Windows has a basic password complexity rule, but it accepts many weak passwords like "Secret1" and "Pa$$word". Password Policy Enforcer's configurable rules allow you to enforce almost any password policy imaginable. You can even create multiple password policies and assign them to individual users, groups, and Organizational Units.
The use of Password Tote allows you to secure your passwords, as well as ensure they are secure-to-use passwords. They will then be accessible from all your other computers and mobile devices.
PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and more.
Private Disk, an easy-to-use software to protect sensitive data on notebooks, personal computers, removable and flash disk. It is used for creating virtual disks on your computer. On this disk you can store confidential information which youd like to keep secret from other users. You only need to save files into this private disk and close them after that, then the program will protect the files automatically.
AnyPassword is a tiny utility for keeping your passwords. Protect all your private data with a strong encryption and hold in mind one password instead of dozens. A tree structure and an advanced search allow you to get passwords quickly whenever you need. Need new passwords? A built-in password generator creates them on a given mask. A neatly organized interface of the program supports several languages.
ZDelete Internet Eraser software helps to protect your privacy by preventing undesirable people to access private deleted data against your will. Internet Eraser ZDelete erases selected files, drives, folders, Internet Cache, Internet History, Internet Cookies, temporary files, etc. without any possibility of data recovery. Free 30-days evaluation version is fully functional and gives privacy protection.
Spy Patrol - new version of the spy software is released! Spy Patrol records in stealth mode all the keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
"Blank And Secure" is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted.
Strong file protection by 128-2048 bit encryption (AES 256-bit and RSA 2048-bit are also supported). Secure file deletion is also supported: U.S. DoD 5200.28, GOST P50739-95 and others. USB Flash Drives can be used as the storage for strong encryption/decryption keys. Creating Self-Decrypting executable files. Powerful command line utility. Ability to encrypt/decrypt files from Windows Explorer in 1-2 mouse clicks.
The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
SwfScan is a simple free SWF decompiler from HP's Web Security Research Group. Just open your chosen applet and it'll immediately be decompiled, allowing you to browse its code. If this is lengthy, then a search tool (with regular expression support) will help you to locate the details you need. Or you can export the code to a text file for analysis later.