Our Sponsors
 
 
at Cursor.com you can
send and receive files Large or small in the most secure way the web has to offer.
 
Whatever your files may be , documents, personal information or pictures & videos etc. ... if you don't want anybody to see what your sending except the person your sending it too , then you need to use Cursor
 

Home: Free Anonymous Products/Services

If you wish to join our newsletter/mailing list to keep to date on what we add, please fill out the form below. When ever we add new sites or have any news about this site we will inform you. You will be able to remove yourself at anytime you wish. Your email address is 100% confidential, it is never sold or used by anyone but us. We do not send out ads to you neither.

Free Anonymous Products/Services Sites:

  • MailWasher - This is a powerful email checker with effective spam elimination. Discover the safe way to stop unwanted viruses and e-mails before they get to your computer. No gimmicks here, it is so easy to set up and use that you'll be managing your email like a pro in seconds. It can even be used as an effective privacy tool.

  • KPKFile - This is a program that provides security for your sensitive files by encrypting and hiding them. It also offers the option of burying the encrypted files within another still working above suspicion file, such as a Microsoft Word document or a bitmap image. Moreover, KPKFile can create a secret folder (named Private Folder) that's impossible to access without the proper password. Besides, KPKFile manages an encrypted database of passwords and related data.

  • NetBrute Scanner - This tool allows you to scan a single computer or multiple IP addresses for available Windows File & Print Sharing resources. This is probably one of the most dangerous and easily exploitable security holes. It is common for your novice users to have their printers or their entire hard drive shared without being aware of it. This utility will help you to find these resources, so you can secure them with a firewall or by informing your users how to properly configure their shares with tighter security.

  • Ad-aware  - Ad-aware Standard Edition is the award winning, free, multicomponent detection and removal utility that consistently leads the industry in safety, user satisfaction, support and reliability. With its ability to comprehensively scan your memory, registry, hard, removable and optical drives for known datamining, aggressive advertising, and tracking components, Ad-aware will provide the user with the confidence to surf the Internet knowing that their privacy will remain intact. Let Ad-aware protect your privacy.

  • StealthMessage.com  - This gives you email privacy with self-destruct options through your existing address. You choose the level of security, putting control in your hands. There's no software to download and you can access Stealth Message from anywhere, anytime through your conventional browser.

  • ZoneAlarm - It is possible you may already have Spyware, Trojan horses or other Internet Security Breaches on your machine. Eliminate spyware that "phones home" user information
    Remove key loggers that steal logins and passwords. Delete probe tools that look for vulnerabilities to exploit Uncover over 60,000 types of destructive pests, adware and hacker tools. Extend your protection against today's online threats... threats your current antivirus doesn't even look for Zone Labs, Inc. will provide you with our award-winning ZoneAlarm® absolutely FREE.

  • Sneakemail - The original disposable email service, created for email users to regain power over their email from commercial forces and catch them spamming. Fully user supported and operating free of exploitable commercial ties. No debt, no operating loss, fully self sustaining... a virtual vault for your email address.

  • Cryptext - Cryptext is a public domain Windows shell extension that performs strong file encryption and runs on Windows 95 or later and NT4 or later. It is available in English, French, German, Spanish, Portuguese, Italian, Hungarian, Danish, and Finnish language versions. You just right-click on any file system object to encrypt or decrypt it. It uses a combination of SHA-1 and RC4 to encrypt files using a 160-bit key, and generates a salt value for each file to ensure that no two files are encrypted with the same keystream.

  • JBoot - JBoot 6.1 is the result of several years of their attempts to secure their computer from unwanted visitors. As their ability to make programs has increased, so has the quality of their security program, JBoot. They figured that, if this program is so important to them... why should they make people pay to get it for themselves? SO, here it is. The first edition of JBoot with enough quality to sell, for free. YES, FREE! No strings attached. No 30 day trial, no anything. This program is FREE...

  • HushMail  - A Web-based e-mail service that lets you send and receive email in total security. Hushmail messages, and their attachments, are encrypted using OpenPGP standard algorithms. These algorithms, combined with Hushmail's unique key management system, offer users unrivalled levels of security. Hushmail's security is end-to-end; messages are encrypted before leaving the sender's computer and remain encrypted until after they arrive on the recipient's machine, where the contents are automatically decrypted. Hushmail's encryption works automatically, transparently and seamlessly, requiring no specialized computer skills or knowledge. Encrypting a message is as simple as clicking a mouse.

  • Dzap.com  - IDseal email: End-to-end secure web based email service Protects privacy and secrecy. Prevents your ISP and corporate firewall administrator from reading your emails. (This feature is available even if the people whom you are communicating with do not use secure email at all. No special software is required to use this feature.) Uses Strong email encryption and SSL. Compatible with OpenPGP secure email standard. End-to-end security no matter where you go.
  • Whisper 32  - Whisper 32 is a very easy-to-use Password Manager for Windows 95 and Windows NT. Some of the features are Store all of your passwords in one file, Password protection, Built-in password generator, Passwords may be set to expire at user-configurable intervals, Never type in passwords or user-names: use the Windows clipboard to transfer them.
    Automatic backups and Attractive interface.

  • Kill Docs  - Provides a layer of security if you are concerned about the contents of your Documents menu. Start the program to put its icon in the system tray. A quick double-click on the icon instantly clears the menu. Right-click on the icon to invoke the Options dialog, which allows you to set the program to automatically clear the Documents menu at a user-defined interval between 1 and 99 minutes.

  • Crypto Kong  - Digitally signs a document in the using a secret (a secret file, or a secret passphrase, or both). It will decipher a document encrypted to your signature. The people you communicate with do not have, or need to have, your secret. What one man knows, nobody knows, what two men know, everyone knows

  • Cookie Cruncher  - Rendering Better Avenues' most recognized program Cookie Cruncher has become one of the highest rated and most well known Cookie utilities in the world. The phrase Cookie Cruncher has become the reference name of cookie utilities. This is our first freeware program.

  • Private Idaho  - an Internet privacy utility for Windows. It simplifies using e-mail with PGP, anonymous remailers, and nym servers, providing you with more electronic privacy. Private Idaho is free, with no shareware or registration fees. Its purpose is to encourage the wide spread use of strong cryptography and provide users with a greater level of on-line privacy.

  • Anonymous Remailer FAQ  - First published in 1995, offers a nontechnical overview of "remailers" to help you decide whether to use these computer services. When I first wrote this FAQ, remailers were an esoteric subject. Today, millions of persons use them.

  • Cloak - Cloak is an encryption / decryption program, allowing you to send or store information with potentially total security. The design of Cloak is such that the security is in the hands of the user, not the program.

 

 

Interesting , Weird , Cool or Sponsors Web Sites ...
The Following Web Sites are interesting or Cool sites I have found that may be
Useful to you or are From our sponsors and help Keep this site Free! :)
| Video GamesMy Shark Teeth | OMG Sharks
Popup Blocker | Sharks | Worlds Creatures | Typing

Copyright 2004
No Bucks Free Stuff
All Rights Reserved