Freeware: Only Free Software, Games, Tools, Utilities. Free Download Center Freeware Home New Submit Links Contact Advertise
Business| Desktop| Developer Tools| Drivers| Education| Games| Home & Personal| Internet| Multimedia| Operating Systems| Utilities
 

 


Data Security

 

 SplitSafe  License: Freeware

 
  SplitSafe: Security–Software mit TÜV-Zertifikat SplitSafe protects your data on notebooks and PCs from unwanted access. Comparable to the concept of a pirate´s treasure map that is torn in two parts, SplitSafe divides your data and saves it on two different storage media, e.g. your notebook´s hard disk and a USB memory drive. What makes SplitSafe different from today´s security technologies? Known procedures like encryption and password protection are not safe when it comes to hacker attacks or careless use of passwords. SplitSafe closes this security gap by physically dividing the data onto two storage media and offers data security that has been certified by the German authority for product quality, the TÜV. The data is divided in such a way, that the individual parts do not allow access, reading, changing or reconstruction of the original information. All you have to do for perfect data protection is to keep your mobile storage device, e.g. a USB memory stick, apart from your notebook or PC. How does SplitSafe work? After the installation of SplitSafe an additional virtual hard disk will be available in your Windows system. Once you have connected a mobile storage medium to your notebook or PC you can save the files you want to protect on your virtual hard disk and you can access, copy open, change or delete the files as usual. If you save a file on your virtual SplitSafe drive, the data is automatically divided.

Author:
Living Byte Software GmbH| Date: 23-07-2004 | Size: 2599 KB
  -
 

 Eraser  License: Freeware

 
  Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.

Author:
Sami Tolvanen| Date: 07-01-2002 | Size: 750 KB
  -
 

 Eraser  License: Freeware

 
  Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly.

Author:
Heidi Computers Ltd| Date: 19-01-2003 | Size: 2654 KB
  -
 

 Softtanks Security Software  License: Freeware

 
  Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues. You just need to remember the passwords which you can change any time. It will Protect your Computer from · Unauthorize use by anyone. · You can Start the security system whenever you leave your computer. · It will not allow others to view your data and update them in your absence. · It will stop viruses comming from other people when you are away from your PC. Anyone working on your system will have to provide the proof that he/she is allowed to use that computer. Please give your PC password only to those people whom you have full faith. You need to re-install the software if you forget your passwords. So keep a copy of install software as backup.

Author:
Softtanks.com| Date: 02-08-2004 | Size: 1308 KB
  -
 

 TradUtil  License: Freeware

 
  TradUtil is an editor and repair tool for the CompuTrac and MetaStock 3.01 security pricing data formats. Both end-of-day and intraday file formats are supported. Manipulation of DOP files is supported for compatibility with the CompuTrac data format although many programs no-longer require these to be able to read and write the data. The front end has a file manager/explorer style front end which facilitates copying and moving of data files between directories. The utility uses a standard windows MDI Interface to allow multiple editor and/or directory windows to be open at one time.

Author:
Twaddle Software| Date: 21-08-2003 | Size: 1487 KB
  -
 

 Internet Security Tweak  License: Freeware

 
  Internet Security Tweak is an utility that customizes different features of the Internet Explorer Web browser. It lets you disable individual menu items, disable individual tabs in the Internet Options dialog, change the title caption, toolbar background, and animated icon; change default folders; and replace standard error information pages, etc.

Author:
1st Security Software Center| Date: 24-07-2002 | Size: 733 KB
  -
 

 OpenSSL  License: Freeware

 
  By using the Open SSL 0.9.7c library, developers can write applications that take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An application can detect if data has been modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It is now overseen by an international standards organization. It provides the same capabilities as SSL (data integrity, authenticity, and privacy between client and server), but takes advantage of newer, more advanced cryptographic technology. It is backwards compatible with SSL. The cryptographic library includes a multitude of encryption algorithms. The symmetric, or private key, encryption algorithms offered include Rijndael (now officially the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these algorithms. To compile for the Win32 platform, Perl or compiling under Cygwin is required. Some of the encryption routines/algorithms are covered by patents.

