Best Encryption & Decryption Software for Windows 95
Clock Guard prevents tampering with the computer clock. It insures integrity of file time or date stamps, employee sign-in or sign-out times, and computer use registration. You have several levels of protection, including simply blocking access to the...
Dekart Private Disk is a reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides and restricts access to your programs and data. Dekart...
HideIt is the best way to provide desktop level security and...
This desktop encryption software stops prying eyes. PC users can now secure documents in such a way that sensitive files on hard drives and e-mail attachments are totally unreadable to unauthorized users. Users can drag and drop sensitive files into the...
Ap PDF Password Recovery can be used to decrypt protected Adobe Acrobat PDF files, which have owner password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing...
Window Hide Tool allows you to quickly hide a window of any application. You can set hotkeys for basic program commands: hide a window, hide all windows, and hide a group of windows. Or you can hide a window by clicking an icon in your tray. Moreover, you...
Terminus 6 - Leave No Traces - The ultimate data destruction toolkit. Terminus 6 brings professional IT security/COMSEC grade destructive power to the masses: erase files, slack space, free space, protect your privacy, destroy chunks of data even if...
Ekb Key Logger is a program designed to keep track of how your PC is used while you are away. Unlike most other so-called free keyloggers, this one will start each time the PC starts and has a log file that is easy to read. Everything that is typed will...
CyberShredder is a quick, safe and handy utility that lets you erase confidential files from your computer permanently. Normal file deletion will remove a file's directory entry and allocation table information. The actual disk clusters that contained the...
VPN (Virtual Private Network) is a technology to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. In other words VPN is your personal...