Security & Paranoia
|Anonymity||Firewall||Password Generators||Password Managers||Steganography||VPN Services|
Sports & Racing
Calculators & Math
Hobbies & Crafts
Charts & Graphs
3D & Animation
Classic OS Updates
Disk & File
Cookies come in a number of different forms: HTTP cookies, Flash cookies, Isolated Storage, Local Storage, Databases, IndexedDB's etc... and Cookie 5 takes away the headache of managing all of these.
Just set it and forget it. After a quick 5min setup, Cookie will automatically remove all your private data to whatever schedule you choose. It couldn't be easier!
Works for Safari, Chrome, Firefox, Opera, Flash and Silverlight.
Download File Size: 7 MB
No subscription required
Totally free desktop version
Saves your data locally on device
Works with Macintosh, iOS, Linux, Windows and Android
Wide range of cloud sync - iCloud, Dropbox, OwnCloud, GoogleDrive, One Drive and Box
Stores everything - We believe there's always more than the passwords. With Enpass, not only you can save your passwords, but also the Credit cards, Passports, Bank account details, secure notes and everything else.
Download File Size: 36.5 MB
Download File Size: 66.1 MB
Disk Utility 17.0.3
Use Disk Utility to create disk images.
To encrypt the disk image, click the Encryption pop-up menu, then choose an encryption option.
When you format an internal or external volume, you can encrypt and protect the volume with a password. If you encrypt an internal disk, you must enter a password to access the disk and its information. If you encrypt an external device, you must enter the password when you connect the device to your computer.
To encrypt and protect the volume with a password using Disk Utility, you must erase the volume first. If the volume contains files you want to save, be sure to copy them to another volume.
Here's what you get with your VPN service
Feature All Plans
The full suite of ExpressVPN’s easy-to-use software for all your devices (Windows, Mac, iOS, Android, Routers, Linux)
Unlimited server switches
OpenVPN (TCP, UDP), L2TP-IPsec, SSTP, and PPTP protocols
Zero logging of your network traffic
Servers in more than 94 countries
Simultaneous connections on up to 3 devices
Round-the-clock customer support by chat or email
Awesome referral program: Refer friends and get 30 days of free service for each signup!
30-day money-back guarantee
Download File Size: 18.8 MB
Download File Size: 97.4 MB
FileVault full-disk encryption (FileVault 2) uses XTS-AES-128 encryption with a 256-bit key to help prevent unauthorized access to the information on your startup disk.
Find My Mac
With Find My Mac, you can locate and protect your Mac if it's ever lost or stolen. To use Find My Mac, simply turn it on in System Preferences > iCloud. You need to set up Find My Mac before it goes missing. If you believe that your Mac was stolen, contact your local law enforcement.
GPG Suite 2018.3
EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails Posted May 15, 2018
Everything you need to get started with secure communication and encrypting files in one simple package.
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.
is an open source plugin for Apple Mail. Encrypt, decrypt, sign and verify mails using OpenPGP with a few simple clicks.
is an open source application for macOS. It allows you to manage your OpenPGP keys. Create and modify your keys and import the keys of your friends from a key server.
is a plugin that brings GPG power to almost any application. It allows you to encrypt/decrypt, sign/verify and import keys from text selections, files, folders and much more.
is the underlying power engine of GPG Suite. If you're familiar with the command line use the raw power of it. Based on GnuPG.
Download File Size: 25.6 MB
iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.
Download File Size: 459 Kb
KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License.
KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database. KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature.
The complete database is always encrypted either with AES (alias Rijndael) or Twofish encryption algorithm using a 256 bit key. Therefore the saved information can be considered as quite safe. KeePassX uses a database format that is compatible with KeePass Password Safe. This makes the use of that application even more favourable.
Download File Size: 6.8 MB
KeePass Cross-Platform Community Edition
The thing computers can do best is storing information.
You shouldn't waste your time trying to remember and type your passwords.
KeePassXC can store your passwords safely and auto-type them into your everyday websites and applications.
Encrypted - The complete database is always encrypted with the industry-standard AES (alias Rijndael) encryption algorithm using a 256 bit key. KeePassXC uses a database format that is compatible with KeePass Password Safe. Your wallet works offline and requires no Internet connection.
Cross-Platform - KeePassXC is a community fork of KeePassX, the cross-platform port of KeePass for Windows. Every feature works cross-platform and was thoroughly tested on multiple systems to provide users with the same look and feel on every supported operating system. This includes the beloved Auto-Type feature.