Author:
ComponentSpot| Date: 30-09-2003 | Size: 2879 KB
  -
 

 CleverCrypt Lite (Freeware)  License: Freeware

 
  Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. <p> The instant you save data into a CleverCrypt drive, CleverCrypt automatically scrambles the data before it is saved on the drive. Once you close your drive or turn off your computer, your secure drive is automatically locked. You don’t have to remember to secure your data: CleverCrypt does it for you every time. To access your data again, simply open CleverCrypt and supply the correct passwords to access your confidential information. <p> Even if your whole computer is stolen, your data will remain locked in the virtual drive, safe from prying eyes. Without your passwords, the data is simply not there! <p> CleverCrypt is the perfect security tool for lawyers, doctors, government establishments and any practice dealing with highly sensitive information. <p> You can use CleverCrypt to protect any office documents, including spreadsheets, confidential documents, presentations, emails, client lists, accounting information and scheduling diaries. <p> CleverCrypt Lite is completely free! <p> If you like our product, please consider purchasing the full version to support our work.

Author:
Quantum Digital Security| Date: 24-08-2004 | Size: 3730 KB
  -
 

 Lock Folder  License: Freeware

 
  Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be deleted, damaged or harmed in any other ways. Even if a virus gets introduced to your system, your locked folders will not be detected, infected or harmed. Here is the important part - Lock Folder uses the encryption standards approved by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees.

Author:
Leo van Opstal| Date: 09-08-2003 | Size: 1400 KB
  -
 

 Sure Delete  License: Freeware

 
  Sure Delete is a tool for Windows based computers to completely remove data from your hard drive. No more worrying if your sensitive data can be recovered. No more headaches. Sure Delete is tested safe for FAT12, FAT16, FAT32, and NTFS disk formats, so you can use it in Windows 95, 98, NT 4.0, and Windows 2000 environments without worry. (NT/2000 users must have the appropriate permissions). Sure Delete is packed with features. Besides being able to wipe files Sure Delete now can wipe free drive space. So even if you forgot to delete the file via Sure Delete, you can just wipe the empty HD space, and you can be sure its gone. Another feature is the ability of the user to choose speed/security ratio. If you have a lot of time on your hands you could use the most secure but also the most time consuming type of wiping. However if you are short on time, and all you need is to prevent half educated snoops from recovering your data then you don't need as much security and you can set Sure Delete to use a little less secure but faster method of wiping. There are many more features which you'll just have to download Sure Delete to discover.

Author:
Michael L| Date: 18-11-2000 | Size: 427 KB
  -
 

 R-Firewall  License: Freeware

 
  R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages. Automatic configuration during setup allows you securely surf the Internet right after the software installation. Mobile users can create multiple and easily switchable configurations for specific network environments (Internet surfing at home, office local networks, or public Wi-Fi spots).

Author:
R-tools technology Inc.| Date: 23-12-2004 | Size: 3399 KB
  -
 

 FitoNT  License: Freeware

 
  WRONG....In today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers, unexpected hard drive or hardware crashes, and any other dangers that lurk out there. With FITONT by your side, as soon as your file is edited and changed, it is shuffled to a safe backup of your choice. The real time protection of FITONT is a must in today's day and age of constant data corruption.

Author:
B & H Company| Date: 10-10-2002 | Size: 3752 KB
  -
 

 KGB Free Key Logger  License: Freeware

 
  Free KGB Key Logger is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window. Thus, this software combines two very important qualities - it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and KGB Spy. Free KGB Key Logger is absolutely free, contains all basic features described above and is intended for non-commercial use at home as a keylogger. KGB Keylogger and KGB Spy is a well known, highly praised IT security oriented software that goes beyond recording keystrokes. While it was originally created for corporations and small businesses, it is becoming increasingly popular for home use as well. The main reason for that is extended capabilities of KGB Spy or KGB Keylogger. Industry experts regard KGB Spy and KGB Keylogger as the best low-cost non-invasive software from the keylogger family. All major corporations use keyboard loggers to prevent loss of data and to monitor employees' activity; large part of them chose KGB Keylogger from www.refog.com. KGB Keylogger is sold on

Author:
ReFog Software| Date: 09-12-2004 | Size: 1279 KB
  -
 

 Stop Thief Screen Saver  License: Shareware

 
  Pixel Paradox makes NO claim that STOP THIEF will prevent any kind of criminal activity whatsoever, under any circumstances. It has NO ability to detect motion, or call the police. Everything is FAKE. It is comparable to "the electronic barking dog", which is not really a dog, but just a recording of a barking dog. DO NOT RELY ON THIS PRODUCT TO PROTECT YOUR PROPERTY, OR OFFER ANY KIND OF HOME SECURITY.

