Related software
Free Folder Password Lock
Free Folder Password Lock - File encryption

Comodo Rescue Disk
Comodo Rescue Disk (CRD) is a free bootable Antivirus program that is able to check for viruses, malicious registry keys, root-kits, and more before your computer even starts up as it has been designed to scan your system in a pre-boot environment. The app is intended to be used when dangerous malware has embedded itself so deeply into your system that standard antivirus software is not able to remove it. Comodo Rescue Disk is extremely effective at removing infections, which prevent the Windows operating system from booting up. Key Features include: On-demand malware scanner discovers root-kits and other hidden threats. Extremely efficient malware removal routines thoroughly clean infected computers. Automatically downloads latest virus signatures. Comprehensive event logs provide detailed overview of malware activity. Requires no installation and can be launched direct from removable media. Can be operated in either GUI or text mode. Ensures a PC is clean before proceeding onto OS installation. Intuitive user interface. The interface for Comodo Rescue Disk is very familiar and actually resembles its desktop counterpart, so most users will find it easy to work with. Usefully, it can provide a comprehensive and rigorous scan because it cleans your system before the operating system is loaded. Overall, Comodo Rescue Disk is an great addition to any security toolkit and is a great complement to Comodo’s own Antivirus software. It includes tools that allow you to explore files and take screenshots as well. Minimum hardware requirements, of either a 32-bit or 64-bit OS: Intel Pentium II 233 MHz or equivalent processor, with a minimum RAM requirement of 512 MB, and 210 MB hard disk space. Supported operating systems include: Windows 8, Windows 7, Windows Vista, and Windows XP.
DAA2ISO
Streamlined DAA to ISO Conversion Tool
GMER
GMER is a simple yet powerful anti-malware tool that thoroughly scans your system for vulnerabilities and evidence of Rootkit activity. It has a standard explorer interface with a tabbed toolbar comprising of Processes, Modules, Services, Files, Registry, Rootkit/Malware, CMD, and Autostart. GMER scans for: Inline hooks. Drivers hooking IRP calls. Drivers hooking IDT. Drivers hooking SSDT. Hidden registry keys. Hidden Alternate Data Streams. Hidden disk sectors (MBR). Hidden files. Hidden services. Hidden modules. Hidden threads. Hidden processes. Not only does GMER scan for malware, it also allows you to monitor the following system functions: process creating, driver loading, library loading, file functions, registry entries, and TCP or IP connections. Overall, GMER is a specific tool that specializes in Rootkit removal. It is fast, relatively lightweight and does exactly what is says on the tin: a great anti-Rootkit remover. *GMER runs only on Windows NT/W2K/XP/VISTA/7/8. Important: The developer has recommended downloading GMER with a different name to avoid detection by certain malware, which may prevent GMER from launching.
TrueCrypt
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space). This software is highly recommended for securing data on laptops. TrueCrypt performs the following tasks: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Please Note: According to the programs author, TrueCrypt is not secure because it could contain unfixed security issues, therefore you should download TrueCrypt only if you are migrating data encrypted by TrueCrypt. As The development of TrueCrypt was ended in 5/2014 you should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
Skype Portable
Skype Portable For Windows - Does it Require Installation?

USB Low-Level Format
Restore USB drives with secure low‑level format
Free Folder Password Lock
Fast password locking for private folders
VirtualDub
Are you looking for a streamlined tool for capturing and processing videos? Well, VirtualDub is your choice. (Batch-)Process your AVI files, apply video filters and tune your codecs to gain high quality results. Capture Features: Access all Video for Windows compatible devices. Free frame rate definition. Optimized disk access for more consistent hard disk usage. Create AVI2 (OpenDML) files to break the AVI 2GB barrier. Integrated volume meter and histogram for input level monitoring. Real-time downsizing, noise reduction, and field swapping. Verbose monitoring, including compression levels, CPU usage, and free disk space. Access hidden video formats your capture card may support but not have a setting for, such as 352x480. Keyboard and mouse shortcuts for faster operation. Clean interface layout: caption, menu bar, info panel, status bar. Processing Features: Reads and writes AVI2 (OpenDML) and multi-segment AVI clips. Remove and replace audio tracks without touching the video. Extensive video filter set, including blur, sharpen, emboss, smooth, 3x3 convolution, flip, resize, rotate, brightness/contrast, levels, deinterlace, and threshold. Bilinear and bicubic resampling. Decompress and recompress both audio and video. Remove segments of a video clip and save the rest without recompressing. Adjust frame rate, decimate frames, and 3:2 pulldown removal. Preview the results with live audio. Queue and automate your jobs.
Free Disk Usage Analyzer
Search and destroy hard drive hogging files
Delete Doctor
Efficient File Deletion Tool for Windows

Ashampoo WinOptimizer Free
An enhanced system tune-up software