Monitoring Tools :
Microsoft Sysinternals Process Explorer Monitor running processes Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded. The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work |
Download | |
StatBar StatBar is a freeware system status bar which provides a handy, orderly overview of your system's condition. StatBar comes with 6 different color schemes and 19 information modules, allowing you to monitor and control various aspects of your system. This includes memory, CPU and disk usages, system uptime, Winamp control, network throughput, Internet time synchronization, and more. It features a built-in update check as well, which can download and install the latest version for you. |
||
API Monitor that monitors and displays API calls made by applications. Its a powerful tool for seeing how Windows and other applications work or tracking down problems that you have in your own applications. The current version include Filters to monitor the following API Categories.
Features
API Filter – API’s can be filtered based on their category.
Only API’s from the selected categories will be monitored. All other API’s will
be bypassed.Process Filter – A process filter is used to select processes that are to be monitored. You can either specify an include process filter or an exclude process filter. The process filter can also be disabled, so that API Monitor will include all processes. Detailed API Information – For each API call made by an application, the following information is displayed Information Description, and much more... |
Download | |
Microsoft Process Monitor Monitor running processes Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit. |
Download | |
Emsa Bandwidth Monitor It also allow viewing extended Net adapter interface settings, like MAC address, speed, etc. It allows viewing traffic data per interface or as a whole. It can be set to autorun at system startup. This program has been designed with simplicity in mind, but usefulness for the user. Important Installation Note: This product requires the VB6 Runtime which should be downloaded from Microsoft (1MB). Please install the runtime before running the program (and reboot if asked). Please note that on some systems (XP and above) the runtime usually does not need to be installed. Download Microsoft VB6 Runtime Here |
Download | |
Winsonar 2008 Ultimate Edition Winsonar 2008 is a program specifically designed for process monitoring and system protection from unknown processes. The basic idea is that if the user could know a new program silently installed into memory, he could take appropriate countermeasures. The program detects new processes running into memory alerting the user. The on-line status is also detected, asking then the user if an automatic termination of any unknown process is desired (this option can be also enabled by default). This leads to an active protection against trojan\spyware-infected e-mail attachments. From version 7.xx an automatic "learning "feature is present: on first 5 program-startup all unknown programs will be accepted as safe, avoiding several initial alerts by Winsonar for all the programs normally in use during work sessions. |
Download | |
K1 System utility for Windows XP/2003 It retrieves a detailed list about your operating system and hardware informations. K1 has also some options to manage your computer: - Shutdown, reboot, hibernate, stand by, log-off or lock computer. - Manage services. - Change Windows elements color. - Manage processes. - Registry tweaker (optimize registry + services). - KCleaner (delete cookies, temporary Internet files, recent documents, empty recycle bin, Applications history files and Windows temporary files. - A password generator. - A shortcut maker. - A "Quick-Launch" accessible from the systray. - Manage screen saver. - Turn off monitor. - Show/Hide Windows's elements (systray, traywnd, start up button, desktop). - Disconnect from Internet. - Search on Internet (Google/Yahoo) or on your computer (accessible from the systray). - A Whois query + a TCP/IP Analyzer via http link. |
Download | |
Huge Brother Local Server Monitor Huge Brother Server Monitoring Service will monitor your servers 24/7 to alert you if your customers are having difficulties using your Internet services. We support the following services: HTTP, SSL, SMTP, POP, IMAP, NNTP, SSH, Telnet, FTP and any other text-based TCP service. We can also check many services that are not text-based - for example, we can test Windows networking (SMB) and DNS. |
Download | |
Samurize Samurize is an advanced system monitoring and desktop enhancement engine for Windows 2000/XP/2003. IT professionals, overclockers, gamers and desktop modders alike use Samurize for system information, weather reports, news headlines and much much more. And best of all, Samurize is 100% free! Samurize's rich feature set includes: • an unrivalled set of built-in meters (Disk utilization, CPU usage, network traffic, system temperatures...) • ultimate customizing and skinning possibilities with no programming knowledge required • monitoring your own computer or others over a network • tiny memory footprint and CPU usage • the first system monitoring tool with a true WYSIWYG editor • full extensibility via scripts and plugins with a powerful plugin SDK/API • minimal software requirements (no .NET or Service Packs necessary) • multimonitor support • many usage options (desktop, taskbar and clock clients, server outputting to XML or image formats, screensaver) Samurize: The Only Limit Is Your Imagination. |
Download | |
KL-Detector Use KL-Detector to find out whether your activity is being recorded without your knowledge. It is designed to be able to detect all keyloggers. And it's free. 1. Detect the key logger... using KL-Detector 2. Remove the key logger... by yourself |
Download | |
PhoneTray Free PhoneTray uses your modem to identify the callers before you answer the phone. You must subscribe to the Caller ID service from your phone company and have a Caller ID capable modem. When a call comes in, PhoneTray rings and shows a balloon with the caller's name and number. The program can also display full screen so you can see who's calling from a distance. PhoneTray also announces incoming calls using text-to-speech engine. You can select to announce caller's name, number or both. PhoneTray allows you to assign names to your frequent callers. The name you assign will be displayed and announced instead of Caller ID info. You can set a different ringtone for each caller or type of callers. 20 ringtones are included with the program plus you can use any wav file. Keep a complete history of your incoming calls Protect your privacy Zap telemarketing and other unwanted calls |
