Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to government and industry standards or custom user security levels. East-Tec DisposeSecure 5 can be operated either from a bootable media (USB stick, floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. The computers can be sanitized regardless of the file system or the operating system. In the latest version, you can also wipe non-system external hard drives directly from Windows, without booting from another device. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, East-Tec DisposeSecure offers the solution.
Advanced Stealth Email Redirector Advanced SER monitors outgoing traffic of the target PC's email client and intercepts all the messages sent from it. Intercepted emails are forwarded to a pre-specified email address.
CryptoExpert 2006 Lite CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to file.
Idea crypting module for BestCrypt Idea crypting driver for BestCrypt. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.
Previous:
SiteSentry Password Protect your Web site with this amazingly easy to use Java Applet. No knowledge of Java required! Customize Site Sentry to match your Web Site color scheme, Create up to 1,000 usernames and passwords, Add/ Delete/Modify and Sort users quickl
SniperSpy SniperSpy is remotely deployable spy software. Do you suspect your child, employee or anyone else is using your remote computer inappropriately? No physical access to the remote PC is needed to install this invisible spy software.
Internet Explorer Security Pro Internet Explorer Security is an utility that customizes many aspects of the Internet Explorer Web browser. It's a snap to use and provides the tools you need to retain and manage your Web browser settings.
Version: 5.0 Released: Jul, 27 2012 License: Shareware, $29.95 Expires: Expires after 15 Days
File size: 9,827 K Platforms: Windows XP/98; Linux; DOS Downloads: 20
Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates or removes from operation.