Filetrix


Search in:   Description   Keywords   Title   Company


Search for:    


Match:   Any word   All words   Exact phrase



Category:  Security & Privacy::Other Sort by:    Title     Date     Size     Company     Category  

Matches:  185 First     Previous       Page 15 of 19       Next     Last

Metamorphosec Checksum File Creator
Shareware
Metamorphosec Checksum File Creator can create one or multiple checksum files, either in single or batch processing. It supports MD5, SHA1, SHA256, and SHA512. It accommodates to specify name of checksum file in 2 styles, i.e. with file name or folder name (e.g. filename/foldername.checksum.sha1) and without file name or folder name (e.g. SHA1SUM or SHA1SUMS). It also accommodates to add comments section in the checksum file.

Metamorphosec File Hash Checker
Shareware
Metamorphosec File Hash Checker can calculate and verify hash from single file. It supports 4 popular hash algorithms, i.e. MD5, SHA1, SHA256, and SHA512. It also can verify hash from checksum file. It supports two naming of checksum files, i.e. with file name (e.g. filename.sha1) and without file name (e.g. SHA1SUM and SHA1SUMS).

Ivacy for Mac
Shareware
Imagine the hassle to sign in and sign out every time on a different device for staying protected online. Through Ivacy VPN service, you can connect up to 5 devices at the same time. A single Ivacy subscription helps you protect yourself and your loved ones. All Plans unblock BBC iPlayer, Disney+, Amazon Prime, Hulu & 7 major Netflix Regions including US, FR, JP, UK, Aus, De & Ca.

Remo Drive Wipe
Demo
There may be terrible consequences if your confidential data falls into the wrong hands. Permanently erasing data on your hard drive using format, SHIFT DELETE might not serve the purpose. Remo Drive Wipe is equipped with advanced data scrubbing algorithms that overwrite data several times in various patterns, on level with techniques used by department of defence. Use this data eraser to wipe your computer and let go of your insecurities.

XolidoSign
Freeware
XolidoSign allows you to digitally sign and/or timestamp all the documents you need. It includes smart verification of electronic signatures, timestamps and files. (PDF native Signature, Word, Images, Excel datasheet, Databases, Videos ). Greatly simplified process. It also gets your shipping costs reduced using electronic documents, maintaining security in your electronic transactions (invoices, contracts, posting notes...).

Active@ ZDelete
Freeware
Active@ ZDelete helps to protect your privacy by preventing undesirable people to access private deleted data against your will. This secure delete software allows you to permanently delete files, drives and folders without any possibility of data recovery. Active@ ZDelete conforms to the US Department of Defense clearing and sanitizing standard DoD 5220.22-M.

Tenorshare iPhone Password Unlocker
Shareware
Tenorshare 4uKey-iPhone Password Unlocker is capable of removing forgotten password including Touch ID and Face ID info in a few minutes, no matter it is a 4-digit passcode, 6-digit passcode, custom numeric code, or alphanumeric passcode.

Metamorphosec File Hash Generator
Shareware
Metamorphosec File Hash Generator can generate hashes from specified file(s). It supports 95 hash algorithms. It also supports file properties and hex dump. It accommodates to sort results by algorithm name and length, either in ascending or descending order. It also accommodates to set generated hashes in uppercase or lowercase. The results can be saved in Text or HTML format.

Password List Generator
Commercial
Password List Generator has following features: - Create file with unique random passwords - Calculate hash of password files and hash of passwords - Split password list file in files with desired number of passwords Usage is very easy and a manual also included in application.

CleverControl Employee Monitoring
Freeware
Free remote monitoring software for employee tracking in an office. CleverControl can record all activity that is carried out on a computer by an employee including all running applications and keystrokes in all of them, periods of activity and inactivity of a user as well as all online actions: visited sites, search engines inquiries, and monitor social networks (Facebook, Twitter etc.). Recorded data can be seen remotely via secure web-account


Matches:  185 First     Previous       Page 15 of 19       Next     Last