Download |
Power Tools :
Faber ToysAnalyse application threads and more Faber Toys is a system utility, mainly developed for power users who want to know what's going on in their Personal Computer. It may also be used by programmers as a tool for tracking their applications. It's an all-in-one Process Viewer, Module Lister, AuroRun Manager, Windows Explorer, Alias Manager, PE Analyzer --------------------------------------------------------------------- |
Download | |
ConfigInspector ConfigInspector displays the most important information about you system. The application possesses the same features as Windows XP task manager and much more! Key features of ConfigInspector Displays list of working applications; Displays list of working processes; Monitors the memory status; Monitors the CPU and network utilization;. Displays the full list of CPU capabilities; Displays important Windows OS parameters; Displays Windows Network parameters;. Displays HDD status and information;. Displays videocard information; Displayes soundcard information. --------------------------------------------------------------------- |
||
SmartBusterUinstaller Smart Buster is a unique, compact, simple, user friendly little application that combines many functions: Uninstall programs much faster than Windows Add/Remove Programs You can uninstall as many as you want at once .Files left behind by uninstallers and invalid uninstaller references will automatically be removed. Terminate programs or windows that take to much time to close or are not responding.With one click you can close all non Windows processes or free up RAM. Simplest way to clean junk files (cookies,browser cache,temp folders,junk files in root,etc) and destroy any traces of using the PC(browser history,typed urls,recent docs,index.dat files and more..) but in the same time a good way to see what others have been doing on your PC...and if you want more you have plugin support! Split a large file in multiple fragments to fit medias like foppys,CD-s,memory cards etc.To unsplit a file you don't need SmartBuster.You only have to run a bat file! and much more... --------------------------------------------------------------------- |
||
StarterStartup manager for Microsoft
Windows As a primary purpose, Starter allows one to view and manage all the programs that are starting automatically whenever operating system is loading. It enumerates all the hidden registry entries, startup folders' items and some of the initialization files, so that the user could choose to temporarily disable selected entries, edit them, create new, or delete them permanently. Secondary purpose is to list all the running processes with possibility to view extended process' information (such as used DLLs, memory usage, thread count, priorities etc.), and to terminate selected process (even a Windows NT service, having enough access rights). Another one is Windows' services (and drivers) manager with some advanced features Last Updated 12 December 2009 --------------------------------------------------------------------- |
||
WheresJames Startup Manager Is your computer running a little slow these days? There are several programs running on your computer right now doing nothing useful. Just hogging precious memory and CPU cycles. WheresJames Startup Manager will allow you to view the programs that start with Windows and disable or delete them if you like. --------------------------------------------------------------------- |
||
TaskSwitchXPAlt-Tab Replacement For XP
TaskSwitchXP is an advanced task management utility that picks up where the standard Windows Alt+Tab switcher leaves off. It provides the same functionality, and adds visual styles to the dialog and also enhances it by displaying thumbnail preview of the application that will be switched to. TaskSwitchXP allows you to minimize windows to the system tray and take many other actions on tasks. You can easily minimize, maximize, restore, close a window or even kill the process. All this can now be done from the Alt-Tab switching window on the fly without having to run Windows Task Manager. Note: TaskSwitchXP does NOT support Windows Vista and 7, use VistaSwitcher on the new OS. --------------------------------------------------------------------- |
||
Microsoft PowerToys for Windows XP Note: We take great care to ensure that PowerToys work as they should, but they are not part of Windows and are not supported by Microsoft. For this reason, Microsoft Technical Support is unable to answer questions about PowerToys. PowerToys are for Windows XP only and will not work with Windows Vista. Important • If you installed PowerToys prior to April 23, 2002, you must uninstall your old PowerToys before installing the versions available here. • PowerToys only work with U.S. English regional settings --------------------------------------------------------------------- |
||
VistaSwitcher Alt-Tab Replacement For Vista and 7 VistaSwitcher is an elegant and powerful task management utility for Windows OS. Once installed, it replaces the default Windows Alt-Tab dialog with a nice box that shows a list of all running tasks, with their names and preview snapshots, and enables the user to take actions on them using the mouse and keyboard shortcuts. With just one click, you can switch tasks, minimize, maximize, restore the main window, or close the process. The main advantage of VistaSwitcher is a brand new Alt-Tab switching window. Unlike to the stadard Alt-Tab, VistaSwitcher shows a full-sized preview of each task window and easy-to-read relevant lists of tasks running, all shown clearly with titled icons so you can find the one you need within seconds. Conveniently, you don’t have to press the Alt-Tab repeatedly to finally select the required application. Navigation is much easier (and more intuitive, too); simply hover your mouse over the desired task or select it with the arrow keys on your keyboard. With VistaSwitcher, finding the right window is a breeze! Also, you can switch between open windows with only the mouse. No keyboard shortcuts required! Just hold your right mouse button down and scroll the wheel up or down to select the window you want --------------------------------------------------------------------- |