Author:
Pixel Paradox| Date: 05-01-2003 | Size: 2100 KB
  -
 

 Advanced Security for Outlook  License: Freeware

 
  Get rid of the annoying security alerts in Microsoft Outlook 2000, 2002/XP and 2003! Advanced Security for Outlook allows you to determine the violator and specify the permanent action for this program (and only this!) : allow access, block access or run the default Outlook handler. In future, the specified action by you will be executed automatically and Outlook Security will not annoy you with messages about trying to access e-mail addresses you have stored in Outlook. The standard security system has two drawbacks: first, it does not allow users to determine the source of the treat, second, a lot of other applications developed before the security system appeared can be really annoying due to their constantly appearing warnings. Since the security system is constantly updated, a "fresh" program can get into the list of such applications. There is still another drawback resulting from the first two: the user can temporarily disable the security system thus allowing any other program also to work without any security system restrictions. Our software solves all the above problems providing the information not only about the type of alert, but also about what program caused it and makes it possible to specify for this (and only this!) program the permanent action: allow access, block access or run the default Outlook handler. Later on you can change or delete the action. It should be mentioned that there is a range of tasks (which is rather narrow) that an Outlook developer can implement only through the use of the object model and its "blocked" methods. In this case Advanced Security is an indispensable program when using such an application.

Author:
MAPILab Ltd.| Date: 03-09-2004 | Size: 925 KB
  -
 

 CHAOS Compressor  License: Freeware

 
  Data compression utility, which allows you to quickly open, create, and modify your archives.

Author:
Safe Soft Corporation| Date: 22-08-2004 | Size: 491 KB
  -
 

 ServerMask  License: Shareware

 
  A major security issue is the exposure of a Web servers identity via its HTTP header. Broadcasting this data makes it easier for a potential intruder to complete their first hacking task: identifying your operating system and Web server. ServerMask 2.0 obscures the identity of a Windows Web server by removing the most obvious signs that you are running IIS. This ISAPI filter removes or modifies unnecessary HTTP and SMTP response data.

Author:
Port80 Software| Date: 01-11-2002 | Size: 612 KB
  -
 

 Keyboard Spectator Free  License: Freeware

 
  Keyboard Spectator is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window. Thus, this software combines two very important qualities - it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger Keyboard Spectator - Free, Standard and Pro. Keyboard Spectator Free is absolutely free, contains all basic features described above and is intended for non-commercial use at home as a keylogger. Keylogger Keyboard Spectator Standard and Pro is a well known, highly praised IT security oriented software that goes beyond recording keystrokes. While it was originally created for corporations and small businesses, it is becoming increasingly popular for home use as well. The main reason for that is extended capabilities of Pro or Standard versions. Industry experts regard Keyboard Spectator Standard and Pro as the best low-cost non-invasive software from the key logger family. All major corporations use keyboard loggers to prevent loss of data and to monitor employees' activity; large part of them chose Keyboard Spectator from www.refog.com Keyboard Spectator is sold on a try-before-you-buy basis, which means there are no up front costs. You are given substantial time period to try and test the software to make sure this is the application you've been searching for. Download Keyboard Spectator now.

Author:
ReFog Software| Date: 2-82-2004 | Size: 1279 KB
  -
 

 ActMon PWL Password Finder (WASP)  License: Freeware

 
  WASP displays all passwords of the currently logged in user that are stored in the Microsoft PWL file password database. It allows the convenient management (i. e. supervision and /or deletion) of this file to improve the security / privacy of your PC. It is also very useful for educational purposes about computer security. The documentation also contains general information about the PWL files and their security. This software is designed for Win 95 / 98 / ME. Real Freeware.

Author:
Activity Computer File PC Network Monitoring| Date: 14-12-2004 | Size: 1351 KB
  -
 

 ABC CHAOS  License: Freeware

 
  What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.

Author:
Security Resources Group| Date: 10-01-2003 | Size: 368 KB
  -
 

 Password Depot  License: Freeware

 
  Password Depot is a powerful and user-friendly tool to securely manage your passwords. Take advantage of the following features: -Up-to-date security algorithms for the encryption of your data -Protection by virtually uncrackable passwords, generated by the integrated password generator -Top bar for easy navigation -Auto-completion of password fields -Easy management of all your passwords -Backup and export tools for your data

Author:
Stefan Richter| Date: 16-03-2003 | Size: 2360 KB
  -
 

 sqlDESKTOP  License: Freeware

 
  sqlDESKTOP is a computerized manual filing system arranged just like an office. Users can organize information (files, data on CD ROM or DVD, WEB pages, emails, newsgroups etc... ) they access regularly using familiar, everyday office supplies (folders, binders, filing cabinets, etc.). It's easy because you don't have to remember the exact name of the document or where you put it. Just visually locate it in an ordinary office environment.

