Sponsored Links:

Digitally sign your Pdf documents with a digital certificate PKCS12 and USB eToken PKCS11 Visible signature on a page of the document Signed documents verification GUI interface or command line Free MacOS X, Linux, WinWhat is new in this release:eToken...

Sonar

Sonar 2.0

Sonar is a security tool that reports file change activity on your hard drive in real-time. It can show you every time a program changes a file on your hard drive. Sonar can be useful for several purposes: Run Sonar before installing a new program so...

WebKit PB

WebKit PB 1.6.2

WebKit PB: Launches the WebKit nightly build and enables Private Browsing. If the WebKit is launched normally, WebKit PB will enable Private Browsing. Clicking on WebKit PB a second time does not disable Private Browsing and will open a new window (if no...

Sponsored Links:

Safari PB

Safari PB 1.8.2

Safari PB: Launches Safari and enables Private Browsing. If Safari is launched normally, Safari PB will enable Private Browsing. Clicking on Safari PB a second time does NOT disable Private Browsing and will open a new window (if no windows are open).What...

SkeyCalc

SkeyCalc 3.0

SkeyCalc computes One-Time Passwords for use in logging in (or otherwise authenticating to) servers which implement S/Key or OTP access control. SkeyCalc operates as a service, allowing for lightning-fast OTP authentication. SkeyCalc supports the...

sText

sText 1.7.2

sText is super fast and powerful, secure word processor / text editor. Its key feature is the ability to lock your files with your own keyword. You can now hold secured your secrets, passwords, logins and others strictly unlockable! Also you can...

Sponsored Links:

VitalLock

VitalLock 0.124

VitalLock - The Privacy Company, is a secure private emergency messaging system. VitalLock can deliver your private emergency messages instantaneously or upon an event such as disaster, disability, detention or death. With VitalLock you can easily send...

The DoorStop X Firewall protects your Mac from undesired access from the Internet, logging both allowed and denied access attempts. Its easy-to-use interface means less chance of mistakes, and its wide range of addressing and service options gives you...