||
AutoIt v3 Automation tool AutoIt v3 is an opensource BASIC-like scripting language designed for automating the Windows GUI. It uses a combination of simulated keystrokes, mouse movement and window/control manipulation in order to automate tasks in a way not possible or reliable with other languages (e.g. VBScript and SendKeys). AutoIt can: Provide a general-purpose scripting language Execute Windows and DOS executables Simulate keystrokes (supports most keyboard layouts) Simulate mouse movements and clicks Move, resize and manipulate windows Interact directly with "controls" on a window (set/get text from edit controls, check boxes and radio buttons, select items in drop-down lists, etc.) Work with the clipboard to cut/paste text items Work with the registry. Last Updated 15 January 2010 --------------------------------------------------------------------- |
||
Windows Startup Inspector Startup Inspector for Windows can thus provide a consultative information on the programs that are running at your Windows startup process. Whether a program is necessary to the system, or is the program a spyware. Scans all programs that are in the Windows Startup Folder, Registry and provide you with a background information of the program. Remove harmful programs like spyware, virus, dialers, make your system healthier. Remove unnecessary programs like reminders, monitors, improve your systems performance. --------------------------------------------------------------------- |
||
Vispa Open-source software to tweak windows Vista There are many reasons why you wouldn't want your operating system connect to Microsoft's server, be it for practical reasons or pure idealism. Based on the source-code of the award-winning xpy (version 0.9.8), Vispa allows you to easily tweak your Windows Vista for better privacy and security, even system performance. Do a few clicks rather than finding the write registry keys or program settings. The only recommendation I can give is not applying settings without vague knowledge of what you're doing. Not every setting is desired in every environment. Vispa is no tool for beginners, just a more convenient way of tweaking your operating system. Important: Some antivirus software might report Vispa as Spyware or a Trojan. Vispa is an executable written and compiled using NSIS, false-positives are unfortunately quite common among NSIS compiled programs. The NSIS development team is aware of this situation and constantly works with software companies to solve such issues. Last Updated 10 September 2007 --------------------------------------------------------------------- |
||
WinOverBoostSystem Tweaker
WinOverBoost allows you to tweak several aspects of your system, in an attempt to improve your overall system performance and Internet connectivity. It includes a RAM and Swap file optimizer that offers a graphical display of current RAM and CPU usage and allows you to defragment your memory. In addition, the program can apply several operating system specific tweaks that are known to improve performance. The additional TCP/IP tweaking tool can optimize your Internet connection settings to take full advantage of your connection type. All the changes that are made by the program can be easily undone as needed, so it is safe to use and experiment. Additional features include automatic memory cleaning, interactive tray icon and a nice interface. --------------------------------------------------------------------- |
||
Clean RamClean up your PC
memory Clean Ram designed to clean up your PC memory from unnecessary memory allocation. This will improve overall performance of your computer. Loading and running any applications (word processor, spreadsheet, graphics editor, web browser, etc.) will be smoother and faster than before. You will be surprised to see faster response of your computer. Clean Ram is very simple to use. No training and very minimum user intervention required. Once launched, Clean Ram automatically works in the background. When your available physical memory reaches its critical amount, the software will automatically clean up your PC memory to optimum level. --------------------------------------------------------------------- |
||
Safe XP Safe XP improves your system performance and makes Windows to run faster, more secure and reliable! It is suitable for beginners and experts! The main features of the program are: It allows you to take control of your PC. Make Windows to run faster and more secure. Protect your privacy and strength Internet protection. Disable Spyware-like activities of Windows XP (also 2000&ME&98) Operating System, Media Player, Internet Explorer and Outlook. Disable unnecessary Windows services like System updates, error reporting and much more... Prevent Internet attacks, any RPC/DCOM related vulnerabilities and fix exploits like DSO. Disable script-based attacks on Windows Media Player, Internet Explorer and Outlook. Block Windows Messenger (spam) vulnerabilities. Restrict the actions of potentially dangerous "HTA" (Hypertext Application) capabilities in any version of Windows. It does not need any DLL or another file(s). It is just a single "EXE" file: SafeXP.exe No installation necessary. --------------------------------------------------------------------- |
KeePass Password Safe Professional Edition Free open-source password manager KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. So you only have to remember one single master password or insert the key-disk to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). KeePass FeaturesStrong Security Multiple User Keys Portable and No Installation Required Export To TXT, HTML, XML and CSV Files Import From Many File Formats Easy Database Transfer Support of Password Groups Time Fields and Entry Attachments Auto-Type, Global Auto-Type Hot Key and Drag&Drop Intuitive and Secure Windows Clipboard Handling Searching and Sorting Multi-Language Support Strong Random Password Generator Plugin Architecture Open-Source! |