Open Source - The full source code is published under the terms of the GNU General Public License.
Download File Size: 14.7 MB
Keychain Access 10.0
Keychain Access is an OS X app that stores your passwords and account information and reduces the number of passwords you have to remember and manage.
When you access a website, email account, network server, or other password-protected item, you may be given the option to remember or save the password. If you choose to save the password, it’s saved in your keychain so you don’t have to remember or type your password every time.
To Generate a new Password.
1. Open Keychain Access
2. Click the + symbol at the bottom left
3. Click the Key symbol next to the password box
4. Choose the type of password you want (Eg. Memorable, FIPS-181, Random etc.)
Little Snitch 4.1
As soon as you're connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in the cases of tracking software, trojans or other malware, they don’t.
But you don’t notice anything, because all of this happens invisibly under the hood.
Little Snitch makes these Internet connections visible and puts you back in control!
Download File Size: 41.2 MB
Generates truly random passwords by seeding algorithm with $RANDOM
Highly configurable, including allowing for generation of FIPS 181 compliant passwords
Download File Size: 84 Kb
macOS features one of the best network firewalls: PF (Packet Filter). It comes in an "under the hood" fashion, installed and disabled by default. Murus's purpose is to unleash its potential. With its easy and intuitive icons-based and drag&drop-based interface, visual layers of abstraction and a friendly view of the PF firewall it's a lean and mean tool to protect your Mac and network.
Download File Size: 22.9 MB
With NetShade, you connect to the Internet through the server of your choice. Access content overseas, and protect your privacy online. NetShade runs 13 servers in 7 different countries.
Now with IPv6. - IPv6 is the Internet of the future. NetShade 7 gives you access to IPv6 right now, even if your Internet provider doesn't support it yet. NetShade 7 is all you need to access to the entire IPv6 Internet. Open up new routing possibilities, and unblock previously inaccessible content. Learn more about IPv6
A higher class of proxy & VPN service. - If you’ve had bad luck with slow, unreliable, fly-by-night VPN providers in the past, we’re glad you found us. NetShade has been in operation for 13 years, and over that time we’ve build a reputation of trust and reliability with our customers. We take pride in the quality of our app, and the integrity and reliability of our services.
Download File Size: 12.9 MB
Download File Size: 6.7 MB
Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click. It's that simple.
Download File Size: 46.4 MB
Download File Size: 93.1 MB
OnyX is a maintenance, optimization, and personalization utility. It also makes it possible to configure certain hidden parameters of the Finder, Dock, and Safari, to remove a certain number of files and folders that may become cumbersome, preview the different logs and CrashReporter, and more. Repair permissions. Securely delete files and folders (Important: You should not perform this operation on a solid-state drive or Fusion drive.)
Download File Size: 8.2 MB
The Mac server account creation, permissions setting, and password generation tool.
1. Import Database Text
2. Name Concatenation
3. Generate Passwords
4. Duplicate Checking
5. Set Account Parameters
6. Exports for Mac OS X Server and user-defined customized export
7. Create Folders
8. Migrate Account Folders
9. Set Permissions
Download File Size: 10.1 MB
PasswordWallet is a convenient, easy to use, secure place to store all your usernames, passwords, PINs, or combinations. It just doesn't get any easier than this!
- PasswordWallet has a tight user interface that allows you to use your passwords as quickly and as painlessly as possible.
- Our unique Auto-typing technology is more secure than copying your password to the clipboard.
- Use Auto-typing to enter multiple usernames and passwords across multiple web pages.
- For security, PasswordWallet uses the BlowFish encryption algorithm with 448-bit keys to protect your data. For safety, PasswordWallet can copy your password to the clipboard and clear it automatically after you paste.
- Keep your master password in the Mac OS X keychain.
Download File Size: 9.3 MB
Download File Size: 19.9 MB
Perfect Privacy is committed to the privacy and anonymity of its members since 2008 and is one of the most secure VPN providers worldwide since the beginning. The protection of your privacy is our main concern – therefore we do not record user activity.
You can freely choose between all of our fast VPN servers. These are distributed throughout the world, including popular locations like Sweden, Russia, Iceland, Hong Kong and the Netherlands. Most of our servers have IPv6 addresses and bandwidth up to 1000 mbps.
