SafeSex allows you to have some notes that are easily accessible, but relatively secure. It sits on your screen, waiting for a click, and on a click it will activate and give you access to your notes. That is, of course, if you enter the passphrase that your notes are encrypted with. For ease, the passphrase will be cached in memory, and expire after a user-configurable time. The notes themselves are stored in RTF, and encrypted when stored to disk. When the SafeSex window is not open, the notes are not stored in memory. They are encrypted and decrypted on demand. The encryption used is Blowfish, using the 20 byte SHA-1 of the passphrase as the key. It uses Blowfish in CBC mode, with the initialization vector being incremented every time. SafeSex keeps running in the background, using very little memory and resources, and automatically keeps itself running across reboots (i.e. if you reboot with SafeSex running, it will come back on startup).
(Download Size: 63 KB)
RegSeeker is a perfect companion for your Windows regsitry ! RegSeeker includes a powerful registry cleaner and can display various informations like your Startup entries, several histories (even index.dat files), installed applications and much more ! With RegSeeker you can search for any item inside your registry, export/delete the results, open them in the registry. RegSeeker also includes a tweaks panel to optimize your OS !
(Download Size: 349 KB)
Drive Rescue is a program for exploring your hard disk, and locating lost files on it. The idea for this program originated from processing a disk with Scandisk--which suddenly contained no data. Since off-the-shelf Windows methods could not recover any of it, this program was successfully created, to find important information of the file system, to look for lost data and to restore it.
(Download Size: 606 KB)
Icy Inside is a simple system "scope" OCX that allows you to obtain information about your system. The control includes the Icy Inspector property, which returns a string with all the system information already formatted and ready for use.
(Download Size: 24 KB)
Changes password on multiple computers centrally. Ideal for centrally changing the Local Administrator password on a group of computers. Uses the currently logged in user and searches for computers on the network that the user can log in to as a local user, and changes the password of the user remotely.
(Download Size: 56 KB)
Text2Html is a freeware text-to-HTML converter. This application is in designed to quickly convert many text files into HTML format. Text2HTML handles HTTP, FTP, Gopher, Telnet, WAIS, NNTP, and Mailto tags. Multiple files can be converted simultaneously.
(Download Size: 261 KB)
Small, fast and reliable benchmark for CD-ROM drives. High resolution timing (0.1 ms), 99% of asm code, 100% freeware. Many people think that the data transfer rate of CD-ROM drives is constant from the beginning to the end of the disc, but this is true only for old-and-slow models. CD-Bench is the only benchmark that reads the disc in six different points and displays six results, so you can see if and how the speed varies.
(Download Size: 14 KB)
Automatically fill in forms and eliminates Keyboard sniffing trojans. Password shield is a Password Manager that uses a Patent Pending Onscreen KeyPad entry system that eliminates risks from Keyboard loggers and Trojans from stealing Passwords and sensitive material. An excellent Password Manager with secure Drag and Drop capabilities (can also feed password into programs such as PGP),automatic Password generation,blowfish encryption,URL launching and is very simple to use. Password shield's special 'keyboard bypassing' features make it more secure than any other Password Manager in the market. This version is now free in anticipation for the pro version to be released within 3 months. Email admin@passwordshield.com for the free unlock code.
(Download Size: 583 KB)
A quick and easy to use backup tool for both, beginners and advanced users that provides the user with an almost instant method of making ongoing and incremental backups. Once medium level and advanced level computer users have used this backup method they will quickly recognize that the procedure could be very easily emulated to suit their specific backup needs in regard to the location of the Backup folder. No spyware, spam, advertisements, or splash screen.
(Download Size: 132 KB)
Internet Explorer stores settings in the registry which is prone to infiltration. Restore Explore creates a backup so you can revert back if you get hijacked. It is a tiny package which you will be glad you had if your Internet Explorer settings ever get changed and you want them restored the way they were.
(Download Size: 91 KB)