||
Password Safe Password Safe allows you to manage your old passwords and to easily and quickly generate, store, organize, retrieve, and use complex new passwords, using password policies that you control. Once stored, your user names and passwords are just a few clicks away. Using Password Safe you can organize your passwords using your own customizable references—for example, by user ID, category, web site, or location. You can choose to store all your passwords in a single encrypted master password list (an encrypted password database), or use multiple databases to further organize your passwords (work and home, for example). And with its intuitive interface you will be up and running in minutes. Last Updated 21 March 2011 |
||
ID Vault Password and credit card manager ID Vault provides complete protection against identity theft and fraud for your online accounts. It encrypts your passwords, usernames and credit card information securely on your PC. ID Vault also logs you in without typing and creates a secure end-to-end connection between your PC and online accounts. Hardened Security in 3 Easy Steps1: Add the online accounts you want to protect to ID Vault just once, then choose the account you want to log in. 2: Enter your ID Vault PIN. 3: ID Vault automatically logs you in to your account. No need to remember any usernames and passwords! Behind ID Vault’s sleek and intuitive user interface is serious security designed to protect users from password stealing malware. ID Vault uses a unique, three-tier security architecture to thwart cybercriminals: Two-Factor AuthenticationA PIN-protected vault stores usernames, passwords and other information needed to log on to websites using a two-factor authentication process. PINs are remotely authenticated by White Sky geographically distributed servers to ensure that criminals are not able to access information even if someone were to steal a user’s PC. Remote authentication also protects against dictionary attacks against the local ID Vault credential store. IP WhitelistA white list of over 8,000 financial and shopping sites that is continuously validated. When users log-on to a monitored Web site, ID Vault checks the IP address and domain to ensure that users are not phished, pharmed or redirected. It also verifies the presence of a secure SSL connection before proceeding with the log in process. Secure View Private BrowserThe ID Vault SecureView™ browser opens a secure connection to financial websites and submits credentials automatically to protect users from a variety of network, key logging, screen scraping and Trojan-based attacks. SecureView also blocks malicious browser plug-ins that may compromise system security. Last Updated 16 Febuary 2010 |
||
Access Manager 2 Access Manager is a FREE software solution that keeps all your passwords in one, simple to use list. It offers fast, easy and secure password management. One 'Master Password' is all that is needed to access all your passwords and private information: requires the Microsoft .NET Framework version 2.0 |
Download | |
Cute Password Manager Never Lose Your Passwords Cute Password Manager (CPM) is a free form filling software that auto fill userID and password. CPM stores your web logins on your local machine with 256-bit AES encryption and performs a true "one click login" for you. It is a fast, easy and secure password manager. One 'Master Password' is all that is needed to access all your passwords and private information. This is a MUST HAVE software if you have several web email accounts or just web logins. Here are some key features of CPM: Fights Phishing by filling passwords only on matching web sites. Generates strong passwords that hackers cannot guess by password generator. Encrypts your passwords with AES algorithm into your local hard drive. Logs in web sites with One Click. Memorizes all your passwords and logs you in automatically. Saves & fills out web forms automatically. Backs up & restores your passwords, so that you do not need to retype them when re-installing CPM. Imports & Exports your passwords with text and csv format fil |
||
LastPass Password Manager The last password you'll have to remember lastpass is an online password manager and form filler that makes web browsing easier and more secure. Create strong passwords, knowing you only have to remember one. Log into your favorite sites with a single click Fill forms in a second; stop pulling out your wallet to get your credit card number. Access and manage your data from multiple computers seamlessly Securely share logins and notes with friends and let others share with you. |
||
AI RoboForm One-click website logins AI RoboForm is a secure password manager that can automatically log you into your web accounts with a single click. The program can automatically learn from a new login, just click the a button to save the current login information - the next time you want to access the site, you can do so with a single click. Your stored logins are securely protected by a master password and AES encryption, so there is no need to remember individual password, or to use insecure passwords in order to remember them more easily. In addition to secure password storage and automatic logins, RoboForm also includes an automatic form filler, that uses Artificial Intelligence to populate common form fields (name, address etc.) whenever you encounter a web form to fill Besides the obvious convenience of one-click logins, the program also adds an additional level of security by restricting password entry to matching sites, and bypassing keylogger captures (sine you don`t have to type the password). RoboForm works with Internet Explorer, AOL/MSN, and Firefox. |
||
Spytech PasswordLock Securely store your passwords Spytech PasswordLock is an easy to use utility for storing all your sensitive passwords in one secure place. You can add as many passwords to your secure encrypted, password protected list for easy password management. |
||
Cresotech DesktopSafe Lite DesktopSafe provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. Cresotech DesktopSafe protects your confidential information from being viewed. Instead of memorizing dozens of passwords, nicknames, numbers, etc., you have to remember the only password - the one giving you access to whole database. |