We trust in open source software and develop our privacy solutions in-house without third parties. For encryption we use proven and safe industry standards like OpenVPN (AES 256 bit) and IPSec, which are usable on all common operating systems.
Permanent Eraser 2.8.0
When you normally delete your files in Mac OS X, the operating system is only forgetting where those particular files are placed, while the data still physically remains on the drive. Beginning with Mac OS X 10.3, Apple enhanced its security by introducing the Secure Empty Trash feature, which follows the U.S. DoD pattern of overwriting data seven times.
Permanent Eraser provides additional wiping methods such as the 3-pass DoE or 35-pass Gutmann algorithms. This utility overwrites your data multiple times, scrambles the original file name, and truncates the file size to nothing before Permanent Eraser finally unlinks it from the system. Once your data has been erased, it can no longer be read through traditional means.
Can Permanent Eraser erase data from a flash-based drive (SSD, thumb drive, etc.)?
Due to the differences in how flash-based drives read and write data (versus traditional magnetic media hard drives), it is not recommended to use Permanent Eraser or any other traditional hard drive wiping method on flash-based drives. At this time, there does not seem to be a reliable method via software to erase data from flash-based drives. The best advice is to encrypt your drive, which can help provide some measure of protection for your data. However, if Permanent Eraser finds that a file is located on a SSD, the file will only be erased once to prevent unnecessary overwriting.
Download File Size: 4.9 MB
Outguess is an advanced steganography tool. Outguess will conceal your document inside an image (JPG) of your choice.
Download File Size: 9.4 MB
Private Internet Access 80.0
Private Internet Access provides state of the art, multi-layered security with advanced privacy protection using VPN tunneling. Scroll below to the Security Layers section to learn more about each individual layer.
Our services have been designed from the ground up to be able to operate using built-in technology pre-existing in your computer or smartphone device.
The services operate at the TCP/IP interface level, which means all of your applications will be secured, not just your web browser.
Download File Size: 76.3 MB
Download File Size: 23.6 MB
SimpleAuthority is a free Certification Authority (CA). It generates keys and certificates that provide cryptographic digital identities for a community of people and/or computer servers. These identities are designed to be used in other applications for security purposes within this community.
SimpleAuthority is designed to be very easy to use and does not require an external database or similar supporting components. It is built on The Legion of the Bouncy Castle cryptographic library.
SimpleAuthority can be used to generate keys and certificates for:
- Secure email - for digital signing and encryption of email
- VPN access - to provide a much higher level of security than username/password access
- Client SSL authentication - to authenticate a person to a Web Server, such as to restrict access to a subversion repository or other online content, and
- Server SSL authentication - to authenticate a Web Server to people within the community.
Download File Size: 81.7 MB
In 1998, Martin Roesch wrote an open source technology called Snort, which he termed a "lightweight" intrusion detection technology in comparison to commercially available systems. Today that moniker doesn't even begin to describe the capabilities that Snort brings to the table as the most widely deployed intrusion prevention technology worldwide. Over the years Snort has evolved into a mature, feature rich technology that has become the de facto standard in intrusion detection and prevention. Recent advances in both the rules language and detection capabilities offer the most flexible and accurate threat detection available, making Snort the "heavyweight" champion of intrusion prevention.
Download File Size: 6.4 MB
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.
Download File Size: 64.6 MB
Ensure Privacy and Security
Without a VPN, your IP address, location, browsing activity and online communications are at risk. A VPN app encrypts your Internet connection to secure it when using public Wi-Fi and other networks. Protect your online privacy from hackers, snoops and governmental surveillance whether you're browsing the Internet at home or on the go.
Bypass Censorship and Restrictions
VyprVPN allows you to change your IP address and appear local to any of our 70+ worldwide server locations. This is invaluable when travelling in countries that impose Internet censorship, as well as in schools or workplaces that impart restrictions. Buy a VPN to bypass blocked websites and content and maintain access to an unrestricted Internet.
Improve Streaming Access and Speed
When streaming content without a fast VPN, your ISP and streaming service can monitor your activity and throttle your Internet connection. When using a VPN, your provider sees only encrypted traffic and is unable to slow you down based on what you're doing. Bypass location-based blocks and access global media, as well as increase privacy while streaming.
Download File Size: 19.7 MB
Download File Size: 54.4 MB
All Downloads are Direct Links to that Provided by the Developer/Publisher