It is an anti-keylogger that blocks all but the intended application from receiving the keystrokes and blocks screen-capture of the active window.
Cost / License
- Free
- Proprietary
Platforms
- Windows

It is an anti-keylogger that blocks all but the intended application from receiving the keystrokes and blocks screen-capture of the active window.

Our free VPN (Virtual Private Network) server is designed with the latest technologies and most advanced cryptographic techniques to keep you safe on the internet from prying eyes and hackers. Our VPN securely routing all your internet traffic through an encrypted tunnel to...
Reliable and powerful data recovery software, created by DiskInternals. Restore all kind of files from all kind of storage. Support different file systems like NTFS, exFAT, FAT, HFS, HFS+, ZFS, Reiser, Reiser4, UFS. Free preview.



Move files between cloud storage services easily with CloudFuze — a secure and intuitive platform that supports 40+ clouds. Enjoy simplified, drag-and-drop file transfers, end-to-end encryption, and seamless team collaboration for fast, reliable cloud data management.


Radio Silence lets you block individual apps from accessing the internet. It never throws pop-ups on the screen, and is completely invisible.



MobiKids Child Taken is the best solution to track your children activities including calls, texts, locations, browsing histories, contact, etc.




Make the browser forget website data like cookies, local storage, etc, except for the data you want to keep by adding domains to a whitelist, graylist, blacklist, or redlist.




Seen a font in use and want to know what it is? Submit an image to WhatTheFont to find the closest matches in our database. Or, let cloak-draped font enthusiasts lend a hand in the WhatTheFont Forum.
Available also for iPhone: http://new.myfonts.com/WhatTheFont/iPhone/.






Exodify is a browser extension that will show you how many trackers there are in android applications you are looking at in the Play Store.


Sophos Endpoint Protection helps secure your workstation by adding prevention, detection, and response technology on top of your operating system.

BeeThink IP Blocker is a Windows IP Blocking program which controls one computer interacts with other computers over the network. It can be successfully used on Windows server machines, in a production environment, to easily ban unwanted IP addresses or visitors by country with...

WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow...
Torifier lets you tunnel software applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier. Torifier is a Tor bundle, meaning the program will install the Tor software and will...


Effortlessly share 2FA SMS with your team. This number works with all services, from WhatsApp to ChatGPT, and connects to numerous tools through Zapier or our webhook integration.



dnscrypt-proxy - A tool for securing communications between a client and a DNS resolver


iBackup extractor is a Windows and Mac program which can find iPhone, iPod Touch and iPad backups on your computer and enables you to extract data from them.

Duo Mobile works with Duo Security's two-factor authentication service to make logins more secure. The application generates passcodes for login and can receive push notifications for easy, one-tap authentication.




DuckDuckGo Email Protection is a free email forwarding service that removes multiple types of hidden email trackers and lets you create unlimited unique private email addresses on the fly.



Intigriti is the trusted leader in crowdsourced security, empowering the world’s largest organizations to find and fix vulnerabilities before cybercriminals can exploit them.




VoodooShield can protect you from viruses using two different modes to “train” your computer to be protected at all times.

A post-Snowden VPN built on anonymity and security. Service requires you to think and have general understanding of software/networking setups. Intermediate level knowledge.
Two-factor authentication app for Yandex accounts and also other QR-code based temporary codes for two-factor authentication