||
SoftFuse Password Generator Free SoftFuse Password Generator Free is a small freeware program designed for generating random passwords easily and quickly. Using SoftFuse Password Generator Free, you can easily create random passwords up to 12-character length. While generating a password, you can use letters, digits, uppercase and lowercase characters, as well as their combinations. Very fast, small and simple-to-use software! Protect you important documents more securely than usually! With SoftFuse Password Generator Free, you can easily create random passwords for anything you need - for your e-mail account, for your instant messenger, for Web services, etc. |
||
Oubliette A Full-featured password manager, with strong encryption and full source code. Store and manage passwords for your internet accounts, PIN numbers, credit cards, etc. Securely encrypts data with Blowfish or IDEA ciphers. Flexible and configurable, easy navigation, powerful search. Group accounts by customizeable categories. Two viewing modes. System tray icon and activation hotkey. Exports to plain text, HTML, CSV, INI. |
||
Password Keyper Password Keyper is the answer to all of those account passwords and logins you have managed to collect, and can never find. The Keyper is a totally secure data storage and retrieval system, that puts access details for ALL of your accounts at your fingertips. The key feature of THIS software is a guarantee that NO connection to the internet is attempted. The Password Keyper stores your data fully encrypted on your hard drive, using encryption that is based on YOUR MACHINE. A Keyper data file can NOT be viewed on ANY OTHER machine. |
||
Password Depot 4 Password manager Password Depot 4 protects your important and confidential passwords from external access while offering maximum user-friendliness! Highlights of Password Depot 4 And more! Note: Test the new version for 30 days for free! After 30 days you can use the program in freeware mode or purchase the Professional Version Last Updated 09 April 2010 |
||
PINs PINs is a free feature-rich Windows program for safe and comfortable storing of any secure information like passwords, accounts, PINs etc. PINs uses a secure 448 bit Blowfish algorithm to ensure the data are not crackable. The password used for securing access to stored data is not saved anywhere. PINs does not require installation and does not need any special dlls, drivers or system files which can mess up your system. This means that PINs can run directly from floppy - including data files - without installing anything. This is extremely useful if you wish to easily access your data on other computers as well. |
||
Password Agent Password Agent is a password manager program that allows you to store all your passwords, secret notes and data snippets in a single, easy to navigate, and secure database. Too many passwords to remember? Pieces of paper that you once used to write down your important account information are lost? Want to find required password quickly? Password Agent keeps track all of your different passwords - no problems, no worries. And, it keeps strangers away from accessing your private information. |
||
Any Password Any Password is an easy-to-use tool that lets you store and arrange all your passwords, user IDs, and related information in a tree form. The program saves this information in encrypted files which can be protected by a password. So, the only thing you need to remember is the password for the file. Any Password can also generate random passwords with specified parameters (length, used characters, etc.). You can find any stored information using the incremental search feature. |
||
WinGuard Pro Free Edition Give yourself peace of mind by securing your computer with WinGuard Pro Security Suite. WinGuard Pro Security Suite is a Freeware program that can secure your computer using Triple Layer Locking (TLL). The TLL adds password protection to your Windows Programs, Encrypts your Files and Folders and provides Extra Locking for tasks such as; Internet sessions, Registry Access, Restricting Task Manager, etc. Key Features: Lock Any Program with a Password Encrypt Files, Folders & Drives from Windows Explorer Disable Software Installation Password Protect Windows Explorer Password Internet Explorer, FireFox and Downloads Restrict Registry and Task Manager Works Alongside any Antivirus/Spyware Program Last Updated 01 November 2009 |
Shutdown Utils :
Brutus 2006 In Windows 2000, Windows XP, and Windows Server 2003, you can also lock your computer with a single click. You can use Brutus Control Panel to decide if Windows should make a normal or forced exit when you are using Brutus to log off, restart, or shut down. ----------------------------------------------------------------------- |
Download | |
X-ecutor ----------------------------------------------------------------------- |
||
Slawdog Smart Shutdown Slawdog Smart Shutdown is a free, commercial-quality shutdown utility for Windows 95, 98, ME, NT, 2000, XP, and 2003. The program is based on an easy 1-2-3 interface and has an immense number of shutdown options. It allows you to shut down, log off, reboot, lock, turn off, hibernate, disconnect from the Internet or network, enter standby mode in Windows, and shut down and reboot computers in your network--all both manually and automatically. Its built-in Smart Shutdown technology can shut down your computer if you are inactive for a specified period of time. Plus, with its Easy Shutdown technology, you can shut down your computer with just a single click. The program displays options available in your OS only, supports command line options, and uses little system resources. In addition, our exclusive Dependable Timer System technology, ErrorGuard, and other similar features give you a 99.9% guarantee that your system will be shut down on any occasion, according to our tests. Slawdog Smart Shutdown will run on all versions of Windows. Last Updated 25 January 2010 ----------------------------------------------------------------------- |
||
ShutDownPro ----------------------------------------------------------------------- |
||
