Вы используете устаревший браузер. Этот и другие сайты могут отображаться в нём некорректно. Вам необходимо обновить браузер или попробовать использовать другой.
Cisco AnyConnect Secure Mobility Client 3.1.14018/4.9.03047 (x86/x64) | 3.02 GB
Cisco AnyConnect Secure Mobility Client - further development of the AnyConnect VPN Client.
Designed to create a vpn-connection to network devices cisco for SSL, TLS, DTLS. Supports most modern platforms and...
File size: 2.1 MB
This is very simple but very effective tool to securely erase files and folders. After using this tool selected files and folders will not be available for recovery. We have attached several security options so you can choose level of security that you need (this reflects to...
File size: 2.1 MB
This tool will permanently wipe the contents of deleted files so that nobody would be able to recover them, even with the use of special tools. The contents of deleted files will be overwritten using random data. You can choose many security algorithms for data destruction...
Requirements: Android 4.2+ | File size: 12,1 MB
File Commander is a feature-rich, powerful file manager that allows you to handle any file on your Android device or cloud storage via a clean and intuitive interface.
You can separately handle libraries of pictures, music, videos, documents, as...
File size: 1.5 MB
Where there is a USB Drive, there has to be USB Secure! USB Secure can password protect USB drives. Protection is PC independent, doesn't require installation and doesn't require administrator rights at the other end. Never again worry about lost or stolen USB drives if you...
File size: 21.7 MB
TSR Watermark software is an easy and fast way to get photos watermarked; the ease of use makes is quick to learn even for a non-technical person. If you have employees that needs to add watermark to a photo before uploading it online, TSR Watermark software is an excellent...
File Size: 2.0 MB
This tool will permanently wipe the contents of deleted files so that nobody would be able to recover them, even with the use of special tools. The contents of deleted files will be overwritten using random data. You can choose many security algorithms for data destruction...