Category Archives: Security & Privacy

Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers

BCWipe 7.03.2

Product Page: https://www.jetico.com/data-wiping/wipe-files-bcwipe

WatchProgressInBCWipeTaskManager.png

Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery – including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. By featuring revolutionary Transparent Wiping, BCWipe allows you to automatically wipe all contents of any deleted file or temporary file beyond forensic recovery. Available for Windows, Mac and UNIX, BCWipe comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards: German VSITR standard, Bruce Schneier’s recommended wiping scheme, Peter Gutmann method, British HMG IS5 (Baseline, Enhanced), Canadian RCMP TSSIT OPS-II, NAVSO-P5239-26, Russian GOST R 50739-95, US Army AR380-19, One random pass. In addition, you can also create your own customized wiping scheme to permanently wipe data.

BestCrypt Container Encryption 9.07.2

Product Page: https://www.jetico.com/data-encryption/encrypt-files-bestcrypt-container-encryption

control_panel.png

To protect your privacy, comply with regulations, such as HIPAA or PCI, and prevent data breaches, BestCrypt Container Encryption delivers ‘on-the-fly’ data encryption that’s easy to use for virtual drives and selected files or folders. BestCrypt encrypts files and folders on Windows, Mac OS X and Linux by utilizing a wide variety of algorithms (AES, Blowfish, Twofish, CAST, GOST 28147-89, Triple-Des, Serpent) and the largest possible key sizes with XTS, LRW and CBC encryption modes. By featuring deniable encryption and dynamic containers Jetico’s file encryption is the best TrueCrypt alternative. BestCrypt Container Encryption includes a full version of BCWipe a Jetico solution to permanently delete files, wipe free space and data remanence.

To protect the data you keep, BestCrypt Container Encryption features:
– Store and access encrypted files easily via virtual drives
– Create and manage multiple containers
– Adjust size of container files (from megabytes to entire drive)
– Enhanced Hidden Containers (deniable encryption)
– Encrypt headers of container files
– Support Public Key Encryption
– Support Secret Sharing Schemes
– Compress one or more files in an encrypted self-extracting archive
– Encrypt Windows Swap File
– Container-level compatibility across Windows, Linux and Mac operating systems
– Includes full version of BCWipe for military-grade file wiping
– Central management for deployment, monitoring and password recovery (Enterprise Edition only)

Prime ID Scanner 1.0.1.4

Product Page: https://www.idanalyzer.com/products/prime-id-scanner.html

delphi11_800-8824515.png

Prime ID Scanner is the most comprehensive identity check software supporting ID documents from over 190 countries, including passports, driving licenses and identification cards.
It is suitable for business and government agencies requiring a full solution to ID check and user identity management.

Full features includes:

– Scan and recognize identity documents from 190+ countries.
– Realtime ID scanning from document scanner, cameras, flatbed scanners and barcode scanner devices.
– Face verification using camera
– Automatic fake ID and document expiry checks
– OCR to convert personal information on ID images into text
– AAMVA PDF417 barcode scanning and parsing
– Document reference database to check documents against document samples
– Identity database to store and search through users that scanned their IDs
– Suitable for identity check in hotels, clubs, border controls and all kinds of security checkpoints
– Sync scanned identity data with your own server or client applications
– Convert PC or Mac into a kiosk machine for security personnel to conduct on-premise security checks