Shutter Automatic shutdown tool Shutter is a multifunctional shutdown utility, which has a user friendly and easy-to-use interface and supports many different Events and Actions. Shutdown Events: Countdown, On Time, Winamp Stops, Low CPU Usage, User Inactive, Battery Low, Window Closes, Process Stops, Ping Stops; Shutdown Actions: Shutdown, Reboot, LogOff, Lock Workstation, Sleep, Hibernate, Monitor Turn Off, Mute Master Volume, Alarm, No Action; Also, it is able to play a custom sound and/or run a program of your choice, in addition to the simple shutdown message. Optionally, Shell Links can be created to immediately execute any of the supported actions from the desktop. Web Interface - allows Remote Execution of any Action, it also displays some run-time information about the computer: Logged In User, Up Time, List of Processes, Screenshot of a Desktop. ----------------------------------------------------------------------- |
||
Turnoff Master Features include: Turnoff, Reboot, Log Off or hibernate your computer when: A period of time has elapsed (up 100 Hours) At exact time (up 1 year). When another specified program has terminated. ----------------------------------------------------------------------- |
||
LogonStudio LogonStudio comes built with a visual editor to make it easy to create your own logons which can then be uploaded to websites to be used by others users. LogonStudio uses .logonxp files rather than requiring users to replace their actual logonui.exe. ----------------------------------------------------------------------- |
||
Quick ShutDown an accurate miniature icon appears on the taskbar on the end opposite the "Start" button. You can choose to click or double click it with the left mouse button, and it shutdowns or reboots your computer. You can set a keyboard shortcut for any action - shutdown, reboot, hibernate, standby, lock, logoff and media eject. Quick ShutDown allows you to set your own tray icon to be displayed. Click it with the right mouse button to view the context menu. Also, QSD can automatically terminate applications if they are not responding making shutdowns both quicker and safer. In addition, Quick ShutDown can eject removable media drives at shutdown preventing you from losing your disks and CDs by leaving them in the drive when you leave. ----------------------------------------------------------------------- |
||
Autoclose CPU usage - Several types of shut down (shut down, restart, ...). - User friendly interface. ----------------------------------------------------------------------- |
||
AMP WinOFF Shut down the computer at certain hour (e.g. at 12:00). Shut down the computer in several minutes (e.g. in 15 minutes). Shut down the computer when the CPU becomes idle. Several types of shut down (shut down, restart, log off, power off, suspend, hibernate and lock computer). Option for hang up the modem instead of doing a shut down. Option for set a password to protect the access to the configuration. Complete command line support for batch process. Option for capture the desktop and/or execute a program before the shut down. Option for run the program when starting Windows session, for daily programmed shut down. Immediate shut down and computer lock from the traybar icon menu. Option for show an alert window, which allow the cancellation of the shut down. ----------------------------------------------------------------------- |
||
One-Touch Shutdown Stand By or even Reboot. Plus theres a few extra features like "Eject CD". One-Touch Shutdown is free for personal and non-profit uses. ----------------------------------------------------------------------- |
||
DShutdown Shutdown network machines DShutdown is a stand-alone program that allows you to easily shutdown and wake up local or remote PCs, with many specific options. DShutdown supports more than just standard shutdown options, there are options relating to "pure" shutdown (such as the "force after wait" option which causes a forced, but 'clear' shutdown). There are monitoring options that allow you to shutdown a PC after a particular application terminates (useful at the end of compressing several files). There are also options to shutdown a PC when Internet traffic reduces below a particular data-rate (useful to shutdown a PC when it has finished a large download). It is also possible to intercept a shutdown request, initiated by the user or an application, and to then execute the shutdown request with selected options from DShutdown. (For example: to simultaneously shut down all Lan PCs when the server shuts down). DShutdown doesn't force a power-off without logging off and saving settings. DShutdown instead provides a means to log-off, shutdown and safely power-off your PC. Administrators who use roaming profiles will appreciate the benefits of this feature ----------------------------------------------------------------------- |
||
Restart the computer will shutdown and restart with the selected operating system. The program also includes a command to shutdown the computer, a schedule function, and advanced settings for uncommon configurations. ----------------------------------------------------------------------- |
||
Poweroff shutdown/reboot/logoff/poweroff/Standby/Hibernate/Lock/Wake-On-LAN at a certain time. I also support command line options that allows poweroff to be used in batch scripts. It has a built-in scheduler, it allows you to run a program before doing the action, you can give a warning message to the user, wait for a process to finish before doing the action and full remote control is supported. ----------------------------------------------------------------------- |
||
SkimExit When SkimExit is running, an icon appears on the system tray. When you click it with the left mouse button, it shutdown your computer. When you click it with the right mouse button, appears local menu for shutdown/restart/logoff Windows. You can use hotkey Win+X for shutdown computer. SkimExit is capable clean up all the recently accessed documents in your Start button Documents list from local menu and before shutdown. Installer/uninstaller included. ----------------------------------------------------------------------- |
Encryption and Locks
TrueCrypt Free Open-Source Disk Encryption Software TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space). This software is highly recommended for securing data on laptops. TrueCrypt performs the following tasks: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Last Updated 08 September 2010 |
