Categories
Security

PC Guard for Win32 Security Related Security for Windows

Enables you to protect unlimited number of your programs with no additional investments
PC Guard for Win32 is a professional program protection and licensing system.

With PC Guard for Win32 you can easily protect Windows 32bit EXE/DLL applications from illegal distribution and reverse engineering.

Even more, you don’t need any source code editing or programming experience for this. Everything is fully automatic!

With PC Guard for Win32 you can protect unlimited number of your programs with no additional investments. You also don’t need any additional hardware (hardware keys, dongles etc.) for proper execution of protected programs.

PC Guard for Win32 is based only on complex software protection techniques and PC hardware details.

Protection methods

Bios identification – protected program will run only on the computer with specific identification code which is defined during protection process. This code can be obtained with GUARDID utility, it isn’t stored into protected file and it’s used for all encryption.

Auto install – at the first time protected program can be run on any computer but after that it will work only on that computer.

No identification – protected program can run on any computer but it’s still protected from reverse engineering.

Remote – this method can be used for remote licensing of your software. When protected program is executed it will show dialog box with 32-bit number which is computed according to data from the motherboard bios. This code can be transferred from your client to you by phone, fax or e-mail. With it you can than calculate corresponding activation key (32-bit number) and pass it to your client.
Here are some key features of “PC Guard for Win32”:

· Advanced software copy protection!
· Protect your software from illegal copying from one computer to another.
· Simple and effective protection procedure!
· No need for additional programming. Source code is not required.
· Application encryption!
· Protect your software from reverse engineering and analyzing.
· Application password protection!
· Protect access to your application (EXE/DLL) with password.
· Hardware locking!
· Lock your software to target computer.
· Evaluation (trial) version feature!
· Easily create demo version of your software with execution and date limitations.
· Secure distribution!
· Securely distribute your software over the Internet or on CD ROM.
· Secure and simple license management!
· Enable licenses by phone, fax or e-mail.
· Remove license feature!
· Allow your client to securely remove program licenses from his computer.
· License transfer feature!
· Allow your client to transfer program licenses from one computer to another.
· Limited license feature!
· You can rent or lease your software by setting license expiration period.
· Easy management of protected program updates!
· Auto-unlocking feature is available for protected program updates.

Limitations:

· Nag screen
· DLL applications are not supported
· Remove license, license transfer, limited license, license update and license extension features are not available
· Demo mode is not available in mode protection
· Protected application will display a warning message about demo version and quit on random occasions
· Protected application can be run for 20 times only regardless of demo mode settings
· You cannot load or save project settings
· Code section encryption is always set
· Machine ID feature is not available
· Protection Interface and Run-time encryption (RTE) feature are not available
· Generated serial numbers are random serial numbers generated for demonstration purpose only
· Parameters file for AC Generator cannot be created
· V4Init code calculation is disabled
What’s New in This Release: [ read full changelog ]

· Network protection: IP filters can now be embedded into network configuration file.
· New command line switch: UPDATEID (Application update ID)
· New custom buttons macro: %LANGUAGE% (selected language name)
· Custom dialogs: “Keep dialog titles” option added.
· Protection interface: InvalidateSerialNumber() function added.
· Few minor bugs fixed.
· NEW BUILD OF INTERFACE DLL (PCGW32.DLL) !
· NEW NETWORK CONFIGURATION FILE VERSION (4) !

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

FileLock Pro Lockdown Security for Windows

FileLock Pro – A software program to restrict access to the files that contain your sensitive data by locking the Folders
FileLock Pro is a software tool that lets you restrict access to the folders that contain your sensitive data. When folders are password protected and locked, their contents cannot be read, copied, modified .

FileLock Pro will guarantee your privacy by denying access to your directories even in Windows Safe mode and DOS.

If somebody logs on under your Windows account, he/she will not be able to read, copy or modify your data.

FileLock Pro has self deleting program which deletes the files, once they are locked. However, at times it may fail to do that. It is recommended to manually delete those folders.

