Office Of Homeland Security


Advertisement

Entrust Password Unprotect  v.7.0.10.561

Entrust Password Unprotect is a desktop utility designed to open files encrypted with a password, sent to you by an Entrust Entelligence™ Desktop Solutions user, increasing the level of file security used - simply and easily.
This Entrust utility ...

PureMessage for Windows/Exchange  v.3 1

Sophos PureMessage for Microsoft Exchange - part of Email Security and Data Protection - blocks spam, viruses, spyware and phishing. Scanning all inbound, outbound and internal email and Exchange message stores, it proactively protects against email-borne ...





Advertisement

COMODO Cleaning Essentials  v.1 7

Comodo Cleaning Essentials (CCE) is a set of computer security tools designed to help users identify and remove malware and unsafe processes from infected computers.
Major features include:
-KillSwitch - an advanced system monitoring tool that ...

ADT Burglar Alarms  v.1.0

ADT provides a large number of home security systems and they range from basic to advanced systems. All of their systems will help to keep you safe as they all offer a 24-hour monitoring service. However, the more advanced systems often have extremely ...

EuroCheck  v.1 4

EuroCheck was developed in cooperation with the German "Federal Office of Safety in the information technique". It's available in English, German, French, Spain, Italian, Dutch and Polish language. That software doesn't record activities, doesn't require ...

Secured eUSB  v.4.6.9.8319

Take control of USB security. Secured eUSB lets you take control. Secured eUSB is a comprehensive, easy to use solution for USB security that incorporates all the functionality necessary to safeguard your intellectual property and comply with data protection ...

Nessus for Windows  v.5.0.1

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed ...

Wartime Washington  v.1

This app shows over 2000 photographs Esther Bubley took for the Office of War Information (OWI) during 1943.She was hired by Roy Stryker, head of the OWI (and the earlier Farm Security Administration), as a darkroom assistant, so she stayed ho ...

Aplus Restrict PDF Printing and Editing  v.2.0.1.5

PDF encrypted software is usual for security purpose. It is a unique application those offer you maximum number of security features. Programmer develop most of all security attribute. Tool allows you to set security on PDF file at different level like ...

CryptIt

Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption of the file. But this method may not work forever. CryptIt is designed to use XOR encryption on keys that ...

Program Protector  v.4.7

Program Protector is state of art security utility that allows you to password protect programs. You can password protect any Windows application. Program Protector is very easy to use and does not require any special computer knowledge.

Program ...

Protection Toolbar

Terror Threat Level: Continually checks and displays the Department of Homeland Security's Terror Threat Level. and much more...

DSATools  v.9 1

The DSAToolsTM is a leading-edge suite of power system analysis tools and provides the complete assessment of system security including all forms of stability.
The DSAToolsTM provide a complete toolset for power system planning and operational studies.

Ashampoo Anti-Malware  v.1 21

Consider yourself on the safe side with state-of-the-art technology in the field of computer security. Ashampoo Anti-Malware comes with two scanners (anti-spyware and anti-virus) of renown software producers and therefore ensures your pc's protection ...

Oracle IRM Desktop  v.11.1.41.6

Oracle Information Rights Management 11g is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used. Oracle Information Rights Management uses encryption to extend the management ...

Pages : < 1 | 2
Newest Reviews