||
Cryptainer LE Phenomenally easy to use, Cryptainer LE's encryption works with all 32 bit as well as 64 bit versions of Microsoft Windows (95/98/ME/2000/2003 Server/XP/Vista/Windows 7) and with all known file types. Cryptainer allows you to password protect and secure any file or folder on any media, including removable drives (Flash Drives, CD ROM's etc.) Cryptainer can be installed directly on a USB / removable drive as a "stand alone" install. One can carry this installation of Cryptainer ('Cryptainer Mobile') to different machines without having to install Cryptainer on the host machine. You can protect your files and folders and ensure total privacy with Cryptainer LE. Simply drag and drop the files and folders you want to hide and voilà! Your files are hidden! With Cryptainer LE you can hide the very existence of your confidential files and folders. Additionally, Cryptainer LE allows you to send encrypted email files. The recipient need not even have a copy of Cryptainer LE installed to decrypt the files. Last Updated 11 January 2010 |
Download | |
CompuSec PC Security Suite The product has been thoroughly tested and no bugs were known at the time of the product release. However, we cannot guarantee that the product works with all possible PC configurations nor is 100% bug free. CE-Infosys commits to maintain the product and provide future releases. Customer feedback and recommendations are welcome. The product is free in object code, but not in source code. Please read carefully the license agreement during the product installation. This software is FREE for both Professional Business use as well as Personal use. FREE online support are available. Supports all Windows OS with 32-bit editions (Windows Vista, Windows XP, Window 2003, Window XP Tablet Edition & Windows 2000). A FREE version for Linux is now available. Function overview of the FREE CompuSec® Software Version: Pre boot access control Encryption for Hard disk using 256-bit AES algorithm and in hibernation mode Encryption for CD / DVD for secure publishing and sharing of CD data using CDCrypt Encryption for Diskettes and Removable Media Devices such as ZIP drives, USB thumb drives or Memory sticks Encryption of Individual Files or data transmitted via Email and FTP using new DataCrypt Encryption of Server Files & Subdirectories using SafeLan Single-Sign-On at Windows Identity Management for password encryption, policy database query, and supports BioClick for secure transactions based on fingerprint recognition [ClosedTalk]® for secure VoIP communication Intergrated support for Tablet PC [DriveCrypt] for container encryption CompuSec® e-Identity® Version 2-factor authentication prior to booting USB token or smart card access before booting Full PKI integrated Transparent file and folder encryption File server encryption Credential or Certificate used for log-on and Single-Sign-On at the domain server Secure remote password reset Central management of e-Identity® tokens and e-Identity® smart cards User groups and computer pools |
||
Zero Footprint Crypt Lite Utilizing the inbuilt viewers (and media player) of Zero Footprint Crypt you can view many different types of file (including movie and mp3 files) without having to open any other specialized program. As the name of the application implies, Zero Footprint Crypt's unique way of decryption allows you to view encrypted image files without having to decrypt them to the hard disk. This allows for maximum security as the file remains in its encrypted state on the hard disk (leaving no footprint on the drive.) You may choose to either "decrypt to file" or "decrypt to memory". The application is feature packed and includes creation of compressed archives (smaller than zipped files!). - and many other new features. Zero Footprint Crypt is robust, compact and includes heavy duty encryption; with over 50,000 satisfied users we are confident you will enjoy using it. |
||
CryptoExpert LiteStore and
protect your important information CryptoExpert creates encrypted virtual disks and these disks are visible as usual disks with drive letters (for example, G:, H:, Z:, i.e. with any drive letter that is not used by other system devices). The data stored on a CryptoExpert disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using CryptoExpert. Any free drive letter (or choosen letter) in the system may be used to mount and to open an encrypted file-container for access. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk. You can do anything with a CryptoExpert virtual drive that you can do with a normal hard drive; only that with CryptoExpert, the encrypted volumes require password authentication before the files become accessible. Last Updated 11 January 2010 |
||
Rohos Mini DriveCreates hidden and
encrypted partition on the USB flash drive Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. You work with the files on the hidden partition without opening a special program. Those who have megabytes of sensitive files on the USB drive and seriously concerned with a data security, cannot imagine their USB stick without the hidden volume that is created using this tool. It doesn’t require Administrator Privileges to open password protected USB drive partition! Easy to setup, easy to use. Intuitive USB flash drive Setup Wizard automatically detects your USB flash drive and setup an ecnrypted partition properties. You just need to provide a protection password. One click - and you can save your first file into protected volume. Encryption is automatic and on-the-fly. You can access your secret volume by entering a right password. Disk-on notifications help you to know when this volume is visible or disabled. If you click on the baloon the Explorer window will be opened on the disk. If you need to open secured volume on a guest computer, you just click Rohos icon on the USB flash drive root folder and enter disk password. Rohos will start a volume and will sit near the system clock to close the disk when you’ll finish. Features Despite the name “Mini” the program provides a decent portable data security solution. It is specially designed for newbie users. Main Features: