Free Downloads
Glossary
Contact Us
|
Glossary
Security software from LittleLite Software
Iside
Iside compares files and folders by computing their hash code (MD5,SHA1,...). Right click on a file, select Copy and by right clicking on another file you will discover if they are equal. Includes file comparison, hash displaying tool plus a complete folder comparison tool. The hash functions can determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers.
Developer: LittleLite Software
|
Download (1305 K)
|
Released: |
2006-10-06 |
Language: |
English |
Platform: |
Win98,WinME,WinNT 4.x,Windows2000,WinXP,Windows2003 |
Price: |
25 $ |
Requirements: |
Requires Microsoft .NET Framework v.2.0 |
NShred
Definitively erase and destroy any Windows folder or file using low level overwrite and standard procedures such as US Department of Defense DOD 5220.22-M (5 overwrites ) or Gutmann (32 overwrites). With NShred you can eliminate confidential information and data from PC drives. Name, size, and contents of erased file can never be recovered, by any software or hardware means. Unused disk space may be shredded, too.
Developer: LittleLite Software
|
Download (1075 K)
|
Released: |
2006-09-12 |
Language: |
English |
Platform: |
Windows2000,WinXP,Windows2003 |
Price: |
25 $ |
Requirements: |
Requires .NET Framework v2.0 |
Folder Crypt
With Folder Crypt you can password protect any Windows file or folder using low level encryption and standard algorithms, such as DES, Rijndael and Blowfish with keys up to 2048 bits. The program performs a true bit per bit encryption of your data. Original files and folders may be shredded. The encryption process is not reversibile. Easy to use with its improved shell integration. Full international characters support.
Developer: LittleLite Software
|
Download (2484 K)
|
Released: |
2006-06-06 |
Language: |
English,Italian |
Platform: |
Windows2000,WinXP,Windows2003 |
Price: |
25 $ |
Requirements: |
Requires Microsoft .NET Framework v2.0 |
NCrypt TX
This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has Steganography capabilities on random generated text. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. Convert your text messages into a sequence of encrypted hexadecimal or Base64 characters.
Developer: LittleLite Software
|
Download (1090 K)
|
Released: |
2006-10-18 |
Language: |
English |
Platform: |
WinME,Windows2000,WinXP,Windows2003 |
Price: |
30 $ |
Requirements: |
Requires .NET Framework v.2.0 |
Paloma
Paloma, the password repository, provides rock solid passwords protection with no underground unknown processes and absolutely no interference with other programs. Easy to use with its "bookmarks like" tree passwords organization. The password database can be encrypted with keys up to 2048 bits and DES, 3DES, AES-Rijndael, Blowfish and ARC4 algorithms.
Developer: LittleLite Software
|
Download (1019 K)
|
Released: |
2006-10-23 |
Language: |
English |
Platform: |
Win98,WinME,Windows2000,WinXP,Windows2003 |
Price: |
0 $ |
Requirements: |
Requires Microsoft .NET Framework v2.0 |
BIOSBasic Input/Output System. The part of the operating system that identifies the set of programs used to boot the computer before locating the system disk.
The BIOS is located in the ROM (Read Only Memory) area of system and is usually stored permanently.
Print this page
- ZIP File
- Worm
- Windows Scripting
- Warm Boot
- Virus Hoaxes
- Virus
- Variant
- Vaccination
- VBS
- Tunneling
- Trojan Horse Program
- Triggered Event
- Timestamp
- Time Bomb
- TSR
- System Boot Record
- Stealth Virus
- Sparse Infector
- Sniffer
- Slow Infector
- Signature
- Shareware
- Shared Drive
- Self-garbling Viruses
- Self-extracting Files
- Self-encrypting Virus
- Sector Viruses
- Scanner
- SMTP
- Resident Virus
- Replication
- Redirect
- Real-time Scanner
- RTF File
- Program Infector
- Polymorphic Virus
- Piggyback
- Payload
- Password Sniffing
- Password Attacks
- PGP
- Overwriting Virus
- Operating System
- On-demand Scanner
- On-access Scanner
- Not In The Wild
- NTFS
- Mutating Virus
- Mutant
- Multipartite Virus
- Memory-resident Virus
- Master Boot Sector Virus
- Master Boot Sector
- Master Boot Record
- Malware
- Malicious Code
- Macro Virus
- Macro
- MS-DOS
- MP3 File
- MBR
- Logic Bomb
- Library File
- Key
- Joke Programs
- JavaScript
- Infection
- Host
- Hole
- Hijacking
- Heuristic Analysis
- Firewall
- File Viruses
- FAT
- Encryption
- Encrypted Virus
- EXE file
- Dropper
- Disinfection
- Direct Action Virus
- Denial Of Service (DoS)
- DOS
- Cookie
- Companion Virus
- Cold Boot
- Cluster Virus
- Checksum
- Boot Sector Infector
- Boot Sector
- Boot Record
- Boot
- Batch files
- Backup
- Background Task
- Background Scanning
- Back Door
- BIOS
- Antivirus Virus
- Anti-virus Software
|