|Freeware Place Index Page||
Freeware Place - the web's best freeware in one place!
Freeware Privacy Software
FREE Windows Privacy Software
PGP Freeware Pretty Good Privacy for Windows - PGP Freeware, With millions of users worldwide, PGP is the world's de facto standard for email encryption and authentication. PGP Security is proud to provide freeware versions of PGP products to non-commercial customers. These products provide limited, but important, capabilities including secure e-mail, file encryption and peer-to-peer VPN.
TrueCrypt Free open-source disk encryption - TrueCrypt Free open-source disk encryption. Features: It can create a virtual encrypted disk within a file and mount it as a real disk. It can encrypt an entire hard disk partition or a device, such as USB memory stick, floppy disk, etc. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (more information may be found here). 2) No TrueCrypt volume can be identified (TrueCrypt volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5, Serpent (256-bit key), Triple DES, and Twofish (256-bit key). Supports cascading (e.g., AES-Serpent-Twofish). Based on Encryption for the Masses (E4M) 2.02a, which was conceived in 1997.
E4M Encryption For The Masses - E4M Encryption For The Masses - E4M Encryption For The Masses is an on-the-fly disk encryption product. What this means is create a volume on your hard disk, CDROM, floppy or other media which is essentially just a normal file. The file however is in fact a file system itself. It contains all the structures needed by your operating system to recognise the file as a file system of a particular type such as FAT or NTFS. This is called a "file hosted volume". Or you could choose a blank or unwanted partition on a local hard disk or floppy disks and format it using E4M. You can then mount this new encrypted volume, and use it like you would any other drive. This is called a "Raw partition volume". The only difference is that Raw partition volumes do not have a file system in the middle, so they provide an encrypted file system on top of a Raw partition. As opposed to file hosted volumes which need an existing file system to "host" the volume file. An example would be a E4M volume called "myfiles.vol" located on the C drive, rather than the same volume located on the second partition of your hard disk. To your operating system, these new volumes will work exactly like your C drive, or any other drive on your system. Tools are provided to "mount" a volume, and to create a volume. The process of mounting a volume involves pretending that the volume file or partition is in fact a removable media device attached to your system.
CRYPTAINER LE ENCRYPTION SOFTWARE - CRYPTAINER LE ENCRYPTION SOFTWARE - Secure your data and ensure absolute privacy with Cypherix's powerful encryption software Cryptainer LE. It 's powerful 128 bit encryption, creates multiple 20 Mb encrypted containers (vaults) on your hard disk. These encrypted vaults can be loaded and unloaded on need. You can view, modify and hide all types of file with a single password. Easy to use, Cryptainer LE's encryption works with all 32 bit versions of Microsoft Windows (95/98/ME/2000/XP/2003 Server) and with all known file types. Cryptainer allows you to password protect and secure any file or folder on any media including removable drives (Flash Drives, CD ROM's etc). You can protect your files and folders and ensure total privacy with Cryptainer LE. Simply drag and drop the files and folders you want to hide and voilą! your files are hidden. With Cryptainer LE you can hide the very existence of your confidential files and folders. Additionally, Cryptainer LE allows you to send encrypted email files. The recipient need not even have a copy of Cryptainer LE installed to decrypt the files.
JAP Anonymous Surfing Software - JAP Anonymous Surfing Software - JAP makes it possible to surf the internet anonymously and unobservably. JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website. Instead of connecting directly to a webserver, JAP users take a detour, connecting with encryption through several intermediaries, so-called mixes. Since many JAP users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user. The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers.
Tor: An anonymous Internet communication system - Tor: An anonymous Internet communication system - Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
Ad-Aware Freeware - Ad-Aware Freeware - Ad-aware is a free multi-spyware removal tool that detects and safely removes advertising spyware from your system. Recommended - you will be amazed at what it will find on your own system - be warned though, some spyware like GoZilla! and Comet Cursor will no longer work after running Ad-Aware.
Spybot - Search & Destroy - Spybot - Search & Destroy - Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D is free, so there's no harm in trying to see if something snooped into your computer, too :). Spybot-S&D can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and extended reports.
Bazooka Adware and Spyware Scanner - Bazooka Adware and Spyware Scanner detects a multitude of spyware, adware, trojan, keylogger, foistware and trackware components; sources of irritation that antivirus software does not deal with. The scanning process will only take about two seconds and tell you how to uninstall the invasive threat using simple step-by-step instructions or put you in contact with the vendor for the most up-to-date and safe uninstall instructions.
A-Lock Free Email Encryption - A-Lock Free Email Encryption - Encrypt your email messages with A-Lock. The free software will sit in your system tray and encrypts on your email as neeeded. This free unregistered version has no usage or time restrictions, and will decrypt all strengths. However the encrypt key is limited to 7 characters (56 bits). Registration increases the encrypt strength to 56 characters (448 bits) in North America, and to 16 characters (128 bits) Internationally.
HandyBits File Shredder, Free Secure File Delete Utility - HandyBits File Shredder, Free Secure File Delete Utility - Key Features: When you delete a file, Windows simply removes the reference to the deleted file from the file system, but disk clusters still contain the file data, so your confidential information can be accessed by others after the file deletion. Securely wiping files - you can configure File Shredder to overwrite a file data with random information up to 15 times, so it is practically impossible to recover the original data.
