Encrypted Magic Folders 05.09.3
Automated and transparent...
Automated and transparent...
An unchecked buffer exists in the Still Image Service' on Windows 2000 hosts. A locally logged-on user can execute malicious code that will use the still image service to escalate their permissions equal to that of the Still Image Service, namely,...
Attractive tabbed-dialog interface features secure encryption to prevent unauthorized access of all type of files and particularly of your image collection. "To protect Your Personal Image collection"Secure Multi Image Viewer Included: You can encrypt...
This update resolves the 'HyperTerminal Buffer Overflow' security vulnerability in Windows 2000. If you receive and open an HTML e-mail message that contains a particularly malformed Web address (URL), the URL can be used to exploit this vulnerability and...
Trivia Standard allows creating virtual encrypted drives that are accessible only after the correct password insertion. The virtual disk created with Trivia is visible as a normal logical partition in the system and may be used as usual. Trivia allows...
Titus Message Classification provides classification services for Microsoft Outlook messages. A small toolbar is added to the Outlook toolbar in the New Message window. Users select the appropriate classification label from the dropdown for their message....
From the developer: ""The StealthNetWall(TM) firewall is a true IP Packet filter. It will prevent PINGS and Trace Routes to your computer. It is simple to install, and there is no complicated configuration needed to protect you from the hackers on the...
Selfcontained filencryption for USB flashdisks or other removable media. No installation needed. Just copy the program to your flashdisk and use it on any Windows 2000 or Windows XP computers. Very handy if you always carry your flashdisk with you. No...
The best program for self-decrypting archives creation and data wiping. Very powerful tool for making data backups. How does it work? User's data is compressed and encrypted with a key made from a pass phrase and a key file. Then executable module is...
The program's detect technology covers from system AutoStartup setting to password stealing action monitor. Automatically up-to-date patches, discovers missing system patches, and deploys them safely. Predifined security policy fasten your PC into real...