Security

Category «Security»

Secure safe

With Secure Safe online storage from Switzerland is pushing for the market. according to its origin, the provider of the cloud takes mainly the issue of security very seriously. Sun Secure Safe deposit submitted data and passwords on claims to be highly secure Swiss servers and even stores the login password of their users. Is …

Ghost for Chat

With the Ghost for chat Download are easy to hide and disable the read receipt Last online time stamp and online status. Chats and Messenger are comfortable to stay with God and the world with information – and completely free in many cases. However, as has nearly every medal a second site: Facebook Messenger, WhatsApp …

NoScript for Chrome

Security Technically, there is also the Google browser default settings that involve risks. These include, for example, JavaScript, Java applets, Adobe Flash or Microsoft Silverlight. With the free add-on NoScript Chrome can you protect yourself as much as possible from it. NoScript Chrome disables dynamic Web content Who wants to surf safer, the software can …

Wanna Cry emergency patch for Microsoft Windows

A blackmail Trojans in mid-May 2017 caused worldwide uproar and older Windows systems paralyzed. With the Wanna Cry emergency patch download can protect computers against ransomware. Wanna Cry emergency patch download closes gap In no time hackers were able with the Trojan “Wanna Cry” become the world the data of hundreds of thousands computers and …

Simple ADB Backup

Simple ADB Backup backs up the complete data of Android smartphones and tablets to PCs. A single click suffices. It supports Android versions 4.0 and above. A root access is not required. Simple ADB Backup provides multiple backup options. Thus, the Android users can create the backup with or without system apps or copy the …

Wifi Unlocker for Android

A secure password is not the only reason to protect in setting up a wireless network, the A and O. own privacy. And on current legislation it is also responsible for the activities that occur by third parties through its own network, say, a third person Hack and invites illegal movies or music down, so …

map