These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network. Flagship software application Anti- keylogger(TM) for Microsoft® Windows® NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN.
Flagship software application Anti- keylogger(TM) for Microsoft® Windows® 95/98/ME/NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN. These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network.
While deleting and destroying data WINSWEEP uses a 7-level process adapted to the specifications of the DoD-document 5220-22-M, National Industrial Security Program Operating Manual (American Ministry of Defense). With strong cryptography you can comfortably encode files or complete directories.
19. Strong File Encryption Decryption Utility
PrimaSoft Strong File Encryption and Decryption utility is a Windows software that allows you easily and quickly to encrypt and decrypt selected files or folders on your computer using the latest industry standard strong encryption algorithms: Strong File Encryption Decryption software supports Compression and Decompression: You can use the most popular ZIP archive file format within the utility. DetailsDownload trialBuy now ($50.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, Win95,Win98,WinME,WinNT 4.x,Windows2000,WinXP,Windows2003
Vendor: PrimaSoft PC, Inc.
21. BlackBytes Security for .NET
Implements managed role-based security for.NET Framework. The Security for.NET enables you to manage Windows security. If you want an application to access any of Windows securable objects, you must make sure that both Code Access Security policy and the DACL settings grant the appropriate access permissions, both to the assembly (or assemblies) constituting the application as well as the user or users you want to be able to run it. DetailsDownload trialBuy now ($139.00) Find similar
Vendor: BlackBytes Software & Consultancy, Ltd.
22. CryptoSystem Personal
It combines easy-to-use interface and seamless Windows integration with the power of Advanced Encryption Standard, which has been adopted by NIST as a Federal Information Processing Standard and is one of the strongest encryption methods available. DetailsDownload trial (Full version: 283.9 KB) Buy now ($15.00) Find similar
Platform: Windows 2000, Windows XP
Vendor: Sauritus Computing
A master of the Iron Thread can withstand, with no consequences, the strongest of blows, including ones with heavy objects or cold steel arms, bend thick iron rods with his hands, and his rooting power is so strong that he can not be displaced by a group of strong people.
DetailsBuy now ($23.95) Find similar
Platform: Works on any operating system that has a program to view PDF files.
Vendor: Shaolin Kung Fu Online Library