|Freeware Place Index Page||
Freeware Place - the web's best freeware in one place!
Freeware Security Software
FREE Windows Security Software
WinPatrol Free Security Software - WinPatrol Free Security Software - Features: Increase Your Speed & System Performance. Detect & Neutralize Spyware. Detect & Neutralize ADware. Detect & Neutralize Viral infections. Detect & Neutralize Unwanted IE Add-Ons. Detect & Restore File Type Changes Automatically Filter Unwanted Cookies. Avoid Start Page Hijacking. Detect HOSTS file changes. Kill Multiple Tasks that replicate each other, in a single step! Stop programs that repeatedly add themselves to your Startup List! Delete and Remove the most Stubborn Infections. Anti-Spyware, Anti-Adware, Anti-Malware freeware. WinPatrol uses a heuristic approach to detecting attacks and violations of your computing environment. Traditional security programs scan your hard drive searching for previously identified threats. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. You'll be removing dangerous new programs while others download new reference files.
Free Intrusion Prevention and Detection Utility - Free Intrusion Prevention and Detection Utility - Prevx Home will protect your PC against the worms, trojans, malicious spyware, malware and hacker attacks that bypass traditional security technology.
PGP Freeware Pretty Good Privacy for Windows - PGP Freeware, With millions of users worldwide, PGP is the world's de facto standard for email encryption and authentication. PGP Security is proud to provide freeware versions of PGP products to non-commercial customers. These products provide limited, but important, capabilities including secure e-mail, file encryption and peer-to-peer VPN.
A-Lock Free Email Encryption - A-Lock Free Email Encryption - Encrypt your email messages with A-Lock. The free software will sit in your system tray and encrypts on your email as neeeded. This free unregistered version has no usage or time restrictions, and will decrypt all strengths. However the encrypt key is limited to 7 characters (56 bits). Registration increases the encrypt strength to 56 characters (448 bits) in North America, and to 16 characters (128 bits) Internationally.
ImageHide - ImageHide - Hide loads of text in images (Steganography) Simple encrypt and decrypt of data (old Ver 1.0) See how much data you can add in bytes No increase in image size Image looks the same to normal paint packages Get past all the mail sniffers New Version 2.0 Better Encryption Now uses RC_4 encryption plus SHA Hashing Hashed Passwords (now in image) loads and views Ver 1.0 files Now knows Version and if encrypted or not Can now print the images Save Image files as BMP or PNG Can use many different image formats Still Free.
All-in-One SECRETMAKER freeware - All-in-One SECRETMAKER freeware - All-in-One SECRETMAKER is designed for users who wish to: Keep their email box free of spam, Avoid irritating pop-up and banner interruptions, Protect their privacy and avoids profiling, Use the Internet efficiently for private or business use. All-in-One SECRETMAKER combines 8 powerful tools in 1 freeware software package ? Spam Fighter Pro - outstanding multilevel anti spam filter solution for stopping junk emails ? Worm Hunter - protects you from spreading email viruses to your friends ? Pop-Up Killer - sophisticated and smart, blocks disturbing advertising windows ? Banner Blocker - avoids banners, speeds up browsing, reduces online access costs ? Cookie Eraser - prevents profiling through cookies, saved by Microsoft Explorer ? Privacy Protector - exchanges tracking information, state-of-the-art solution ? History Cleaners - prevents betrayal, deletes history logs, speeds up your computer ? Garbage Cleaner - removes from programs left over garbage from the hard drive.
ScramDisk Privacy Software for Windows - Scramdisk is a freeware program that allows the creation and use of virtual encrypted drives. Basically, you create a container file on an existing hard drive which is created with a specific password. This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. The virtual drive can then only be accessed with the correct passphrase. Without the correct passphrase the files on the virtual drive are totally inaccessible. Once the passphrase has been entered correctly and the drive is mounted the new virtual drive can then be used as a normal drive, files can be saved and retrieved to the drive and you can even install applications onto the encrypted drive. Scramdisk allows virtual disks to be stored in a number of ways: In a container file on a FAT formatted hard disk. On an empty partition. Stored in the low bits of a WAV audio file (e.g. steganography).
