002 | Downloads: 903 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Cynapse MailCryptor 1.72
|
Cynapse MailCryptor is a tool to create encrypted, self decrypting HTML documents out of plain or formatted text. These encrypted HTML documents could be sent as private messages via e-mail or could be uploaded to websites for restricted access to the inf ... |
|
Apurva Roy Choudhury | Shareware | Windows (All) | September 27, 2002 | Downloads: 959 |
Date added: Oct 09, 2005 |
» Details |
|
|
» ABI- CODER 3.6.1.4
|
ABI- CODER is file encryption software that uses a 448 bit Blowfish and 168 bit 3DES encryption algorithms. It allows you to encrypt files and folders with just a click of the mouse. It also allows you to create self-decrypting files that allow you to sen ... |
|
ABI- Software Development | Shareware; $12.99 to buy | Windows (All) | June 26, 2003 | Downloads: 1243 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Web Encrypt 2.2a
|
Web Encrypt is a web development tool for protecting and compressing web sites and web pages. It is based on 3 scientific papers we presented on IT and Computer Science conferences, sponsored by Microsoft, Dell, Cisco, and others. You can encrypt and decr ... |
|
e-Dreamscape | Shareware | Windows (All) | June 17, 2002 | Downloads: 943 |
Date added: Oct 09, 2005 |
» Details |
|
|
» CryptoExpert 2005 Professional 6.2.3
|
CryptoExpert system mounts a volume file to create a `virtual drive` that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted, encrypted, and written to the volume file. At ... |
|
SecureAction Research, Ltd. | Shareware; $59.95 to buy | Windows 2000/XP | October 1, 2005 | Downloads: 916 |
Date added: Oct 09, 2005 |
» Details |
|
|
» wodCrypt 1.2.4
|
wodCrypt is a lightweight component that provides strong encryption for your applications. It provides support for most common crypto algorithms such as AES, DES, TripleDES, Blowfish, Cast, RC2, RC4, and RC5. ... |
|
WeOnlyDo!, Inc. | Commercial Demo; $139.00 to buy | Windows (All) | February 24, 2005 | Downloads: 996 |
Date added: Oct 09, 2005 |
» Details |
|
|
|
| | | | Downloads: 892 |
Date added: Oct 09, 2005 |
» Details |
|
|
|
» MD5 Fingerprint 1.1
|
MD5 Fingerprint is a simple application that can be used to calculate the MD5 hash for any file, and then compare it to another one. It`s easy enough to compare 2 hashes just looking at them but MD5 hashes have 32 characters all mixed with letters and num ... |
|
Ricardo Amaral | Open Source | Windows 2000/9x/XP | June 18, 2005 | Downloads: 969 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Evidence Eliminator 5.053
|
Evidence Eliminator employs the exact same sector analysis technology as available in ultra-high-priced tools available to law-enforcement agencies, for example the FBI. After identifying and analyzing the unwanted data hidden in your drives, Evidence Eli ... |
|
Robin Hood Software Ltd. | Shareware | Windows (All) | October 1, 2000 | Downloads: 1007 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Accent Word Password Recovery 2.51
|
Accent Word Password Recovery is a small but very powerful tool. It can recover a lost password for any document created and protected by Microsoft Word 6.0/95/97/2000/XP/2003. Its easy-to-use graphic interface and context help are provided to lead you th ... |
|
AccentSoft Utilities | Shareware | Windows 2000/2003/9x/XP | April 17, 2008 | Downloads: 1256 |
Date added: May 13, 2008 |
» Details |
|
|
» BlackICE PC Protection 3.6.cqy
|
BlackICE PC Protection delivers bulletproof intrusion detection and personal firewall protection to your PC. It scans your DSL, cable, or dial-up Internet connection looking for hacker activity, much like antivirus programs scan your hard disk looking for ... |
|
Internet Security Systems | Shareware; $39.95 to buy | Windows 2000/2003/9x/XP | April 9, 2008 | Downloads: 1000 |
Date added: May 13, 2008 |
» Details |
|
|
» CryptoExpert 2005 Lite 6.2.1
|
CryptoExpert system mounts a volume file to create a `virtual drive` that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted, encrypted, and written to the volume file. At ... |
|
SecureAction Research, Ltd. | Freeware | Windows 2000/2003/XP | September 7, 2005 | Downloads: 968 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Win-Spy Windows Monitor 7.3
|
Win-Spy is a completely invisible key recorder and screen capture utility that secretly captures anything the user sees or types on the keyboard. Win-Spy operates in stealth mode and users are unaware of its existence. Special hotkey and login is necessar ... |
|
BC COMPUTING | Shareware | Windows (All) | September 15, 2003 | Downloads: 959 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Encryption Workshop 3.0 Build 506423
|
Encryption Workshop includes file and folder encryption and decryption tools. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ... |
|
Newera Software Technology Inc. | Shareware; $29.95 to buy | Windows (All) | June 23, 2005 | Downloads: 1029 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Stunnel 4.21
|
Stunnel is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in th ... |
|
Michal Trojnara | Freeware | Windows 2000/9x/XP | October 28, 2007 | Downloads: 933 |
Date added: Jan 17, 2008 |
» Details |
|
|
» PassMonster 2.25
|
PassMonster will perform the insurmountable task of storing, protecting and managing your passwords allowing you to click once and get all the password-related information you need without having to be afraid of data vulnerability. It features easy to use ... |
|
Kamatoz.Computing | Shareware; $24.95 to buy | Windows (All) | September 28, 2004 | Downloads: 987 |
Date added: Oct 09, 2005 |
» Details |
|
|
» Omziff 3.0.9
|
Omziff is a straightforward encryption utility that uses various cryptographic algorithms to encrypt and decrypt textual files. These algorithms include: Blowfish, Cast128, Gost, IDEA, Misty1, Rijndael, and Twofish. It also generates random passwords, and ... |
|
xtort.net | Freeware | Windows 2000/9x/XP | April 18, 2007 | Downloads: 944 |
Date added: Oct 27, 2007 |
» Details |
|
|
|
|