|
|||
TekRADIUS is a RADIUS server for Windows. You're free to use freeware version for both commercial and personal use. TekRADIUS tested on Microsoft Windows (Vista, Windows 7/8/10, 2008-2019 Server). |
|
|||
TekRADIUS LT is a RADIUS server for Windows. You're free to use freeware version for both commercial and personal use. TekRADIUS LT tested on Microsoft Windows (Vista, Windows 7/8/10, 2008-2019 Server). |
|
|||
Application for encryption and decryption of files with symmetric key. Features: * Encryption based on a chaotic pseudo-random generator. * Secure file deletion. * High speed. * Multi thread. * Multi-language. * Multi-platform. * GUI / Shell. * Documentation. * Open source. Requirements: * Java-8 |
|
|||
Text Encryption Application. Features: * Multi-platform. * Java-8. * New find and replace functions. * New undo and redo functions. * New copy, cut, and paste functions. * Open-source. Requirements: * Java-8 |
|
|||
Ever happened to you that you forgot the WiFi password on your PC that you recently changed into a complex combination of letters, numbers and symbols just to be more safe regarding your wifi security? This is where SterJo Wireless Passwords solves this issue for you. SterJo Wireless Passwords is a free password recovery software which you can use to recover your lost wireless network passwords. |
|
|||
STOP P-O-R-N is an easy-to-use application developed to block access to content-sensitive websites oriented at adults. Especially aimed at parents who want to protect their children from loading inappropriate content while browsing the Internet, STOP P-O-R-N doesn't assault users with an avalanche of features. WORKS ON ALL WEB BROWSERS! SHUTS DOWN BROWSERS FAST WHEN PORN IS DETECTED! |
|
|||
SterJo Internet Explorer Passwords will reveal all passwords and usernames stored by Microsoft Internet Explorer. For each password it will show the URL and it will find the storage location. |
|
|||
The 'USB Safe Guard' product converts regular USB to secure USB. This secure USB can have an expiration date and expiration count policy. Secure USB can be opened with read-only or read/write privileges. In addition, administrators can remotely control the use of secure USB. You can also receive USB usage logs by email. |
|
|||
File Privacy has following features: - File decryption/encryption - File compare for cryptography - Create random key hex string and save as file - Hex string based decryption/encryption |
|
|||
Password List Generator has following features: - Create file with unique random passwords - Calculate hash of password files and hash of passwords - Split password list file in files with desired number of passwords Usage is very easy and a manual also included in application. |