![]() Security and encryption tools Guard your private documents and sensitive files from prying eyes. |
|
A-Lock 3.7 | |||||
Download the version for your operating system
here:
|
|||||
Description: | A-Lock uses the Blowfish algorithm to encrypt part or all of an email message from within your email client. The message can only be read by those people who know the password. A-Lock is accessed from the System Tray for fast message encryption. | ||||
Requirements: | Shareware. Some features are disabled until the program is registered. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Netscape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.a-lock.com/_site/alock/features.mhtml |
BlackBox 2.1 | |||||
Download the version for your operating system
here:
|
|||||
Description: | Now you can encrypt or decrypt files with two clicks of the mouse. Simply right-click on any file, select the encrypt or decrypt option, and enter a password. BlackBox uses the DES (Data Encryption Standard) for secure file encryption. | ||||
Requirements: | 30-day trial | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Netscape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.essentialdetails.com/blackbox/ |
DataCloak 4.3r4 | |||||
Download the version for your operating system
here:
|
|||||
Description: | Keep your files secure through an easy encryption and decryption procedure. Simply use the browser to select the source files and folders and enter your password. | ||||
Requirements: | Shareware | ||||
Install instructions: | Download to your local drive, then unzip the it and run the EXE file. | ||||
![]() |
http://www.btinternet.com/~bennett/datacloak.html |
Encrypted Magic Folders 99.05.4 | |||||
Download the version for your operating system
here:
|
|||||
Description: | Encrypted Magic Folders allows you to hide folders while encrypting the files within them. The folders and files can't be deleted, viewed, modified or run unless accessed with a password. | ||||
Requirements: | 30-day trial | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Nestcape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.pc-magic.com/ |
IntraSpy 2.22 | |||||
Download the version for your operating system
here:
|
|||||
Description: | IntraSpy monitors and logs your PC activity while you are away from your computer. It logs passwords, chat, email and programs run, as well as Web sites visited. | ||||
Requirements: | Shareware. This trial version will only log for 60 minutes of every startup. | ||||
Install instructions: | Download to your local drive, then unzip the it and run the EXE file. | ||||
![]() |
http://welcome.to/natasoft/ |
PC Spy 2.11 | |||||
|
Download the version for your operating system
here:
|
||||
Description: | Silently monitor what is being viewed on your computer while you are away. This software allows you to capture and save screen images, showing you exactly what was being viewed on your computer at specific times. PC Spy runs completely hidden in the background, so it can't be detected by the user. | ||||
Requirements: | Shareware | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Netscape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.softdd.com/pcspy/index.htm |
PC-Encrypt 4.1 | |||||
|
Download the version for your operating system
here:
|
||||
Description: | PC-Encrypt uses the Blowfish algorithm to compress and encrypt almost any type of file. It works with most email clients. | ||||
Requirements: | Shareware | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Netscape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.a-lock.com/_site/pce/index.mhtml |
RedHand Pro 4.20 | |||||
Download the version for your operating system
here:
|
|||||
Description: | RedHand Pro monitors your PC's activity when you're not around. It gives you the option of locking specific applications or your entire desktop. | ||||
Requirements: | Shareware | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Netscape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.hiddenman.com/ |
ScreenLock 5.4 | |||||
Download the version for your operating system
here:
|
|||||
Description: | Lock your system when you're away from your PC to stop other people from gaining access to it. Entry will only be granted when you enter the correct password. A log file is created whenever anyone attempts to gain unauthorised access. ScreenLock can be accessed from the Taskbar or a hotkey. | ||||
Requirements: | 15-day trial | ||||
Install instructions: | Download to your local drive, then unzip the it and run the EXE file. | ||||
![]() |
http://www.ijen.net/screenlock.htm |
Shredder95 1.16 | |||||
Download the version for your operating system
here:
|
|||||
Description: | Shredder95 will permanently delete files from your hard drive, making them totally unrecoverable. No part of the original file remains behind. | ||||
Requirements: | Shareware. With the unregistered version, only 20 files at a time can be shredded and there is a pause screen after each file is shredded. | ||||
Install instructions: | Internet Explorer users just click on the file and choose Open to run the setup program straight from the CD. Netscape users download to your local drive and run the EXE file. | ||||
![]() |
http://www.gale-force.com/shredder95/indexa.html |
Windows Task Lock 5.1 | |||||
Download the version for your operating system
here:
|
|||||
Description: | Windows Task Lock offers protection for certain applications on your system so that only those people with authorisation can access them. | ||||
Requirements: | Shareware | ||||
Install instructions: | Download to your local drive, then unzip the it and run the EXE file. | ||||
![]() |
http://posum.com/tasklock.html |
⌐ Australian Consolidated Press 1999. All rights reserved.