Enterprise software to instantly password protect your PDF file and prevent others from copying, editing, printing etc.
Protected Folder is designed to password-protect your folders and files from being seen, read or modified. It works like a safety box, just drag and drop the folders or files you want to hide or protect into Protected Folder, then no one can see, read or modify them. Whether you are concerned with privacy, data theft, data loss, or data leaks, Protected Folder is an ideal tool for you.
Net Monitor for Employees Pro allows you to see screens of computers connected to the network, without leaving your desk. The application allows you to monitor the activity of all the PCs in your company remotely. Moreover, you can share your screen with your employees PCs, making demos and presentations much easier.
With over 3 million customers, Disconnect is the easiest way to protect your privacy on all of your devices. Disconnect protects you in 6 ways: Visualize Tracking - see who's following you Encrypted Internet - secure all of your online activity Safe Browsing - block 5000+ trackers Anonymous Search - search privately on Google, Bing, & more Location Control - defeat censorship Privacy Icons - easily decipher privacy policies
Strong file protection by 128-2048 bit encryption (AES 256-bit and RSA 2048-bit are also supported). Secure file deletion is also supported: U.S. DoD 5200.28, GOST P50739-95 and others. USB Flash Drives can be used as the storage for strong encryption/decryption keys. Creating Self-Decrypting executable files. Powerful command line utility. Ability to encrypt/decrypt files from Windows Explorer in 1-2 mouse clicks.
Faceless Internet Connection is very useful for anyone that wants to surf and be anonymous, unblock VOIP applications, unblock all websites, secure encrypted channel, securely verify your finances, prevnent criminals from intercepting your on-line surfing, and stop search engines from profiling your internet surfing. It also offers offshore IP addresses and protection against your ISP.
Free command-line tool to instantly recover your lost or forgotten passwords from MySQL Query Browser software.
The Terminator system - to be more exact HSS (hardware-software system). Terminator consists of an external hardware controller (Terminator controller controller itself) pluggable into an USB port of a computer and the free Terminator program. The Terminator system was made by the best IT specialists of our organization. It combines the newest engineering solutions, ultimate control compliance, compactness and simplicity.
The protection of your sensitive data is often disregarded. But the encrypting of diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help of the Easy Encryption Technologie (EEnTe) you need only to enter a password or to insert the EC MoneyCard or certificate smartcard (PKCS). The software in additional support the compressing in the ZIP-format and signing of files.
Perfect software for the monitoring of all user activities on PC at any given moment. Personal Monitor is the part of your every day work allowing you to monitor every user action on the machine. Whether you want to record yours or someone else's activities, or you want to setup rules and limitations on your machine, such as to block certain processes, to set site restrictions, or to setup any kind of Parental control.
AutoKrypt is an encryption software designed for automation that will automatically encrypt or decrypt files and folders. AutoKrypt's encryption methods include password based, public and private key, secret key, OpenPGP password, OpenPGP public and private key.