Security Files
acwin95.zip, November 01 1997 A simple to use conventional encryption program that uses several good encryption algorithm's including the chaos algorithm. |
ae9enid.exe, May 5, 1998 A conventional encryption program with an attractive, easy to use visual interface. Can perform compression while encrypting, and uses the Blowfish encryption algorithm which is quite secure even for sensitive files. Encrypts binary or text files with the same ease, and even has the ability to make self-extracting, encrypted files, so the recipient doesn't even have to have DataSafe running! |
avast32.exe, October 01 1997 AVAST32 is a complete set of antivirus protection tools for Windows95 and Windows NT platforms. It was designed specifically for NT and consistently ranks among the best programs in the world as reported in Virus Bulletin. It performs tests covering practically all aspects of antivirus detection and protection for 10,154 currently known viruses including polymorphic and macroviruses. Integrity Checking module enables full recovery of infected files. Supports scanning directly from the Windows Explorer interface. |
BFA97109.zip, August 2, 1998 A conventional encryption program that offers several encryption types, including the Blowfish, PC1, Cobra128 and IDEA (optional) algorithms. The interface is easy to use and thorough. |
c038s.zip, May 16, 1998 Create self-exploding, compressed .EXE files to send to others as e-mail attachments or on disk in complete safety. Also allows you to dynamically encrypt any files as you work with them on your hard drive or LAN. Great for protecting files that you don't want others to see. |
cryptoman.zip, July 23, 1998 Encrypt-It is a file encryption/decryption utility that allows you to securely encode any type of file using up to a 448-bit encryption key. Encrypt-It can also wipe the original file from the computer so there was never a sign of it. |
devicelock.exe, August 16, 1998 Allows you to set access for chosen users on selected drives. Each computer must be running Device Lock in order to obtain security access. |
eraser11.zip, July 1, 1998 Eraser is a free and powerful file wiping utility for Windows 95/98 and NT 4.0. By default Eraser overwrites files or empty disk space several times with carefully selected patterns which effectively remove the magnetic remnance from the hard disk making it virtually impossible to recover the data. For faster (and less effective) file erasing, Eraser also supports a method defined in the National Industrial Security Program Operating Manual (NISPOM a.k.a. DoD 5220.22-M) of the US Department of Defense. |
fwatch322.zip, June 12, 1998 This program monitors the hard drives on your system using saved image files and reports extra, missing, and changed files. Use it to monitor program installations to see where files are scattered or even watch what files are tampered with over time, etc. |
invisi213i.exe, March 17, 1998 This software uses strong NON-US encryption algorithms. |
mut232rt.zip, May 24, 1998 Mutilate shreds sensitive files so they can never be recovered or undeleted. Select target files with Mutilate's easy to use program interface and filtering options, or, skip the interface altogether and right-click target files directly from Windows Explorer. Mutilate supports complete folder deletions including subfolders. With Mutilate's disk free space wiper, you can even destroy previously deleted files on your hard drive. And, the new Power Mutilator feature lets you select up to 12 folders for quick access to files you target routinely. |
NTrust98i.exe, July 24, 1998 An encryption and compression program that is very easy to configure and use. The setup wizards simplify every step of encrypting, decrypting, and compressing files. In the June release you'll see more enhancements to the tutorial, on screen wizards and more informative messages. This version is suitable for international distribution. A 448 bit version is also available to Australian customers only. |
nukenabber.exe, July 10, 1998 NukeNabber sets itself up to listen on TCP and UDP ports commonly "nuke" attacked over the internet. A total of 50 ports can be monitored simultaneously. It is designed to give you the information you need in order to trace an attacker; including a method of finding an attacker's nickname on popular IRC servers. |
passpl95.zip, August 4, 1998 Allows an unlimited number of users to each keep an individual password-protected encrypted list of their passwords. Names, passwords, and other information can be viewed, printed, sent to other applications directly or via the standard Windows clipboard, and imported from/exported to text files. |
passsafe.exe, June 21, 1998 Password Safe is a free utility that helps you keep track of all you login names and passwords. You never have to worry about forgetting what your password was again. Just click the button and your password is copied and ready to be pasted into place. |