Here are some key features of “FileLock Pro”:

· Ensure your privacy
· Secure your data

Limitations:

· 30 times free of charge uses

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Armor Tools Encrypting Security for Windows

This is a suite of tools which ensures your privacy and keeps your sensitive information secure
While you are working on your computer the system monitors the so called “history” and saves it.

All information about your work in the Internet – when and which sites you visited, of what content, which programs downloaded, with which documents you worked, which and whom you wrote, what you looked for, which folders you opened, what computers you connected to – all that and a lot of other information is left on your computer.

Any person who has an access to your PC can easily access this information and monitor practically your every step. Besides he/she can collect compromising information about you.

In that situation confidentiality can not be guaranteed. So much accessible information about you not only destroys your privacy but also slows down your computer.

All this information is kept on your hard drive, in the system registry. Besides the history of started programs, history of the search, history of last opened documents is constantly loading by the system and “eats” RAM of your computer.

“Armor Tools” will let you work on the computer not leaving traces of your activities.

Armor Tools will let you work on your computer taking care not to leave traces of your activities.

The program includes some very useful tools:

Encrypted Disk – Tool is used for creating encrypted disks on your computer. On this disk you can store confidential information which you’d like to keep secret from other users. The disk is encrypted by 256-bit (32 symbols) password using “AES256” algorithm in real-time mode (this ensures steady protection of your data against hacking).

The Eraser – Tool is used for cleaning the private information kept on your computer. This tool contain MS Windows objects and Internet Explorer objects for erasing.

Invisible Man – Tool is used for keeping private information and its later restoring. This is necessary in that case when you wish to do some work on the computer which must not be fixed anywhere, but you need to save the information which you had in computer before your work.

File Shredder – Tool is used for deleting secret documents, programs, and other files without possibility to restore them. It also destroys file information and file headers.

Adjustments – A set of additional adjustments related to safety, system capacity and user preferences. It contain parts: Start Menu, Explorer, Network, Printers, Display, IE Favorites.

Requirements:

· Minimum screen resolution 800×600
· Pentium processor and above
· 16 Mb RAM
· 5 Mb free disk space

Limitations:

· 21 days trial
· nag screen
What’s New in This Release: [ read full changelog ]

· Erasure dialog was added
· Erasure algorithms were updated
· erasing status added
· program settings (by default) were changed
· minor changes of program interface
· lng-files were updated

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Virtual Flash Drive Security Related Security for Windows

Virtual Flash Drive – Removable disk popular and easy to use
Virtual Flash Drive is a removable disk, popular in the world and very easy to use.But do you know the data on disk is not secure?

Someone can get access to the data very easily! You may have a lot of movies, audios, pictures, files, and I’m sure that you would like to encrypt them for a better protection.Now you get the very way!

Thanks to its powerful encrypting engine, Virtual Flash Drive provides you with the best solution to prevent your data from any possible peep or steal. Meanwhile you can learn well how to use it to encrypt your data, files or disk within 5 minutes!

Compared to other present encrypting software, rather than complex operations and an executing efficiency limited by date volume, Virtual Flash Drive make the operation process much more easier thanks to its Flash disk.

If you have an experience of Flash disk/memory, I’m sure you can have a good command of it! It is the same as we use USB Flash memory disk, and it is enough for you to store your files on the Virtual Flash Drive, insert it on the Flash Drive in case of need and take it out after utilization.

Here are some key features of “Virtual Flash Drive”:

· Full characters of virtual USB Flash memory disk and function of plug and play.
· Unlimited volume and free choice of the volume of Virtual Flash Drive.
· Method of Encryption algorithm: DES, MD5, free choice of user on the encrypting degree.
· Possibility to support 4 independent Virtual Flash Drives.
· Integrated shell operation and even a rapid function in windows explorer.
· Anti-deleting function of Virtual Disk image file avoids unintentional loss or intentional destroy.

Requirements:

· Intel/AMD based PC
· 32MB (or more) of RAM
· 10GB (or more) hard disk.