ScramDisk Privacy Software for Windows - Scramdisk is a freeware program that allows the creation and use of virtual encrypted drives. Basically, you create a container file on an existing hard drive which is created with a specific password. This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. The virtual drive can then only be accessed with the correct passphrase. Without the correct passphrase the files on the virtual drive are totally inaccessible. Once the passphrase has been entered correctly and the drive is mounted the new virtual drive can then be used as a normal drive, files can be saved and retrieved to the drive and you can even install applications onto the encrypted drive. Scramdisk allows virtual disks to be stored in a number of ways: In a container file on a FAT formatted hard disk. On an empty partition. Stored in the low bits of a WAV audio file (e.g. steganography).
Eraser - Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.
ImageHide - ImageHide - Hide loads of text in images (Steganography) Simple encrypt and decrypt of data (old Ver 1.0) See how much data you can add in bytes No increase in image size Image looks the same to normal paint packages Get past all the mail sniffers New Version 2.0 Better Encryption Now uses RC_4 encryption plus SHA Hashing Hashed Passwords (now in image) loads and views Ver 1.0 files Now knows Version and if encrypted or not Can now print the images Save Image files as BMP or PNG Can use many different image formats Still Free.
Cookie Cruncher - Cookie Cruncher - Freeware Cookie Manager. Rendering Better Avenues' most recognized free sofware, Cookie Cruncher has become one of the highest rated and most well known Cookie utilities in the world. The phrase Cookie Cruncher has become the reference name of cookie utilities.
AxCrypt File Encryption Free Software - AxCrypt File Encryption Free Software - AxCrypt File Encryption is Personal Privacy and Security Freeware for Windows 95 / 98 / ME / NT / 2K / XP with AES-128 File Encryption, Compression and transparent Decrypt and Open in the original application. Integrated with Windows Explorer. Encrypt, compress, decrypt, wipe, view and edit with a few mouse clicks. Cryptographic primitives are AES-128 and SHA-1. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation.
ScubXP - ScrubXP cleans a computer from temporary files and registry keys resulting from opening files and or using the Internet. Some of Scrub XP's features: Removes IE History, Removes IE Temporary Files, Removes all files from TEMP directory, Removes IE Cookies, Removes Documents List from Start Menu, Empties Recycle Bin, Clears Autocomplete Entries and Turns it Off, Clears Recent File Lists for Run, Common Dialogs, Recent Documents, Search Assistant, Typed URLs, Paint, Find Computer, Printer Ports, Find Files, Media Player, Previous Tasks, and Real Player. ScrubXP will run automatically when your computer starts. Panic mode can be invoked by double-clicking the icon in your task tray. Panic mode will do all of the above but will also restart Windows Explorer for the ultimate in cleanliness. Freeware for Windows XP.
Multi Proxy Free Personal Proxy Server - Multi Proxy Free Personal Proxy Server - MultiProxy is a multifunctional personal proxy server that protects your privacy while on the Internet as well as speeds up your downloads, especially if you are trying to get several files form overseas or from otherwise rather slow server. It can also completely hide your IP address by dynamically connecting to non-transparent anonymizing public proxy servers. You can also test a list of proxy servers and sort them by connection speed and level of anonimity. MultiProxy is Freeware -- you can use it as long as you want and you can share it with anybody you want. But only if it is for personal or non-commercial use.
All-in-One SECRETMAKER freeware - All-in-One SECRETMAKER freeware - All-in-One SECRETMAKER is designed for users who wish to: Keep their email box free of spam, Avoid irritating pop-up and banner interruptions, Protect their privacy and avoids profiling, Use the Internet efficiently for private or business use. All-in-One SECRETMAKER combines 8 powerful tools in 1 freeware software package ? Spam Fighter Pro - outstanding multilevel anti spam filter solution for stopping junk emails ? Worm Hunter - protects you from spreading email viruses to your friends ? Pop-Up Killer - sophisticated and smart, blocks disturbing advertising windows ? Banner Blocker - avoids banners, speeds up browsing, reduces online access costs ? Cookie Eraser - prevents profiling through cookies, saved by Microsoft Explorer ? Privacy Protector - exchanges tracking information, state-of-the-art solution ? History Cleaners - prevents betrayal, deletes history logs, speeds up your computer ? Garbage Cleaner - removes from programs left over garbage from the hard drive.
Ten steps everyone should take to protect their privacy on-line - Ten steps everyone should take to protect their privacy on-line. Useful page from the producers of Anonymizer a paid online anonymous surfing tool. This privacy FAQ gives useful FREE information to enhance your surfing experience and protect your privacy online.
Freeware PlaceFreeware Files, free software, freeware games, free screensavers and freeware utilities are added regularly to Freeware Place, so bookmark this site (Press Ctrl and D) and check back often. Send suggestions for freeware to Webmaster at the Freewareplace Domain. Freeware Place: The web's best freeware in one place.
Freeware PlaceFREE GRAPHICS and FREE WEB TEMPLATES!
I would like to have some high traffic freeware site buttons and text links here. Would you like to link to the Freeware Place?
The Freeware Place is a pop-up free freeware zone!
If you find the Freeware Place pages useful please consider linking to Freeware Place<A HREF="http://www.freewareplace.com/">Freeware Place</A> : The Web's best Freeware in one place.
This text link will look like this:
Freeware Place : The Web's best Freeware in one place.
This text link can be edited/shortened to fit the space you have available.
© Copyright FreewarePlace 2004, All Rights Reserved