Filetrix


Search in:   Description   Keywords   Title   Company


Search for:    


Match:   Any word   All words   Exact phrase



Category:  Security & Privacy Sort by:    Title     Date     Size     Company     Category  

Matches:  1127 First     Previous       Page 7 of 113       Next     Last

SterJo Wireless Passwords
Freeware
Ever happened to you that you forgot the WiFi password on your PC that you recently changed into a complex combination of letters, numbers and symbols just to be more safe regarding your wifi security? This is where SterJo Wireless Passwords solves this issue for you. SterJo Wireless Passwords is a free password recovery software which you can use to recover your lost wireless network passwords.

BestCrypt Container Encryption
Shareware
To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe

BestCrypt Volume Encryption
Shareware
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, while also working on RAID, UEFI and GPT partitions. Jetico's encryption software provides protection from physical threats, such as lost computers and USB sticks, by utilizing a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes.

Stop PORN
Shareware
STOP P-O-R-N is an easy-to-use application developed to block access to content-sensitive websites oriented at adults. Especially aimed at parents who want to protect their children from loading inappropriate content while browsing the Internet, STOP P-O-R-N doesn't assault users with an avalanche of features. WORKS ON ALL WEB BROWSERS! SHUTS DOWN BROWSERS FAST WHEN PORN IS DETECTED!

Aiseesoft iPhone Unlocker for Mac
Shareware
Forgot your iPhone passcode? Want to bypass Screen Time password on your parents' iPhone? Forgot Apple ID or pass word? Aiseesoft iPhone Unlocker for Mac can help you out by wiping the 4-digit, 6-digit, Touch ID or Face ID, and unlock iPhone easily.

PDF Postman
Shareware
PDF Postman addon for MS Outlook gives ou an easy way to send private email messages and files in a PDF file encrypted with strong AES-256 encryption. Since nearly eveyrone already have a PDF viewer, they only need to click on the encrypted pdf file and enter a password. PDF Postman Works across devices and platforms. It's easy for recipients! No expensive or complex S/MIME certificates to install. Download a free trial of PDF Postman.

SterJo Internet Explorer Passwords
Freeware
SterJo Internet Explorer Passwords will reveal all passwords and usernames stored by Microsoft Internet Explorer. For each password it will show the URL and it will find the storage location.

Encrypt Care
Freeware
Encrypt Care is an easy to use, but powerful encryption software which allows user to encrypt or decrypt text and files in batch mode, generate, verify and export ckecksums. Encrypt Care allows you to protect your data using the most powerful encryption algorithms, as well as protect your messages. Flexible options will help you to encrypt and decrypt your data in a matter of seconds.

Metamorphosec Checksum File Creator
Shareware
Metamorphosec Checksum File Creator can create one or multiple checksum files, either in single or batch processing. It supports MD5, SHA1, SHA256, and SHA512. It accommodates to specify name of checksum file in 2 styles, i.e. with file name or folder name (e.g. filename.checksum.sha1 or folder.checksums.sha1) and without file name or folder name (e.g. SHA1SUM or SHA1SUMS). It also accommodates to add comments section in the checksum file.

Metamorphosec File Hash Checker
Shareware
Metamorphosec File Hash Checker can calculate and verify hash of a file. It supports 4 popular hash algorithms, i.e. MD5, SHA1, SHA256, and SHA512. It also includes additional tools to scan folder, create checksum files, check file hash from checksum file, compare hashes of two files, and generate string hash.


Matches:  1127 First     Previous       Page 7 of 113       Next     Last