Double Password creates a key to your OS, writes it onto a USB gadget and voila: no one, except you can log into your Windows. You can configure the program so, that it will allow your system to operate only if your flash drive is inserted. Double Password features special protection against password spies a special encryption method. Double Password can turn almost any USB gadget into a smart security token. No key - no access.
Windows NT/2000/XP/2003 Server
Like it? Share with your friends!
Other Windows Software of Developer «Mipko Software»:
ESContainer There are many free cloud shared disk space for us to save files and get them later, which are very convenient. But, when files are uploaded to disk to shared disk, it will be not under our control. We can not guarantee that the files are viewed or modifie
SHA 512 Encoder for Windows 8 SHA512 Encoder is an application which encode the text you need to encrypt with the SHA512 algorithm. The application has a very sleek interface with it which you can enter the text, As you hit on the encode button, the text translates to the SHA512 algori
Keystroke Interference It is nearly impossible to detect all keystroke logging software. Network Intercept's Keystroke Interference is a solution that renders keystroke logging software useless. With chameleon-like characteristics, keystroke logging software can hide from even t
pdf-DocPro Server Edition Set presentation properties to PDF documents and compress PDFs up to 90% - in series! pdf-DocPro Server Edition is an ideal supplementary tool to people already using any PDF printer driver. With pdf-DocPro Server Edition you are able to set all PDF docume
Email Security Bulldog Security Bulldog protects you against all dangerous e-mail content including viruses, scripts, popups, webbugs, spyware, hoaxes. Compatible with all existing e-mail scanners. Whereas most anti-virus programs only scan for known viruses Security Bulldog rem
Digital Museum Creator Make your digital artwork secure against piracy, make your digital artwork secure against copy, and printing. Make your digital artwork secure against unauthorized use. Give it more value making it distributable. Prevent unauthorized use. Prevent the impre
Windows 2000 Desktop Separation Vulnerability In the Windows 2000 security model, a hierarchy of container objects is used to separate processes. Every session contains one or more windows stations; every windows station contains one or more desktops. By design, processes are constrained to run within
FileWall Portable FileWall Portable is encryption software that is easy to use. All functions are invoked via the Explorer context menu. It supports modes for making your files or folders completely invisible or simply inaccessible. The most important feature of Filewall is
Hidden sentence Hidden sentence is a program to hide text, sentences, or letters. Type or paste sentences and click hide button to hide the text with some letters.
MD5 & SHA Checksum Utility Pro MD5 & SHA Checksum Utility is a tool that allows you to generate CRC32, MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes of single or multiple files. You can also verify hashes with the matching file to ensure the file integrity is correct. You may click on
Supported Operating Systems:
Windows 2000 |
Windows NT |
Windows XP |
Comments on :
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10