最近加入的  - 

其他安全软件 免费下载现在安全软件和应用程序。防病毒和反间谍软件
Kruptos 2 (x64 bit) 7.0.0.0

Kruptos 2 (x64 bit) 7.0.0.0  5103 

Kruptos 2 Professional for Windows x64 is an easy to use encryption program that uses 256-bit encryption to password protect your private files and prevent them from being modified, read or even accessed without the correct password. With Kruptos 2 Professional you can password protect all your sensitive personal and commercial information including your photos, movies, credit card data, tax returns or any other private document.

RogueKiller 64-bit 14.7.4.0

RogueKiller 64-bit 14.7.4.0 免费版 5102 

RogueKiller x64 offers multilingual support, uses low CPU and RAM, and carries out a scan job rapidly. We have not come across any issues throughout our evaluation, as the app did not hang or crash. Although it is not particularly intuitive or attractive, RogueKiller x64 proves to be a pretty powerful tool for detecting and removing suspicious activity from the system.

Free EXE Lock 5.0.5

Free EXE Lock 5.0.5 免费版 5101 

Free EXE Lock provides optional encryption modes to lock your EXE programs: Speed priority - faster but not compressed; Security priority - slower mode, secure & compressed. It is able to lock executable programs on your computer to password-protect any executable file from non-authorized execution.

FoneEraser 1.0.26

FoneEraser 1.0.26  5101 

Aiseesoft FoneEraser is an exclusive eraser for iOS devices. It allows you to remove all data from your iPhone/iPad/iPod completely and permanently. Those data may be contacts, text messages, photo Albums, videos, music, settings, documents and so forth. And the erasing level is optional (Low level, Medium level and High level). In addition, it functions on two or more devices at the same time, which will save lots of time.

AVG Family Safety 2012.715

AVG Family Safety 2012.715  5101 

Help prevent online bullying and cyber-grooming Know if your child is a victim of cyber bullying or grooming. AVG Family Safety® uses key-stroke technology to monitor your child's activities in chat-rooms and on social networking sites. If it spots words, phrases or language that are known to be used to victimize children online, it will notify you immediately via SMS or email.

Easy File Protector 5.134

Easy File Protector 5.134  5099 

Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un

SecurityKISS Tunnel 0.3.2

SecurityKISS Tunnel 0.3.2 免费版 5099 

SecurityKISS Tunnel is a handy, easy to use tool specially designed to ensure security and privacy once your data leaves your computer. SecurityKISS Tunnel redirects all your traffic through an impenetrable tunnel to our security gateway.

JRecoverer for Cassandra Passwords 1.0.0

JRecoverer for Cassandra Passwords 1.0.0  5099 

Audit and recovery of Cassandra passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

Rohos Disk Encryption 2.0

Rohos Disk Encryption 2.0  5098 

Rohos Disk - program creates hidden and protected partitions on the computer or USB flash drive. Those who have megabytes of sensitive files and seriously concerned with data security, can not imagine their computer or USB drive without the hidden partition that is created using this wonderful tool.

Malicious File Hunter 2.1

Malicious File Hunter 2.1  5098 

Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card

Password Decryptor for Mipony 4.0

Password Decryptor for Mipony 4.0 免费版 5097 

Free Password Recovery Tool for Mipony Download Manager

11 from 1848

« First « Prev 1 2 ... 114 115 116 117 118 ... 167 168 Next » Last »

最佳应用服务 其他安全软件 从编辑

目前还没有结果