Related software

Comodo Rescue Disk
Comodo Rescue Disk (CRD) is a free bootable Antivirus program that is able to check for viruses, malicious registry keys, root-kits, and more before your computer even starts up as it has been designed to scan your system in a pre-boot environment. The app is intended to be used when dangerous malware has embedded itself so deeply into your system that standard antivirus software is not able to remove it. Comodo Rescue Disk is extremely effective at removing infections, which prevent the Windows operating system from booting up. Key Features include: On-demand malware scanner discovers root-kits and other hidden threats. Extremely efficient malware removal routines thoroughly clean infected computers. Automatically downloads latest virus signatures. Comprehensive event logs provide detailed overview of malware activity. Requires no installation and can be launched direct from removable media. Can be operated in either GUI or text mode. Ensures a PC is clean before proceeding onto OS installation. Intuitive user interface. The interface for Comodo Rescue Disk is very familiar and actually resembles its desktop counterpart, so most users will find it easy to work with. Usefully, it can provide a comprehensive and rigorous scan because it cleans your system before the operating system is loaded. Overall, Comodo Rescue Disk is an great addition to any security toolkit and is a great complement to Comodo’s own Antivirus software. It includes tools that allow you to explore files and take screenshots as well. Minimum hardware requirements, of either a 32-bit or 64-bit OS: Intel Pentium II 233 MHz or equivalent processor, with a minimum RAM requirement of 512 MB, and 210 MB hard disk space. Supported operating systems include: Windows 8, Windows 7, Windows Vista, and Windows XP.
Free Folder Password Lock
Free Folder Password Lock - File encryption
DAA2ISO
Streamlined DAA to ISO Conversion Tool
GMER
GMER is a simple yet powerful anti-malware tool that thoroughly scans your system for vulnerabilities and evidence of Rootkit activity. It has a standard explorer interface with a tabbed toolbar comprising of Processes, Modules, Services, Files, Registry, Rootkit/Malware, CMD, and Autostart. GMER scans for: Inline hooks. Drivers hooking IRP calls. Drivers hooking IDT. Drivers hooking SSDT. Hidden registry keys. Hidden Alternate Data Streams. Hidden disk sectors (MBR). Hidden files. Hidden services. Hidden modules. Hidden threads. Hidden processes. Not only does GMER scan for malware, it also allows you to monitor the following system functions: process creating, driver loading, library loading, file functions, registry entries, and TCP or IP connections. Overall, GMER is a specific tool that specializes in Rootkit removal. It is fast, relatively lightweight and does exactly what is says on the tin: a great anti-Rootkit remover. *GMER runs only on Windows NT/W2K/XP/VISTA/7/8. Important: The developer has recommended downloading GMER with a different name to avoid detection by certain malware, which may prevent GMER from launching.
GParted
GNOME Partition Editor (Gparted) is used for creating, reorganizing, and deleting disk partitions. It uses libparted from the parted project to detect and manipulate partition tables. There are optional file system tools that permit managing file systems which are not included in libparted. Key features include: Create partition tables (e.g., MSDOS, GPT). Create, delete, copy, resize, move, check, set new UUID, or label partitions. Manipulate btrfs, ext2/3/4, f2fs, FAT16/32, hfs/hfs+, linux-swap, lvm2 pv, nilfs2, NTFS, reiserfs/4, ufs, and xfs file systems. Enable and disable partition flags (e.g., boot, hidden). Align partitions to mebibyte (MiB) or cylinder boundaries. Attempt data rescue from lost partitions. Supports hardware RAID, motherboard BIOS RAID, Linux software RAID. Supports all sector sizes (e.g., 512, 1024, 2048, 4096 byte sectors). GParted can be used on x86 and x86-64 based computers running Windows, Mac OS X or Linux, by booting from media containing GParted Live. GParted is a great piece of software that everyone should have stashed away, just in case they have any issues with their hard disk. It is really functional, has lots of nifty tools and has good hardware support. Above all, and I cannot emphasize this enough, it is very easy to use!
USB Security
Why Is USB Security Necessary?
Skype Portable
Skype Portable For Windows - Does it Require Installation?
GiliSoft Private Disk
Gilisoft Private Disk is a simple, yet powerful virtual disk encryption app, which can protect sensitive, personal data by encrypting it in files held on virtual disks. The advantage of saving files and folders on private, virtual disks is they are easily created and secured with the use of passwords. Virtual disks can also be managed in much the same manner as physical disks found on a hard drive, on your computer. Key Features include: Supports AES 256-bit encryption. Portable. Mount multiple disks simultaneously. Supports Dropbox encryption* Transparent encryption. GiliSoft Private Disk has a simple, intuitive interface that makes it easy to create private virtual drives in no time at all. To get started, simply select the size of the drive you need, and assign it a letter. Next, create a password to protect it and the app creates a private, virtual disk for you, which you can use to store your important personal data. If you use multiple private disks on your hard drive, you can switch between them in a few mouse clicks. You also have the ability to mount disks that have been hidden, and which cannot be accessed with other apps. In addition to supporting virtual drives on your disk, you can also create disks on USB drives, thereby providing you with increased portable security. Overall, GiliSoft Private Disk is a lightweight app that is easy to use, secure and robust with a few good features under the hood. *GiliSoft Private Disk can create an encrypted volume inside of your Dropbox (or other cloud storage).
TrueCrypt
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space). This software is highly recommended for securing data on laptops. TrueCrypt performs the following tasks: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Please Note: According to the programs author, TrueCrypt is not secure because it could contain unfixed security issues, therefore you should download TrueCrypt only if you are migrating data encrypted by TrueCrypt. As The development of TrueCrypt was ended in 5/2014 you should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
Backup & Recovery 14 Free Edition
Features of Paragon Backup & Recovery

Paragon Backup & Recovery Advanced
Paragon Backup & Recovery generates a backup of your data including operating system, application and personal files. The backup target can be another internal hard-drive, external storage such as CD/DVDs and portable disks, network storage as well as secured hidden partitions. Every file is copied sector-by-sector. A boot sector copy within the backup makes it easy to move from an old to a new hard-drive as the operating system doesn’t need to be re-installed. During recovery partition sizes are automatically adjusted if the new disk-drive has a different size. Paragon Backup & Recovery now supports SSD Drives and hard-disks larger than 2TB. E-Mailing can be set up to inform about the status of backup or recovery.

Ashampoo WinOptimizer Free
An enhanced system tune-up software