pgp553i-win95nt.exe, April 14,
1998 PGP 5.0i is the latest international version of PGP. It is basically the same version as PGP 5.0, but because it was compiled from source code that was scanned and OCRed from printed books that were legally exported from the US, it is legal to use in almost any country in the world. |
Privfree.zip, August 11, 1998 A versatile security program that allows you to encrypt or decrypt anything that you are able to paste into your clipboard. Also allows you to right click on any file in windows explorer and encrypt or decrypt the selected file. Great for e-mail and file security. |
ptrack.zip, September 2, 1998 Password Tracker Deluxe stores passwords and usernames neatly and securely on your computer so you don't have to remember them. It sits in the system tray and watches for dialog boxes and can automatically insert usernames and passwords when appropriate! |
sd20.zip, January 18 1998 Whether you are in charge of multiple computers in a corporate environment, or just need a way to keep the children from messing up your home system's accounting files, SecurDesk! offers a wealth of options which may be used alone, or in conjunction with other security measures, to control access to sensitive materials, hide confusing and irrelevant items from selected users, ease training tasks, etc. Included are a customizable desktop interface, file management, virtual desktops, zip/unzip, disk spanning, file protection, log-on protection, password protection, delayed launch, text editor, browser, Task Manager, timeout log-off, limit usage periods, expire user permissions, and more! |
secm178.zip, August 27 1998 Security Manager visualize permissions of complete directories on NTFS partitions. It also has some powerful methods to change these permissions. You can add or remove permissions for one user or group separately (and even if you have not sufficient own permissions - of course only if you are an administrator). Features: * Visualize permissions for a whole directory at one time * report generation * Replacing owner * classification alternatively with or without owner |
Secure.exe, April 14, 1998 A comprehensive set of tools designed to protect your computer and everything in it from the moment you log-on to the moment you shutdown. All the features are simple to use and offer a wide range of flexibility for customizing the level of security you need. Many advanced yet easy to manage options that really go the extra mile to protect your system. |
shred95.exe, August 21, 1998 Shredder95 goes way beyond Government-grade, Department of Defense, requirements to "completely destroy" files. Every bit of a file is overwritten numerous times and the randomized. And, using proper, proven methods, Shredder95 a overwrites the name, date, time, and size so that nothing whatsoever remains. Whatever files (pictures, letters, e-mail, etc) that you may have, Shredder95 will remove, forever. |
spectre.exe, February 03 1998 How Safe Are You? By the time you experience an NT security problem, it's too late! Protect yourself with Nt Spectre, the security sleuth!- Determine file vulnerability to the outside world via the Internet.- Reveal who has access to files and resources that shouldn't.- View the Access Control Lists for processes, directories, files, registry keys, pipes, and shares.- Quickly create tests using drag & drop. Tests include Access, Load, Differential, Password, and more! |
spy32.zip, August 26, 1998 This program monitors activity on your computer and logs it to a file for later perusal. Ever wonder what people do while you're away from that precious PC? |
stormw45.zip, April 14, 1998 Advanced access security system for the control and protection of your Windows95 system. Includes global security schemes to maintain a number of computers with the same access restrictions. |
TCrypt126.zip, July 26, 1998 A simple, easy to use encryption utility that allows you to encrypt files quickly and efficiently. To increase the security of your information the files that are encrypted are overwritten. There is also a possibility to let ThunderCrypt automatically encrypt your files when ending your session. |
watchman2.zip, May 9, 1998 An excellent program for light security. While it probably won't stop the most experienced PC literates, it will close any window, or website, that is "accidentally" opened by the casual user. Great to keep the kids from changing your screen properties again! Very easy to use, provides password protection, and will even keep a log of windows closed. Limited to 7 windows protected, so choose wisely. |
WRKLOCKI.zip, April 28, 1998 Provides a simple and inexpensive, but effective way to password protect your system without involving a screen saver. It is easy to configure and requires no modifications to your current system configuration. |
Microsoft, MS, Windows, Windows NT, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks acknowledged.