Related software
Free Folder Password Lock
Free Folder Password Lock - File encryption
DAA2ISO
Streamlined DAA to ISO Conversion Tool

Comodo Rescue Disk
Comodo Rescue Disk (CRD) is a free bootable Antivirus program that is able to check for viruses, malicious registry keys, root-kits, and more before your computer even starts up as it has been designed to scan your system in a pre-boot environment. The app is intended to be used when dangerous malware has embedded itself so deeply into your system that standard antivirus software is not able to remove it. Comodo Rescue Disk is extremely effective at removing infections, which prevent the Windows operating system from booting up. Key Features include: On-demand malware scanner discovers root-kits and other hidden threats. Extremely efficient malware removal routines thoroughly clean infected computers. Automatically downloads latest virus signatures. Comprehensive event logs provide detailed overview of malware activity. Requires no installation and can be launched direct from removable media. Can be operated in either GUI or text mode. Ensures a PC is clean before proceeding onto OS installation. Intuitive user interface. The interface for Comodo Rescue Disk is very familiar and actually resembles its desktop counterpart, so most users will find it easy to work with. Usefully, it can provide a comprehensive and rigorous scan because it cleans your system before the operating system is loaded. Overall, Comodo Rescue Disk is an great addition to any security toolkit and is a great complement to Comodo’s own Antivirus software. It includes tools that allow you to explore files and take screenshots as well. Minimum hardware requirements, of either a 32-bit or 64-bit OS: Intel Pentium II 233 MHz or equivalent processor, with a minimum RAM requirement of 512 MB, and 210 MB hard disk space. Supported operating systems include: Windows 8, Windows 7, Windows Vista, and Windows XP.
GMER
GMER is a simple yet powerful anti-malware tool that thoroughly scans your system for vulnerabilities and evidence of Rootkit activity. It has a standard explorer interface with a tabbed toolbar comprising of Processes, Modules, Services, Files, Registry, Rootkit/Malware, CMD, and Autostart. GMER scans for: Inline hooks. Drivers hooking IRP calls. Drivers hooking IDT. Drivers hooking SSDT. Hidden registry keys. Hidden Alternate Data Streams. Hidden disk sectors (MBR). Hidden files. Hidden services. Hidden modules. Hidden threads. Hidden processes. Not only does GMER scan for malware, it also allows you to monitor the following system functions: process creating, driver loading, library loading, file functions, registry entries, and TCP or IP connections. Overall, GMER is a specific tool that specializes in Rootkit removal. It is fast, relatively lightweight and does exactly what is says on the tin: a great anti-Rootkit remover. *GMER runs only on Windows NT/W2K/XP/VISTA/7/8. Important: The developer has recommended downloading GMER with a different name to avoid detection by certain malware, which may prevent GMER from launching.
TrueCrypt
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space). This software is highly recommended for securing data on laptops. TrueCrypt performs the following tasks: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Please Note: According to the programs author, TrueCrypt is not secure because it could contain unfixed security issues, therefore you should download TrueCrypt only if you are migrating data encrypted by TrueCrypt. As The development of TrueCrypt was ended in 5/2014 you should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
Skype Portable
Skype Portable For Windows - Does it Require Installation?
Backup & Recovery 14 Free Edition
Features of Paragon Backup & Recovery

Ashampoo WinOptimizer Free
An enhanced system tune-up software
365DiskData
Optimize Your Storage with 365DiskData
AxCrypt
AxCrypt is a highly secure data encryption app that provides AES-128/256 file encryption and compression for Windows. It has a simple interface and works with a single double-click to automatically decrypt and open documents. It has seamless integration with Windows Explorer with no configuration required. AxCrypt is used to share and work with stored documents and e-mail attachments, in a secure manner. If your documents reside on a document sharing service or file server, AxCrypt is well suited and is able to seamlessly integrate, and makes both sharing and storing sensitive data a simple task. Key Features* include: Collaboration. Strong encryption with AES 128-bit or 256-bit encryption. Cloud storage awareness. Multilingual: English, French, Swedish, Spanish. Password management. Intuitive interface. Secured folders. Offline encryption/decryption. Support via email and forum. AxCrypt is a great tool for protecting your documents such as private correspondence, employment information, medical information, and financial details. It doesn't matter whether this data is stored on a local hard disk or network server, encrypting it is easy. Simply right-click any document file and encrypt it via the explorer interface. Overall, AxCrypt is a straightforward security solution that can be used by anyone, regardless of their skills. The interface is clean, crisp and easy to navigate, and the app itself is lightweight and consumes hardly any system resources. With AES 128-bit encryption as standard, and AES 256 bit encryption as a Premium option, along with other secure tools, including a Password Generator and Cloud Storage Awareness, it’s no wonder AxCrypt is used by over 20 million people globally. *Some features are only available in AxCrypt Premium.
VirtualDub
Are you looking for a streamlined tool for capturing and processing videos? Well, VirtualDub is your choice. (Batch-)Process your AVI files, apply video filters and tune your codecs to gain high quality results. Capture Features: Access all Video for Windows compatible devices. Free frame rate definition. Optimized disk access for more consistent hard disk usage. Create AVI2 (OpenDML) files to break the AVI 2GB barrier. Integrated volume meter and histogram for input level monitoring. Real-time downsizing, noise reduction, and field swapping. Verbose monitoring, including compression levels, CPU usage, and free disk space. Access hidden video formats your capture card may support but not have a setting for, such as 352x480. Keyboard and mouse shortcuts for faster operation. Clean interface layout: caption, menu bar, info panel, status bar. Processing Features: Reads and writes AVI2 (OpenDML) and multi-segment AVI clips. Remove and replace audio tracks without touching the video. Extensive video filter set, including blur, sharpen, emboss, smooth, 3x3 convolution, flip, resize, rotate, brightness/contrast, levels, deinterlace, and threshold. Bilinear and bicubic resampling. Decompress and recompress both audio and video. Remove segments of a video clip and save the rest without recompressing. Adjust frame rate, decimate frames, and 3:2 pulldown removal. Preview the results with live audio. Queue and automate your jobs.
Thumbs Remover
Removing thumbs.db preview files