|
Our Sponsors |
at Cursor.com you can
send and receive files Large or small in the most secure way the
web has to offer.
Whatever your files may be , documents, personal information or
pictures & videos etc. ... if you don't want anybody to see what
your sending except the person your sending it too , then you
need to use Cursor
|
|
Home: Free Anonymous Products/Services
 |
If
you wish to join our newsletter/mailing list to keep to date on
what we add, please fill out the form below. When ever we add new
sites or have any news about this site we will inform you. You will
be able to remove yourself at anytime you wish. Your email address
is 100% confidential, it is never sold or used by anyone but us.
We do not send out ads to you neither.
|
Free Anonymous Products/Services Sites:
- MailWasher -
This is a powerful email checker with effective spam elimination.
Discover the safe way to stop unwanted viruses and e-mails before
they get to your computer. No gimmicks here, it is so easy to
set up and use that you'll be managing your email like a pro
in seconds. It can even be used as an effective privacy tool.
- KPKFile -
This is a program that provides security for your sensitive
files by encrypting and hiding them. It also offers the option
of burying the encrypted files within another still working
above suspicion file, such as a Microsoft Word document or a
bitmap image. Moreover, KPKFile can create a secret folder (named
Private Folder) that's impossible to access without the proper
password. Besides, KPKFile manages an encrypted database of
passwords and related data.
- NetBrute
Scanner - This tool allows you to scan
a single computer or multiple IP addresses for available Windows
File & Print Sharing resources. This is probably one of
the most dangerous and easily exploitable security holes. It
is common for your novice users to have their printers or their
entire hard drive shared without being aware of it. This utility
will help you to find these resources, so you can secure them
with a firewall or by informing your users how to properly configure
their shares with tighter security.
- Ad-aware
- Ad-aware Standard Edition is the award winning, free,
multicomponent detection and removal utility that consistently
leads the industry in safety, user satisfaction, support and
reliability. With its ability to comprehensively scan your memory,
registry, hard, removable and optical drives for known datamining,
aggressive advertising, and tracking components, Ad-aware will
provide the user with the confidence to surf the Internet knowing
that their privacy will remain intact. Let Ad-aware protect
your privacy.
- StealthMessage.com
- This gives you email privacy with self-destruct options through
your existing address. You choose the level of security, putting
control in your hands. There's no software to download and you
can access Stealth Message from anywhere, anytime through your
conventional browser.
- ZoneAlarm
- It is possible you may already have Spyware, Trojan horses
or other Internet Security Breaches on your machine. Eliminate
spyware that "phones home" user information
Remove key loggers that steal logins and passwords. Delete probe
tools that look for vulnerabilities to exploit Uncover over
60,000 types of destructive pests, adware and hacker tools.
Extend your protection against today's online threats... threats
your current antivirus doesn't even look for Zone Labs, Inc.
will provide you with our award-winning ZoneAlarm® absolutely
FREE.
- Sneakemail
- The original disposable email service, created for email users
to regain power over their email from commercial forces and
catch them spamming. Fully user supported and operating free
of exploitable commercial ties. No debt, no operating loss,
fully self sustaining... a virtual vault for your email address.
- Cryptext
- Cryptext is a public domain Windows shell extension that performs
strong file encryption and runs on Windows 95 or later and NT4
or later. It is available in English, French, German, Spanish,
Portuguese, Italian, Hungarian, Danish, and Finnish language
versions. You just right-click on any file system object to
encrypt or decrypt it. It uses a combination of SHA-1 and RC4
to encrypt files using a 160-bit key, and generates a salt value
for each file to ensure that no two files are encrypted with
the same keystream.
- JBoot
- JBoot 6.1 is the result of several years of their attempts
to secure their computer from unwanted visitors. As their ability
to make programs has increased, so has the quality of their
security program, JBoot. They figured that, if this program
is so important to them... why should they make people pay to
get it for themselves? SO, here it is. The first edition of
JBoot with enough quality to sell, for free. YES, FREE! No strings
attached. No 30 day trial, no anything. This program is FREE...
- HushMail
- A Web-based e-mail service that lets you send and receive
email in total security. Hushmail messages, and their attachments,
are encrypted using OpenPGP standard algorithms. These algorithms,
combined with Hushmail's unique key management system, offer
users unrivalled levels of security. Hushmail's security is
end-to-end; messages are encrypted before leaving the sender's
computer and remain encrypted until after they arrive on the
recipient's machine, where the contents are automatically decrypted.
Hushmail's encryption works automatically, transparently and
seamlessly, requiring no specialized computer skills or knowledge.
Encrypting a message is as simple as clicking a mouse.
- Dzap.com
- IDseal email: End-to-end secure web based email service Protects
privacy and secrecy. Prevents your ISP and corporate firewall
administrator from reading your emails. (This feature is available
even if the people whom you are communicating with do not use
secure email at all. No special software is required to use
this feature.) Uses Strong email encryption and SSL. Compatible
with OpenPGP secure email standard. End-to-end security no matter
where you go.
- Whisper
32 - Whisper 32 is a very easy-to-use Password
Manager for Windows 95 and Windows NT. Some of the features
are Store all of your passwords in one file, Password protection,
Built-in password generator, Passwords may be set to expire
at user-configurable intervals, Never type in passwords or user-names:
use the Windows clipboard to transfer them.
Automatic backups and Attractive interface.
- Kill
Docs - Provides a layer of security if
you are concerned about the contents of your Documents menu.
Start the program to put its icon in the system tray. A quick
double-click on the icon instantly clears the menu. Right-click
on the icon to invoke the Options dialog, which allows you to
set the program to automatically clear the Documents menu at
a user-defined interval between 1 and 99 minutes.
- Crypto
Kong - Digitally signs a document in the
using a secret (a secret file, or a secret passphrase, or both).
It will decipher a document encrypted to your signature. The
people you communicate with do not have, or need to have, your
secret. What one man knows, nobody knows, what two men know,
everyone knows
- Cookie
Cruncher - Rendering Better Avenues' most
recognized program Cookie Cruncher has become one of the highest
rated and most well known Cookie utilities in the world. The
phrase Cookie Cruncher has become the reference name of cookie
utilities. This is our first freeware program.
- Private
Idaho - an Internet privacy utility for
Windows. It simplifies using e-mail with PGP, anonymous remailers,
and nym servers, providing you with more electronic privacy.
Private Idaho is free, with no shareware or registration fees.
Its purpose is to encourage the wide spread use of strong cryptography
and provide users with a greater level of on-line privacy.
- Anonymous
Remailer FAQ - First published in 1995,
offers a nontechnical overview of "remailers" to help
you decide whether to use these computer services. When I first
wrote this FAQ, remailers were an esoteric subject. Today, millions
of persons use them.
- Cloak
- Cloak is an encryption / decryption program, allowing
you to send or store information with potentially total security.
The design of Cloak is such that the security is in the hands
of the user, not the program.
|
|
|
|