FREE CompuSec Security Suite 4.18.1 |
Date Added: May 25, 2006 | Visits: 5.007 |
|
||||||||
Protect your PC with pre-boot authentication, single-sign-on, screen saver lock, full harddisk encryption, file, floppy, and USB drive encryption. FREE CompuSec® is a security software designed to protect desktops and notebooks. It features pre-boot authentication, single-sign-on for windows Logon, full hard disk encryption, file encryption for secure exchange and the encryption of floppy diskettes and other removable media (USB thumb drives or HDD, firewire HDD etc). This software is a full version without any limitations. It is not a demo or trial version.
|
License: Freeware | Size: 177.73 MB |
Security Tools
-
Rule Set Based Access Control 1.3.5
Rule Set Based Access Control (RSBAC) is a Free Software security extension for current Linux kernels. Rule Set Based Access Control is based on the Generalized Framework for Access Control (GFAC) by Abrams and LaPadula and provides a flexible... |
368.64 KB | |
Database Tools
-
PHP Generic Access Control List 3.3.7
PHP Generic Access Control List is a PHP class that offers Web developers a simple, yet immensely powerful "drop in" permission system for their current Web-based applications.. |
2.6 MB | |
Utilities
-
Windows Azure Access Control Service Migration Tool 1.0
This tool enables customers with Windows Azure Access Control Service 1.0 namespaces to migrate them to Access Control Service 2.0. When using the ACS 1.0 Migration Tool to copy data between an ACS 1.0 namespace and an ACS 2.0 namespace, the tool... |
||
Modules
-
Node Relativity Access Control 5.x-1.3 1.0
Node Relativity Access Control restricts access to nodes that are in relativity relationships. The module gives a user access to a node and all of its children. By default, each node's author is granted this access to children and grandchildren... |
||
Modules
-
Taxonomy Access Control 1.0
This module does not provide taxonomy access control per individual user.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Key features "Taxonomy Access Control": -... |
||
File Restoration
-
Recovery Toolbox File Undelete Free 2.0.7
When a file is deleted, most users think that it's gone for good. And it's exactly why they get so frantic when they find out that a file with really valuable information has been erased from their hard drive, portable HDD, USB stick or memory... |
2.39 MB | |
Network & Internet
-
Enigmail for SeaMonkey 1.1
In essence Enigmail is a tool that can encrypt and/or sign mail when sending, decrypt/authenticate received mail In other words, Enigmail is an extension to the mail client of Mozilla / Netscape and Mozilla Thunderbird which allows... |
1.29 MB | |
Networking
-
Social Access Control 1.1
Based on the 3rd-party Category Access, this plugin provides the core functionality for restricting the access permissions of posts. This gives you the ability to permit only specific registered users to read certain posts or certain categories of... |
10 KB | |
Firewalls
-
SafeSquid Personal 3.1.2
SafeSquid Presonal is a Free Content Filter Web Proxy Server for Windows. SafeSquid Content Filter Web Proxy has a BROWSER BASED INTERFACE. SafeSquid Content Filter Web Proxy Server offers arguably, worlds biggest set of Content Filtering... |
2.58 MB | |
Utilities
-
Userspace Role Based Access Control b.0.0.1
USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace |
12.79 KB |
Windows Software
-
iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them... |
144.59 MB | |
Windows Software
-
Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by... |
1.34 MB | |
Windows Software
-
Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without... |
28.29 MB | |
Windows Software
-
WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible... |
2.27 MB | |
Windows Software
-
WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,... |
223 KB | |
Security Tools
-
Privacy Eraser Free 6.3
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,... |
9.41 MB | |
Security Tools
-
WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:... |
9.39 MB | |
Security Tools
-
USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock... |
11 KB | |
Security Tools
-
Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and... |
407 KB | |
Security Tools
-
Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should... |
29.53 MB |