New Security Software for Windows
Virtual Safe is a powerful, yet extremely easy to use file encryption program. It utilizes strong and time-proven encryption algorithm (AES) to provide you with peace of mind that your data is safe. Virtual Safe integrates directly with Windows Explorer,...
LameGen is simply a password generator, it will generate passwords from four through infinite characters in length. It can generate in lower case, upper case, numeric, special symbols, or all, depending on the mask you use. Just press Generate and you're...
Most applications under Windows allow you to store their passwords. Examples are the passwords of ISP's, the password of your email client or FTP tool. Once the password is stored, it is hidden under a row of "***" asterisks and cannot be read again. Now,...
The program's detect technology covers from system AutoStartup setting to password stealing action monitor. Automatically up-to-date patches, discovers missing system patches, and deploys them safely. Predifined security policy fasten your PC into real...
Eudora S/MIME Plug-in enables Eudora users to send and receive S/MIME messages. With administrative tasks reduced to the minimum and the intuitive wizards' guidance, the plug-in is easy to use even by an inexperienced user.Requirements:Windows...
Forgot your FTP site password? Despair not! This little utility will recover all FlashFXP passwords for you. Locate the Sites.dat file in your FlashFXP directory, hit the "Decrypt" button and all passwords will be shown. Couldn't be...
Privacy Internet Eraser is a comprehensive Privacy Eraser and History Cleaner Program for most popular browsers, such as Internet Explorer, Opera, AOL, and Netscape. You will be able to manage and delete cookies, picture snapshots, URLs typed, temporary...
WebMail Spy is the perfect solution for monitoring emails on your PC. WebMail Spy allows you to record all POP3/SMTP emails (such as Outlook Express), all America Online emails, and all web based email (such as Hotmail and YahooMail) - all in complete and...
Como watches MS Access databases and monitors connecting user accounts. The application traces every connection and disconnection to a set of database or workgroup information files and records user name, machine name, database file and the connected from...
One of the purposes of MD5 signature is to verify the file integrity. The procedure is simple: the publisher provides the MD5 signature of the file and the user confirms it by calculating the signature again and comparing it to the one provided by the...