Creates a virtual encrypted partiton volume (disk) within a USB flash drive free space Automatically detects your USB stick config and creates encrypted partition Program does not require installation to work with encrypted partiton on a guest computer. You can start it right from USB drive Encrypted partition is protected by password Encryption is automatic and on-the-fly Encryption algorithm: AES 256 bit key lenght. NIST approved. Rohos Disk Browser to open encrypted partition without having Admin rights Virtual Keyboard - to protect your encrypted disk password from a key logger Autorun Folder. Saved program’s/file’s shortcut will automatically start/open up upon disk connection The limit of encrypted partition size is 2 GB Rohos Mini Drive program does not create real partition on the USB flash drive. Thus when you insert your USB drive into USB port only one drive letter will appear in Windows. Second (secured) drive will appear only after you active it by entering a password. System requirements: * Windows 2000/XP/2003/Vista * USB 1.1/2.0 port * USB flash drive or U3 Smart flash drive with 1 Mb or more free space Last Updated 11 January 2010 |
||
PlainText Crypto This software may be also helpful for those who need to send secured texts via email. The encryption algorithm is stable against breaking and encoded texts are effectively protected. |
||
AxCryptOne-click file
encryption AxCrypt is a powerful, yet extremely easy to use file encryption program. It integrates directly with Windows Explorer, enabling encryption, decryption, viewing and editing of any file with just a few clicks of the mouse. AxCrypt uses the AES-128 and SHA-1 algorithms, which comply with US Government and Internet standards. Additional features include creation of self-decrypting files, automatic re-encryption after editing, secure deletion (wiping) of files and temporaries, cryptographic data integrity validation, separate key and data encrypting keys, secure internal memory handler and more. AxCrypt uses a straight forward one-click way to process files. There is no extra interface to configure or open, other than selecting/entering your password. Last Updated 29 May 2008 |
||
ImageHide Simple encrypt and decrypt of data (old Ver 1.0) See how much data you can add in bytes No increase in image size Image looks the same to normal paint packages Get past all the mail sniffers New Version 2.0 Better Encryption Now uses RC_4 encryption plus SHA Hashing Hashed Passwords (now in image) loads and views Ver 1.0 files Now knows Version and if encrypted or not Can now print the images Save Image files as BMP or PNG Can use many different image formats Still Free! |
||
WISeCrypt Users can securely protect, encrypt, decrypt and wipe files and folders on their PC or other storage devices. Users can safely transmit confidential data over the Internet knowing that only the desired recipient can read it. Users can obtain a free publicly trusted X.509 CertifyID secure email digital certificate from WISeKey, to create digital signatures and S/MIME messages using their favourite email programs. Features include: Integration with Windows shell High security using trusted X.509 digital certificates Securing files and folders Wiping files and folders It supports AES (Rijndael), 3DES, RSA, RC4 and other asymmetric and symmetric cryptographic algorithms. |
||
Steganos LockNote Why use Steganos LockNote? Store your most valuable notes as a LockNote Hide your serial numbers, passwords, phone numbers and everyday notes in a safe place. Your informations will be encrypted using a password and most modern AES 256bit encryption technology. Secure, yet simple Just double-click a LockNote and enter your password to access your text files as usual. No installation required Move LockNotes wherever you want, as often as you want. A LockNote document does not require much more hard drive space than an unencrypted document. Encrypt existing text files in no time at all Simply drag and drop existing text files on a LockNote window: they will be encrypted automatically. Open and free LockNote is open source and is based upon open source technologies, e.g. the certified CryptoPP program library for strong encryption. |
||
My Lockbox Keep your private files into password protected Lockbox The protected folder (lockbox) is hidden from any user and application of your system, including Administrator and System itself. It is impossible to access the lockbox not only from the local computer, but also from the net. The program is extremely easy to use. You can set the lockbox location and the password during the setup procedure. After the setup is done, lockbox will be hidden and locked until you enter the valid password. My Lockbox Control Panel allows you easily change basic lockbox parameters: lockbox location, protection status, password. In addition, skinned user interface lets you choose from different skins to select the most comfortable look and feel of the software. The program is effective, easy to use and best of all - it's free. Features and benefits Very easy in use Almost any folder on your computer can be password protected Instant protection - no file scrambling or moving to another place Lockbox folder is inaccessible even by the system administrators Lockbox folder is inaccessible both locally and remotely. Lockbox folder can be protected in Windows safe mode Windows XP x64 support Hotkeys support - you can popup Control Panel with a simple keystroke. Skinned user interface Freeware |
||
PowerCrypt Encode multiple files at a time, manage your archives, compress data for better disk space usage and create packages with multiple encrypted files. LAN shared folders are supported as local directories. New versions offer advanced features as fast MD5 checksum performing and filename encoding. Secure your communications with encrypted messages and attachments. Get the capability to send email with no more dangers from other buggy email clients like Outlook or Eudora. Get three goals at a time: maximum security, easy usage and fast encryption. |
||
Iron Key The encrypte file is a self-extracting executable - your correspondent must run it and enter the right password for decrypting. No crypto software needs to be installed on the receiving side! |
No comments:
Post a Comment