Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about privacy of your data, there's nothing to stop you from protecting your archives with password and encrypting them.
Please be aware that many implementations of encryption algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by Encryption Workshop will not be decrypted by other software or vice versa.
Mouse Trap Mouse Trap is a powerful security tool for Windows. It traps your mouse in place and locks your computer until you enter your password, while disabling system keys like Alt-Tab and Ctrl-Alt-Del to prevent tampering.
Advanced Tracks Eraser Advanced Tracks Eraser is the complete solution for cleaning Internet activities and traces of your PC! Advanced Tracks Eraser cleans up your browser's cache, cookies, history, recent document list and much more automatically!
Access Password Recovery Access Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Access XP/2002/2000/97 password-protected databases. All passwords are recovered instantly regardless of length. Multilingual passwords are supported.
Total Text Security Total Text Security can be used to secure any text (in an e-mail, instant message, or in a file). This application is easy-to-use, powerful, and usable with programs of any type. It can protect your data with passwords or RSA keys(as used by PGP).
Elite Keylogger Monitor and analyze PC activity, track chats, keystrokes, users passwords and clipboard invisibly with Elite Keylogger 6.0! Record e-mails sent or received, view sites visited and analyze applications' activity locally or remotely at home/in office.