PowerCrypt 2000 - OVSoft - PowerCrypt 2000, the innovative and powerful file encoder. Make sure your files are safe with a 100% secure encryption algorithm, which is not resolveable by NSA nor CIA. You can encode multiple files at a time, manage your archives and compress data for a better disk space usage. Get three goals at a time: max security, easy usage, fast encryption.
Eraser Freeware Open Source Security Tool - Eraser Freeware Open Source Security Tool - Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is FREE software and its source code is released under GNU General Public License. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove magnetic remnants from the hard drive. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting methods..
Tor: An anonymous Internet communication system - Tor: An anonymous Internet communication system - Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
Ad-Aware Freeware - Ad-Aware Freeware - Ad-aware is a free multi-spyware removal tool that detects and safely removes advertising spyware from your system. Recommended - you will be amazed at what it will find on your own system - be warned though, some spyware like GoZilla! and Comet Cursor will no longer work after running Ad-Aware.
Black Screen - This security application will lock your desktop from unwanted users. There are several display options you can choose from, a totally black screen, capture the desktop, or display a specified bitmap. There is a setup screen where you can define the password, display type, mouse options, and more! There is no installation required, just click on Black Screen and the first time it is launched it will configure your system. Perfect program to secure you desktop with no hassles. Black Screen has a very ingenious mechanism that allows users to enter their password quickly to exit this security program. Blackscreen is freeware.
Eraser Free Data Removal Tool - Eraser Free Data Removal Tool - Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.
ScubXP - ScrubXP cleans a computer from temporary files and registry keys resulting from opening files and or using the Internet. Some of Scrub XP's features: Removes IE History, Removes IE Temporary Files, Removes all files from TEMP directory, Removes IE Cookies, Removes Documents List from Start Menu, Empties Recycle Bin, Clears Autocomplete Entries and Turns it Off, Clears Recent File Lists for Run, Common Dialogs, Recent Documents, Search Assistant, Typed URLs, Paint, Find Computer, Printer Ports, Find Files, Media Player, Previous Tasks, and Real Player. ScrubXP will run automatically when your computer starts. Panic mode can be invoked by double-clicking the icon in your task tray. Panic mode will do all of the above but will also restart Windows Explorer for the ultimate in cleanliness. Freeware for Windows XP.
Cloak - OVSoft - Cloak is an encryption / decryption program, with a difference. Most encryption programs offer only mild security or security based on the complexities of the algorithms deployed. Cloak is different, Cloak facilitates total encryption where each byte of the source file can be encrypted independently with an unpredictable key byte, yielding not just strong encryption, but potentially total security of the encrypted file in transit provided the keys are kept safe and not recycled. Any computer files can be encrypted and keys can be generated by the program or you can create your own keys and then import them into Cloak. Cloak also provides for secure messaging. In this mode of operation, text messages are keyed in and encrypted. The difference in this mode of operation lies in the decryption process, messages are decoded to screen in a horizontal text scroller. There are additional security benefits by this form of message handling. Without decoding to file, the possibility of the recipient compromising security by leaving a decoded file or print out available to interception is reduced if not avoided completely. Both the sender and the recipient of encrypted information must have Cloak installed and the key used to encrypt the data.
Freeware PlaceFreeware Files, free software, freeware games, free screensavers and freeware utilities are added regularly to Freeware Place, so bookmark this site (Press Ctrl and D) and check back often. Send suggestions for freeware to Webmaster at the Freewareplace Domain. Freeware Place: The web's best freeware in one place.
Freeware PlaceFREE GRAPHICS and FREE WEB TEMPLATES!
I would like to have some high traffic freeware site buttons and text links here. Would you like to link to the Freeware Place?
The Freeware Place is a pop-up free freeware zone!
If you find the Freeware Place pages useful please consider linking to Freeware Place<A HREF="http://www.freewareplace.com/">Freeware Place</A> : The Web's best Freeware in one place.
This text link will look like this:
Freeware Place : The Web's best Freeware in one place.
This text link can be edited/shortened to fit the space you have available.
© Copyright FreewarePlace 2004, All Rights Reserved