Author:
P.I.M.| Date: 04-03-2003 | Size: 19401 KB
  -
 

 Oracle Security Check  License: Freeware

 
  Oracle Security Check will connect to your database and test against an internal list of standard usernames and passwords. If any are found, they are reported as potential security holes.

Author:
eNSYNC Solutions| Date: 21-12-2002 | Size: 400 KB
  -
 

 Keyboard Spectator Lite  License: Freeware

 
  Keyboard Spectator is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window. Thus, this software combines two very important qualities - it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are two versions of Keyboard Spectator - Lite and Pro. Keyboard Spectator Lite is free, contains all basic features described above and is intended for non-commercial use. Keyboard Spectator Pro is a well known, highly praised IT security oriented software that goes beyond recording keystrokes. Originally created for corporations and small businesses, it is becoming increasingly popular for home use. The main reason for that is the extended capabilities of Pro version.Unlike KS Lite, it can run invisibly in the background, record names of all executed programs, supports multi-user operating systems, has multi-lingual support, provides password reminder option and is highly stable and secure. Industry experts regard Keyboard Spectator Pro as the best low-cost non-invasive software from the key logger family. All major corporations use keyboard loggers to prevent loss of data and to monitor employees' activity; large part of them chose Keyboard Spectator from www.refog.com Keyboard Spectator is sold on a try-before-you-buy basis, which means there are no up front costs. You are given substantial time period to try and test the software to make sure this is the application you've been searching for. Download Keyboard Spectator now.

Author:
ReFog Software| Date: 05-10-2003 | Size: 439 KB
  -
 

 [email protected] NTFS Reader for DOS  License: Freeware

 
  NTFS Reader is a data recovery tool that provides read access to NTFS drives from MS DOS environment. The FREEWARE utility supports long filenames, compressed and fragmented files. You can preview files on NTFS and copy them from NTFS to FAT volumes or network drives.

Author:
[email protected] Data Recovery Software| Date: 17-06-2003 | Size: 788 KB
  -
 

 ABC Security Protector  License: Freeware

 
  This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads.

Author:
Ixis Ltd| Date: 01-11-2004 | Size: 563 KB
  -
 

 Chilkat XML Messaging  License: Freeware

 
  Makes adding peer-to-peer XML messaging to your distributed applications easy. Integrates with Chilkat SSL, Chilkat Real-Time Compression, and Chilkat Crypt for automatic compression and security. Send and receive XML messages. Integrates with Chilkat SSL for secure messaging over SSLv3 or TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or without line-endings translated), Base64, Quoted-Printable, compressed, encrypted, etc. Send and receive raw binary data at the socket level if desired.

Author:
Matt Fausey| Date: 04-03-2002 | Size: 1000 KB
  -
 

 HomeWatcher Lite  License: Freeware

 
  HomeWatcher is an "intelligent" WebCam software program. It can sense changes in the image of an attached camera, and take action: upload the image to a Website, send it to you by e-mail, initiate a loal sound alarm or start any other program. This way you can use it as a low-cost ye highly functional home security system.You can also use it to keep an eye on your dogs, birds or kids when you are away. At work, you can see how they are behaving

Author:
HomeWatcher.Com| Date: 28-01-2001 | Size: 1232 KB
  -
 

 Disk Investigator  License: Freeware

 
  Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Undelete previously deleted files. Verify the effectiveness of file and disk wiping programs.

Author:
Kevin Solway| Date: 03-04-2003 | Size: 522 KB
  -
 

 TrafficEmulator  License: Freeware

 
  Nsasoft Network TrafficEmulator generates IP/ICMP/TCP/UDP traffic from clients to server to stress test servers,routers and firewalls under heavy network load.It is a very simple and fast program which can simulate client activity.

Author:
Nsasoft LLC.| Date: 10-01-2005 | Size: 332 KB
  -

| 1 | 2 | 3 | 4 | 5 |

 

 
Sponsored Shareware

Universal Explorer
Powerful
windows explorer file manager and viewer.

File Manager - Windows Explorer Replacement

Disk Size Manager
Analyses hard disk space and collects statistics.

Powerful Disk Space Manager

Web Data Extractor
Email marketing software to extract specific contact.


Web Data Extractor

BackStreet Browser
Powerful Offline Browser - Download Entire Website.

Offline Browser

ListMotor
Email List Manager, operates with email stored in simple text files or csv files.

Email List Manager

 

www.DirFile.Com - Freeware Software Download

Ads: Webmaster Tool - Download Junction - Rafasys ElecDir - Direct Email - HealthInfo - Web Spider