SecureExplore 3.3

The SecureExplore ensures that private information is kept private. On most c...
  • License: Freeware Free
  • OS: Windows Vista/2003/XP/2000/98/Me
  • Requirements: No special requirements
  • Publisher: Maven Security Consulting

    • License: Demo $1,795.00
    • OS: Windows 7/Vista/2003/XP/2000
    • Requirements: No special requirements
    • Publisher: Paraben Corporation

    • License: Demo $15
    • OS: Windows Vista/2003/XP
    • Requirements: No special requirements
    • Publisher: MemLocker

    • License: Freeware Free
    • OS: Windows 98/ME/NT/2000/XP
    • Requirements: No special requirements
    • Publisher: GRL Technology

    • License: Shareware $9.99
    • OS: Windows Vista/2003/XP/2000/98/Me/NT
    • Requirements: No special requirements
    • Publisher: GlobeSoft

    Tcptraceroute is a Security software developed by Michael C. Toren. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Tcptraceroute:

    EditByBSEditor: tcptraceroute is a TraceRoute implementation using TCP packets.

    The more traditional traceroute sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets are taking to reach the destination.

    The problem is that with the widespread use of firewalls on the Modern Internet, many of the packets that traceroute sends out end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters.
    Lucidity scanner is a Security software developed by SecurityFox. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Lucidity scanner:

    URL scanning, that is, checking a web server\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s files and directories for information and potential exploits. It will search for things such as potential SQL Injection, Front Page servers, admin, login and information gathering pages in a fast, automated manner.
    TCP port scanning to identify the services running on the target system which scans a wide range of important ports in an accurate and multithreaded technique.

    HTTP denial of service attack that sends 50,000 TCP socket connect requests with real time feedback, potentially crashing the server and/or disrupting it\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s service.

    A command line interface which can execute anything externally.
    Cleaner is a Security software developed by Piriform Ltd. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Cleaner:

    BSEditor: It is known, that after deleting files in Windows, they can be Restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner Securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible.
    Achilles is a Security software developed by Maven Security Consulting. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Achilles:

    The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly.
    Device Seizure is a Security software developed by Paraben Corporation. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Device Seizure:

    BSEditor: Forensically analyze PDA & cell phone data. Supports Palm, Windows CE/Mobile, BlackBerry, & Psion devices as well as certain Nokia, Sony Ericsson, Motorola, Siemens, LG, Samsung, & Symbian based phone models.
    Also supports GSM SIM card aqcuisition. Focuses on the physical level of acquisition offering more physical downloads of devices. The physical acquisition plug-in offers memory imaging on most of the devices supported in Device Seizure. Logical data acquisitions can\\\\\\\'t acquire more data than the device Operating System was designed to allow.

    Device Seizure Features include:
    Comprehensive easy-to-use interface
    USB and serial support
    Comprehensive data acquisition of text messagesaddress books, call logs, and more
    Recovers deleted data
    Verification of file integrity with use of MD5 and SHA1 hash values
    Built-in file viewing of proprietary files
    Multi-language support for languages such as Arabic, Russian, Chinese, etc.
    Built-in searching and bookmarking
    Text and Hex viewing options available for data
    Analyzes PDA data files stored on PCs, Built-in recovery Palm password
    Windows CE Registry Viewer
    Acquires complete GSM SIM card information including deleted data
    Full flash download for certain models of cell phones
    Image viewing for graphic information
    including data carving for multi-media files for most devices
    Comprehensive HTML reporting, Encrypted image files to guarantee image integrity
    Text searching and hex information in the acquired data
    Export acquired data to PC
    Viewing acquired data with external viewer,
    Import of databases acquired with PDA Seizure
    Cell Seizure and SIM Card Seizure
    Comparing 2 databases to verify differences in their structure.

