Standalone application that identifies and removes viruses and worms in the system. Designed as an addition to standard anti-virus programs, it can be run without having to be installed - useful for systems that are already infected.
Hides files and directories on local or removeable memory media to protect them against unauthorised access. You must enter a password before you can display the data. According to the manufacturer’s notes, this is only designed for domestic use. More powerful tools should be used to protect sensitive company data.
Software for computing and validating hash values; supports algorithms CRC-32, MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, plus SHA-512/224 and SHA-512/256. calculates checksums for files, directories, or entire drives, also allows Unicode file names or folders; versions available for private (PE) and commercial purposes (CE) with extended features, each as 32- and 64-bit versions. Fast and secure download from The H
Cloud-based real-time anti-virus protection software which connects to the Panda Labs Collective Intelligence Server to offer the best possible protection, even against the newest threats. Also uses behaviour-based detection to prevent harmful processes from running on the computer.
Use this tool to protect your computer against attacks from the internet (hackers, trojans or spyware). It provides an overview of all inbound and outbound network traffic so you can identify all the suspicious programs and their activities.
Transparently embeds a Dropbox directory as a drive in Windows and encodes files stored there according to the AES 256 standard. Works with individual files and decrypts these by reading them in real time so that they can be used as unencrypted files.
Beta security platform for mobile devices. Provides encryption of the entire system, including a firewall blocking outgoing connections from Android apps and selective permission for apps to communicate with specific servers.
Tool based on rainbow tables for the recovery of Windows passwords. Also uses a time-memory trade-off and comes with a graphical user interface to ensure the tool is easy to use. Contains a brute force module for the detection of more simple passwords.
Package consisting of GnuPG, WinPT Tray and GPGrelay, plus plug-ins and tools that allow the use of the encryption technique, PGP. GnuPG is a special build that integrates the Tiger hash algorithm, and IDEA, which without a seperate module generates RSA keys with a length greater than 4096 bits. Fast and secure download from The H
Manages data in a protected folder; provides features for encryption of data and passwords on the PC, in the cloud, the network and on external data devices; contains a password safe that encrypts user names and passwords, for example for online banking, for individuals and in a multi-user mode; also available as a fee-based Pro version with extended functionality. Fast and secure download from The H
Linux-based live system for deleting data from hard disks in such a way that it can’t be restored. Prevents the data from being passed on when the hard disk is sold. Available as an ISO file and as a boot CD, as well as an installer for Windows, which creates a bootable DBAN floppy disk.
This tool functions in a similar way to Net Stumbler. It’s written in AutoIt and is used to detect WLAN Access Points. Uses the ‘netsh wlan show networks mode=bssid’ Vista command to display WLAN information and imports or exports the access points’ GPS data from or to a KML file. Also available as Version 9.1 Beta 3 at Sourceforge. Contains adware.
Displays a range of system information about processes, installed drivers, add-ons and connections. Creates registry and file snapshots so they can be compared with earlier data to better track system changes. Apart from the installer, the program is also available as portable software.