Security
58 hubs total
In this category:
File Shredder
Despite the fact that you are deleting files from your computer, this ...
Backdoor Detector
Backdoor refers to a method of bypassing normal authentication and gai...
Trojan Remover
Taking their name after the famous horse of the Greek mythology, Troja...
Block Flash
While for online marketers everywhere, Flash components provide an eas...
Checksum Verifiers
A checksum is a value that is used to verify the integrity of a file a...
Antiransomware Tools
Ransomware is currently the newest threat when it comes to malware age...
Password Unlockers
Anything can be password-protected, such as private documents, photos ...
Remove PDF Restrictions
While PDF is a widely accepted file format that works on any device an...
Encrypt PDF
Users typically encrypt their PDF files when they want to protect the ...
USB Encryption Tools
For many users, USB drives are the go-to method of transferring data b...
Computer Lockdown
Whenever users leave their computers, even for short periods of time, ...
Cookies Cleaner
Unlike the tasty kind of cookies we all know and love, HTTP cookies ar...
Free Antivirus
It's common sense to equip a computer with a powerful anti-malware...
Create Restore Points
Sometimes when working on a Windows computer, things can go terribly w...
Encrypt File
Encryption refers to the process of transforming data using a special ...
Toolbar Remover
Some ad-supported applications offer to install third-party components...
Rescue Disks
Malware attacks can have a hugely negative impact on your system, from...
Temp Cleaner
There's no getting around it - temporary files, also referred to a...
Virus Definitions
Once installed, anti-malware applications have to be regularly updated...
Internet Security Suites
These applications typically offer users everything they require for s...
Steganography Tools
Steganography is the science of embedding text messages or files withi...
Virtual Private Network
Virtual private networks, also known as VPNs, are networks based on&nb...
Detect Malware
Malware represents malicious software that was created for the sole pu...
Spyware Remover
Spyware is a special type of malware that works in the background, wit...
Scan For Viruses
A virus is a computer application able to copy itself and infect one o...
Parental Controls
Parental controls allow parents to protect their children when they ar...
Porn Blocker
Parents typically want to make sure that their kids do not stumble acr...
Spam Blocker
E-mail spam defines unsolicited emails that are sent to numerous recei...
Detect Rootkit
A rootkit is a tool designed to gain administrator-level control ...
Free Firewall
Firewalls were created to help users protect themselves against unauth...
Encrypt Folders
Whenever users are dealing with sensitive or very important data, they...
Cache Cleaner
Cache stores recently used information so that it can be accessed agai...