Microsoft UAM 5.0.11 updated
...
...
From the developer: "Secure Notebook helps to find stolen laptop computers by using a hidden background application to send Arin whois queries and other useful information to an email account. Just enter your email address, SMTP server and you're ready to...
SplashID Password Safe is a personal identification organizer that safely and securely stores all of your personal identification information including user names, passwords, credit cards, calling cards, bank accounts, PINs, and more. Information is...
The MacLocksmith is a useful application to save your files from indiscreet eyes. It protects your files/folders quickly by using a very strong encryption method and a password. The MacLocksmith supplies also a second, soft and fast, protection system....
SecretService enables the use of strong encryption techniques in all mac OSX aware applicaitons including Mail and iChat ensuring your privacy and peace of mind. Just move SecretService into you /Applications directory and Logout and SecretService will...
An utility to code and decode texts using Vigenere's method.What is new in this release:Panther (MacOS 10.3) compatibility.Requirements:Mac OS 9 - OS...
In response to the threat of a new Mac virus that is said to completely wipe out one's Home directory, DownloadCheck checks for applications in user's Downloads folder. Although its highly unlikely Mac users will find a MP3 or other document type...
FileMaker offers many external methods of opening and accessing stored data. Given the many workarounds developers use to customize their solutions, this also opens security risks ranging from mild to severe. iCanary serves a developer need to mine...
Safer Workstation is designed to turn removable devices such as an iPod or thumb drive into a user account "key". Even if someone has their computer require a password, anyone who knows the password can log in to the account -- passwords can be stolen....
WebTunnel dynamically hides your Internet address and protects your personal info and activity in real-time. A no-reboot USB key option for stealth works in any network. It enables totally anonymous surfing, chat, file sharing, NNTP, HTTP, and SOCKS....