Limitations:

· 15 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Privacy Eraser Pro Secure cleaning Security for Windows

Clean internet track, cache, cookies, evidence of past computer actives.
Privacy Eraser Pro is an Internet Eraser that protects your Internet privacy by cleaning up all the Internet history tracks and past computer activities.

With simply one click, Privacy Eraser Pro allows you to erase the cache, cookies, history, visited/typed URLs, autocomplete forms data, saved password, index.dat files of your browser, and Window’s swap file, temp folders, run history, search history, open/save history, recent documents and more.

Internet Eraser – Erase Internet History & Protect Internet Privacy!

The cookie cleaning feature allows you to specify cookies to keep, so that you don’t erase your important login cookies. In addition, you can change the paths of several system folders (Cache, Cookies, History, Favorites etc.) and customize the Internet Explorer (IE) title bar text.

With Privacy Eraser Pro’s free plug-ins, you can easily erase the tracks of popular programs. We currently offer over 150 FREE plug-ins which supports the most popular programs such as ACDSee, Acrobat, Microsoft Office, KaZaA, MSN Messenger, Real/RealOne Player, Media Player and many others. Our internet eraser also support popular browsers such as IE, Netscape, AOL, Opera and MSN Explorer.

With Privacy Eraser Pro, your can schedule cleaning task run at a time that is most convenient for you. Privacy Eraser Pro completely implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standard, to gives you confidence that once deleted with Privacy Eraser Pro, your file data is gone forever and can not be recovered.
Requirements:

· Microsoft Internet Explorer 5.0 or later

Limitations:

· 15 day trial period.
What’s New in This Release: [ read full changelog ]

· Added Support for Google Chrome 1.0
· Added Support for Mozilla Firefox 3.06
· Added Support for Opera 9.63
· Added %UserName% for Plugin Builder
· Added & Updated some plug-ins
· Some improvements

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Securepoint Personal Firewall VPN Client Firewall Security for Windows

The job of your this firewall is to protect a PC from unwelcome access
That means it makes the PC invisible for possible attackers and
catches suspicious connections. Unnoticed passing-on of personal data
will become impossible.

The integrated VPN Client is an easy-to-use
remote working software based on the latest VPN technology.

The software provides smooth integration with a remote network and may be used with the most popular IPSec-compliant gateway – like Securepoint Firewall & VPN server.

The software provides authentication, encryption to your network traffic and supports Preshared Key / X509 certificates.

Without permission, everything is forbidden: The basic setting of the
Securepoint Personal Firewall only allows those applications whose
communications were explicitly permitted.

Minimal rights of access: Each program on your PC should only own those right of access which it actually needs. The Securepoint Personal
Firewall & VPN Client supports you in this and recognises automatically
which programs are tending to communicate with the exterior.

You will be asked if you want to allow this program to communicate or if you refuse to give your allowance. Thereby, the working surface which could possibly be attacked is essentially reduced.

Easy control and overview: An easy control and overview allows you to
concentrate on fundamental settings.

Lines of defence in several layers: Do not rely on a single system of
defence. In any case, use other security systems such as virus scanners in addition to the Securepoint Personal Firewall.

Since the Securepoin tPersonal Firewall & VPN Client is compatible with virus scanners, e.g. of AntiVir, you can additionally operate with a virus scanner.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

ZipLock Encrypting Security for Windows

ZipLock is an invaluable tool for protecting sensitive data on your PC.
ZipLock is Valiant IT Ltd’s premier cross-platform encryption and compression utility.

ZipLock is a very useful and effective utility for the protection of the sensitive data on your computer.
Using a combination of RSA public-private key encryption and secret key encryption, ZipLock allows you to keep your data totally secure.

ZipLock provides a variety of secret key encryption algorithms including the Advanced Encryption Standard (classified as secure enough for use by the US government), and two of the other finalists for the Advanced Encryption Standard: the Serpent and TwoFish encryption algorithms.

In addition to support for data encryption, ZipLock provides full archiving and compression capability. ZipLock provides a number of different compression options.