    DriveCache for Generic Protable Drive is a Security software developed by MemLocker. After our trial and test, the software is proved to be official, secure and free. Here is the official description for DriveCache for Generic Protable Drive:

    BSEditor: Most of us have some sensitive information that we prefer to hide from others. It may be your documents, video, photos, software etc. Usually we keep all these files on our local and portable drives. Every time when we decide to protect some part of our information we have to choice appropriate method. In general there are two major types of security software:
    Computer and device access control software
    Encryption software
    There are many variations and combinations of these methods, but all of them have advantages and disadvantages. This is why we have so many security software in the market. Here are a few examples:
    Computer Access Control Software. You can set-up a password for your Windows account to login to your computer. Nobody without this password will be able to load Windows at this computer, but you should understand that all your information is saved onto your Hard Drive and if somebody unplugs it from your computer and plugs to another than all your files will be accessible! Of course, this method is absolutely unacceptable for portable drives.
    Portable drive Access Control Software. This software locks portable drive and prevent the access to any information on the drive until password is entered . It works great, but all they have their limitations like: work only with some drive types and formats; you cannot use it for local drives; you have to lock drive manually, etc.
    Encryption Software. This is the most effective and safe methods to save your really sensitive information. If you want to keep your passwords, credit cards data, access codes etc. in safe you must Encrypt It. The strong encryption and longer your password the safer your life. As a variant of encryption software there are very useful solutions that let you creating a virtual drive on any disks: local, portable, CD .
    GRL RealHidden is a Security software developed by GRL Technology. After our trial and test, the software is proved to be official, secure and free. Here is the official description for GRL RealHidden:

    BSEditor: GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of Another File, and then retrieve that hidden file. The resulting \'cloaked\' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden information. In order to keep the final file size a low as possible, GRL RealHidden gives you the option of compressing the hidden file.
    SecureExplore is a Security software developed by GlobeSoft. After our trial and test, the software is proved to be official, secure and free. Here is the official description for SecureExplore:

    Do you handle sensitive information that no one else should have access to?
    - Stealing of laptop computers is an increasing problem for companies and individuals. According to Time Magazine, 591,000 laptops were stolen in the United States during 2001 which was an increase of 53% from the previous year. Many of these laptop contained unprotected sensitive corporate information.
    - SecureExplore developed by GlobeSoft is used to encrypt/decrypt files and/or whole directories from the Windows shell . The program uses a 128 bit secret key Algorithm to let a user encrypt/decrypt sensitive information, that no one else should have access to. You can export a certificate and distribute it to other people within a group. The people in the group may then Encrypt and Decrypt files using that certificate.
    - This also enables you to have secure e-mail communication over the Internet, and prevents unauthorized persons to read attached files. The SecureExplore combines a very high degree of security with extreme ease of use, simply encrypt/decrypt with a right click of the mouse.

    Related Downloads

    own private data-space, protect folder or files password easily, open on any PC
    Store your private information.
    Say you're at your computer doing something private and someone comes in... P...
    MPF (My Private Files) can help you keep your information safe.
    Keep a second password protected screen. Fast switch out.
    Free disk encryption software

    Leave a Review

    secureexplore33secureexploreensuresprivateinformationprivatecthe secureexploresecureexplore ensuresensures thatthat privateprivate informationinformation iskept privatethe secureexplore ensuressecureexplore ensures thatensures that privatethat private informationprivate information isinformation is keptis kept privatethe secureexplore ensures thatsecureexplore ensures that privateensures that private informationthat private information isprivate information is keptinformation is kept privatethe secureexplore ensures that privatesecureexplore ensures that private informationensures that private information isthat private information is keptprivate information is kept privatebritishintelligenceagencymi6hackedterroristorganization'swebsitereplacedbombrecipesbritish intelligenceintelligence agencyagency mi6mi6 hackedorganization's websiteand replacedreplaced bombbomb recipesrecipes withbritish intelligence agencyintelligence agency mi6agency mi6 hackedhacked a terrorista terrorist organization'sterrorist organization's websitewebsite and replacedand replaced bombreplaced bomb recipesbomb recipes withbritish intelligence agency mi6intelligence agency mi6 hackedmi6 hacked a terroristhacked a terrorist organization'sa terrorist organization's websiteorganization's website and replacedwebsite and replaced bomband replaced bomb recipesreplaced bomb recipes withbritish intelligence agency mi6 hackedagency mi6 hacked a terroristmi6 hacked a terrorist organization'shacked a terrorist organization's websiteterrorist organization's website and replacedorganization's website and replaced bombwebsite and replaced bomb recipesand replaced bomb recipes with