The Best 2735 Security Alternatives

  • RRT Sergiwa Antiviral Toolkit icon

    RRT Sergiwa Antiviral Toolkit

    Sergiwa Antiviral Toolkit is a set of handy tools that scan, remove malware and re-enables all what a virus had previously disabled (System Restrictions) and gives you...

  • Ultimate Virus Sniffer icon

    Ultimate Virus Sniffer

    Universal Virus Sniffer is a powerful antivirus removal tool designed to ease the process of detecting and eliminating unknown viruses, rootkits, and bootkits. It's...

  • Any.Run icon

    Any.Run

    Interactive malware hunting service. Any environments ready for live testing most type of threats. Without install. Without waiting. Interactive online malware...

  • WinJail icon

    WinJail

    Sandboxing software for Windows OS WinJail is full implementation of chroot, with additional features like "copy-on-write" mechanism applied to chroot'ed...

  • AVG Threat Labs icon

    AVG Threat Labs

    Find out about the safety rating of a website before visiting it. AVG Threat Labs reports if a virus has been detected on a website in the last 30 days and helps you...

  • Seald icon

    Seald

    Seald is a french one-click encryption tool that keeps unwanted eavesdroppers out of your conversations.

  • iSafer icon

    iSafer

    Open source Windows firewall.

  • Wallix Pro Firewall icon

    Wallix Pro Firewall

    Wallix Pro Firewall prevents intruders from accessing your computer and that’s the main objective for a computer firewall. It automatically detects and blocks attacks...

  • CacheGuard-OS icon

    CacheGuard-OS

    CacheGuard OS is an Appliance oriented Operating System dedicated to Web traffic Security and Optimization.

  • DefenseWall icon

    DefenseWall

    DefenseWall is a sandboxing-style personal firewall solution that wins when your anti-virus fails. DefenseWall is based on a sandboxing approach that uses rights...

  • Armor2net personal firewall icon

    Armor2net personal firewall

    Armor2net personal firewall software stops hackers, data thieves, and protects your PC from Internet-borne threats. Armor2net firewall can meet your requirements for...

  • SoftPerfect Personal Firewall icon

    SoftPerfect Personal Firewall

    The SoftPerfect Personal Firewall is a free network firewall designed to protect your PC against attacks from the Internet or via a local area network. SoftPerfect...

  • Context-Shredder icon

    Context-Shredder

    With Context-Shredder you can destroy your sensitive files. Choose from simple destruction or shredding by Peter Gutmann. Users can create deletion tasks, overwrite...

  • AppleXsoft File Eraser icon

    AppleXsoft File Eraser

    AppleXsoft File Eraser is a user friendly and powerful data wipe software that allows you to permanently delete files on hard disks, USB drives completely. excluding any...

  • east-tec DisposeSecure icon

    east-tec DisposeSecure

    Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with...

  • Easy File Shredder icon

    Easy File Shredder

    Easy File Shredder shreds custom files and free disk space beyond recovery using advanced data deletion algorithms approved by the military and government organizations.

  • UltraShredder icon

    UltraShredder

    UltraShredder is a standalone, USB portable file shredder which deletes sensitive files by overwriting them with random characters, saving it to disk each time, and then...

  • Zer0 icon

    Zer0

    Zer0 is a user friendly file deletion tool with a high level of security. With Zer0, you'll be able to delete files and to prevent file recovery by a 3rd person. ...

  • Kernel File Shredder icon

    Kernel File Shredder

    If you want to delete some data permanently making it impossible to read again you can choose Kernel File Shredder Software which deletes file permanently so that no one...

  • DriveScrubber icon

    DriveScrubber

    When you delete data or format a drive you assume the files, pictures, email or documents no longer exist on your computer. But your private data still exists, and it...