It allows you to compress files on your PC using Zip format (commonly used in Windows platforms) and compressed Tar format (commonly used in UNIX platforms).

Here are some key features of “ZipLock”:

· Encrypt files using third-party public keys.
· Sign and verify files.
· Support for BZip2 compression.
· New start-up wizard for generating key-pair or utilising existing key-pair.
· New Skinnable look and feel – supports GTK and KDE skins.
· Full Encryption/Decryption support using a combination of symmetric and asymmetric encryption methods
· Create zip, tar and compressed tar archives
· Add and remove entries to/from zip files
· Associate file types with applications to launch from within archive file

Requirements:

· SUN’s Java Runtime Environment (version 1.4.0 or greater)

Limitations:

· 30 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

File Shredder Secure cleaning Security for Windows

Completely remove sensitive files from your disk drives
File Shredder is a small tool that will help you to erase the contents of sensitive files and folders that you specify.

Normal file deletion only removes a file’s directory entry, but leaves the data contained in the file on your disk drive.

File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin.

You can also shred files by right-clicking on them from the MS Windows Explorer and selecting the Send To item on the popup context menu.

File Shredder has two file wiping methods available, a standard two-pass file clearing procedure and an NSA approved seven-pass file erasure method.

For normal file deletion operations the two-pass method should be sufficient, but if you want to thoroughly erase a file’s contents before deleting it the NSA approved method may be used.

NOTE: Files and folders selected for shredding can not be recovered using an undelete program. The purpose of File Shredder is to completely remove sensitive files and their contents from you disk drive. Once a file has been shredded it can not be recovered using sophisticated file restoration utilities.

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Hide Protect any Drives Keylogger Monitoring Security for Windows

An application designed to password protect Hard drive, CD, DVD, floppy and flash drive.
Protect Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives. Stop unauthorized software installations and data leak by removable media.

Hide & Protect any Drives is a security tool that gives you the possibility to password protect the hard drive, CD, DVD, floppy and flash drive.

Hide & Protect any Drives is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to partitions of hard disk drives.

There is an ability to secure your data by two ways: hide your devices or lock access to them. You should enter a password to gain access back. Your data on media will not be encrypted or altered in any way, therefore if you have lost or forgotten your password, you’ll never lose your data stored on the protected media.

Moreover, it works much more faster than any other software using cryptooperation mechanisms. The main purpose of the program is restricting an ability of copying data between removable media and hard disk drives as well as denying access to the media itself.

Hide & Protect any Drives will also allow you avoid many of headaches connected with unauthorized software installations from any removable media. It also prevents data leak by removable media.
Here are some key features of “Hide & Protect any Drives”:

· Password protect hard drive
· Protect floppy drive
· Hide CD
· Hide DVD
· Password protect CD
· Password Protect DVD
· Protect access to your valuable data

Limitations:

· 30 days trial

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!

Categories
Security

Disk Drive Administrator Security Related Security for Windows

You can disable all USB drives, regardless of the drive letters that can be associated with them.
Disk Drive Administrator can hide, lock and protect your local, network, Floppy and USB drives, and disable the AutoRun feature for them using this fabulously designed software.

Functionality and simplicity is put in every corner of Disk Drive Administrator; intuitively understandable user interface gives you an ability to start using the program right out of the box without learning anything. All you need to do is to click on the checkboxes located within the group boxes representing individual drives.

Another great feature you can use lets you disable the AutoRun feature based on drive types. This means you can disable, for instance, only all USB drives, regardless of the drive letters that can be associated with them.

Disk Drive Administrator lets you protect itself from an unauthorized access by assigning a password that can be requested on each program start.
Here are some key features of “Disk Drive Administrator”:

· Hide local drives
· Hide network drives
· Hide USB drives
· Hide Floppy drives
· Hide CD drives
· Hide DVD drives
· Lock hard drives
· Lock USB drives
· Lock CD drives
· Lock DVD drives
· Protect access to your valuable data

Limitations:

· 30 days trial
· Nag screen

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!