access control. encrypts downloads

Dashlane

6.2416.3 download

... dealing with your multiple Internet accounts. Dashlane encrypts your personal info, so it's accessible with a key only you have. Not even ...

New Version

AVG Internet Security

24.2.3325 download

... ICQ. Enhanced Firewall Blocks hackers attempting to access the private data stored on your PC. Stops ... data securely using processes that prevent them being accessed or recovered by someone else. Data Safe ...

AVG AntiVirus Free

24.2.3324 download

... with a central management module where you can access its components, lets you choose from several scan ... ICQ. Enhanced Firewall Blocks hackers attempting to access the private data stored on your PC. Stops ...

Cryptainer Enterprise Encryption Software

17.0.2.0 download

... Other Cryptainer installs will not be able to access your data even with the password. Administrative module ... ensures complete security for your data and protects access to your data. Hides all data on any ...

Trend Micro Titanium Maximum Security

17.7.1634 download

... settings and control who can contact you and access your personal information. Titanium will identify which settings ... This feature lets you control which apps can access your bio, who can tag you, see your ...

Cyclonis Password Manager

2.4.2.133 download

... institutions, and in military applications. Cyclonis Password Manager encrypts your vault using your master password. Your master ... your eyes only. Your data cannot even be accessed by Cyclonis staff or servers as we never ...

Copysafe Video Protection

7.0 download

... - Distribute with total control over who can access them. - Control how many times a video ... compression or loss of quality after encryption. - Encrypts and plays video files of 1 GB and ...

Smart .NET Obfuscator

8.7.1 download

... by making it difficult for a third-party to access your .NET project’s source code. If your whole business based on the IP embodied in your software or you do not ...

.NET Obfuscator Standard Edition

8.8.3 download

... A side effect, though, is that someone with access to your binaries can recover a good approximation of the original source code. The idea for Skater is simple. When we ...

KeyScrambler Premium

3.11.0.3 download

... (UAC). This feature helps prevent keyloggers from gaining access to your critical systems. It also reduces risks that a single breached computer will allow an intruder to compromise other workstations ...

Cyclonis Password Manager Mac

1.0.9.57 download

... institutions, and in military applications. Cyclonis Password Manager encrypts your vault using your master password. Your master ... your eyes only your data cannot even be accessed by Cyclonis staff or servers as we never ...

AVG Internet Security 2016

17.8.3036 download

... ICQ. Enhanced Firewall Blocks hackers attempting to access the private data stored on your PC. Stops ... data securely using processes that prevent them being accessed or recovered by someone else. Data Safe ...

AVG Anti-Virus 2016

17.6.3029 download

... data securely using processes that prevent them being accessed or recovered by someone else. Data Safe Encrypts and stores your valuable documents, pictures or any ... WiFi Guard Helps you avoid the rogue WiFi access points used by hackers by alerting you when ...

Disconnect for Windows

2.0.5 download

... it defeats Internet censorship and allows you to access content freely without revealing your true location and IP address (Paid). Sixth, it lets you easily understand - at a glance ...

CrossLoop

2.82 download

... give a colleague, a friend, or a relative access to your computer. After installation, your PC will be assigned a 12-digit access code each time you start the program. You ... desktop. Once connected, that user will have full access to your machine. How it Works ...

CrossLoop for Mac OS X

1.51 download

... give a colleague, a friend, or a relative access to your computer. After installation, your PC will be assigned a 12-digit access code each time you start the program. You ... desktop. Once connected, that user will have full access to your machine. How it Works ...