Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption.
AVG Internet Security is ultimate protection for whatever you do online: shopping, banking, surfing, downloading, emailing, or social networking. And it's packed with features: File Shredder & Data Safe to help keep your private files safe, faster scanning, LinkScanner to identify dangerous links, Online Shield to scan files before you download them, Anti-Spyware to protect personal data, Anti-Spam, Firewall, free 24/7 support, and more.
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. When the USB drive is locked, your files remain safe in all Operating Systems. Works with all USB flash drives on the market formatted in FAT32/exFAT. Available for Android & Windows PC.
Paradox Recovery allow to find the lost password for Paradox tables. An application don't use any external libraries (no BDE, no ODBC, no ADO etc) and you may run this tool on any computer without any additional setup/install. You may customize the brute-force or dictionary search process for entire password with extended options. All versions of Paradox tables and all file kinds (data, indexes etc) supported.
The Terminator system - to be more exact HSS (hardware-software system). Terminator consists of an external hardware controller (Terminator controller controller itself) pluggable into an USB port of a computer and the free Terminator program. The Terminator system was made by the best IT specialists of our organization. It combines the newest engineering solutions, ultimate control compliance, compactness and simplicity.
Watch and control all PCs & Macs in your LAN. You install the client on each computer you intend to monitor. With the server you can view all computers. You can also capture pictures, record video, and remotely control mouse and keyboard.
Windows Spy Keylogger is the free software to help you covertly monitor all activities on your computer.
BestCrypt TravellerTM allows quick access to encrypted container files created by BestCrypt. BestCrypt Traveller starts working without installation of the software. After running a single executable file (BCTraveller.exe), a standard BestCrypt icon appears in the Windows system tray from where commands can be run to mount or dismount container files and create new encrypted containers.
Cost effective key logger software works invisibly on your computer and does not show desktop icon, program path and add remove list and not affect processor working speed. Parental Control Software provides convenient option to monitor entire system activities from start to shut down in hidden manner. Parental Control Software records overall system activities made by external user or family members with real date and time in reliable manner.
Within few seconds you can create additional disk for your secret folders and files, and within few seconds you can hide this disk entirely. To open the disk again you will need to enter your password. This is so easy and so useful! On this disk you can create hidden folders and store any secret files. The disk will be completely virtual, thus, it will not require any additional disk space, it will use free space from your existing hard disk.
Delete your sensitive files permanently. Mutilate File Wiper is a file remover that prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrites. Mutilate supports complete folder and subfolder shredding. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files.
Iperius Backup является одним из лучших бесплатных ПО для резервного копирования, имеет также коммерческую версию с широким набором передовых функциях резервного копирования. Бесплатная версия Iperius Backup позволяет проводит резервное копирование на любые носители информации, как NAS, внешние диски USB, носители RDX и компьютеры в сети. Включает в себя полнофункциональный планировщик заданий и функцию отправки e-mail. Поддерживает сжатие zip без ограничения в размере файлов, инкрементальный бэкап, аутентификацию в сети и запуск внешних скриптов и программ.
Антивирус Касперского защищает вас от фишинга и вредоносных сайтов, которые вы иначе бы не знать, пытаются украсть у вас. В то же время Kaspersky Security Network позволяет компьютеру сообщить, когда он обнаруживает угрозу, которая не видели раньше. Все 250 миллионов пользователей Kaspersky воспользоваться нашей совокупных знаний! Kaspersky функции включают в себя: защищает от вирусов, троянов, червей, шпионских программ, adware сканирование файлов, электронной почты и Интернет трафика защищает мгновенных посыльных защищает от неизвестных угроз анализирует и закрывает уязвимости Internet Explorer отключает ссылок на зараженные сайты / фишинговых сайтов глобальной угрозы мониторинг (Kaspersky Security Network) блоки всех типов клавиатурных шпионов автоматическая база данных обновления Бесплатные технической поддержки Примечание: это 30-дневный коммерческие суда.
