Security & Paranoia
|Anonymity||Firewall||Password Generators||Password Managers||Steganography||VPN Services|
Sports & Racing
Calculators & Math
Charts & Graphs
Hobbies & Crafts
Classic OS Updates
3D & Animation
Classic OS Updates
Disk & File
Disk Utility 16.3
Use Disk Utility to create disk images.
To encrypt the disk image, click the Encryption pop-up menu, then choose an encryption option.
When you format an internal or external volume, you can encrypt and protect the volume with a password. If you encrypt an internal disk, you must enter a password to access the disk and its information. If you encrypt an external device, you must enter the password when you connect the device to your computer.
To encrypt and protect the volume with a password using Disk Utility, you must erase the volume first. If the volume contains files you want to save, be sure to copy them to another volume.
Here's what you get with your VPN service
Feature All Plans
The full suite of ExpressVPN’s easy-to-use software for all your devices (Windows, Mac, iOS, Android, Routers, Linux)
Unlimited server switches
OpenVPN (TCP, UDP), L2TP-IPsec, SSTP, and PPTP protocols
Zero logging of your network traffic
Servers in more than 94 countries
Simultaneous connections on up to 3 devices
Round-the-clock customer support by chat or email
Awesome referral program: Refer friends and get 30 days of free service for each signup!
30-day money-back guarantee
FileVault full-disk encryption (FileVault 2) uses XTS-AES-128 encryption with a 256-bit key to help prevent unauthorized access to the information on your startup disk.
Find My Mac
With Find My Mac, you can locate and protect your Mac if it's ever lost or stolen. To use Find My Mac, simply turn it on in System Preferences > iCloud. You need to set up Find My Mac before it goes missing. If you believe that your Mac was stolen, contact your local law enforcement.
GPG Suite 2017.1b3
Everything you need to get started with secure communication and encrypting files in one simple package.
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.
is an open source plugin for Apple Mail. Encrypt, decrypt, sign and verify mails using OpenPGP with a few simple clicks.
is an open source application for macOS. It allows you to manage your OpenPGP keys. Create and modify your keys and import the keys of your friends from a key server.
is a plugin that brings GPG power to almost any application. It allows you to encrypt/decrypt, sign/verify and import keys from text selections, files, folders and much more.
is the underlying power engine of GPG Suite. If you're familiar with the command line use the raw power of it. Based on GnuPG.
Download File Size: 28.9 MB
iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.
Download File Size: 6.2 MB
KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License.
KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database. KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature.
The complete database is always encrypted either with AES (alias Rijndael) or Twofish encryption algorithm using a 256 bit key. Therefore the saved information can be considered as quite safe. KeePassX uses a database format that is compatible with KeePass Password Safe. This makes the use of that application even more favourable.
Download File Size: 6.8 MB
Keychain Access 9.0
Keychain Access is an OS X app that stores your passwords and account information and reduces the number of passwords you have to remember and manage.
When you access a website, email account, network server, or other password-protected item, you may be given the option to remember or save the password. If you choose to save the password, it’s saved in your keychain so you don’t have to remember or type your password every time.
To Generate a new Password.
1. Open Keychain Access
2. Click the + symbol at the bottom left
3. Click the Key symbol next to the password box
4. Choose the type of password you want (Eg. Memorable, FIPS-181, Random etc.)
Little Snitch 4.0.2
As soon as you're connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in the cases of tracking software, trojans or other malware, they don’t.
But you don’t notice anything, because all of this happens invisibly under the hood.
Little Snitch makes these Internet connections visible and puts you back in control!
Download File Size: 49.4
Generates truly random passwords by seeding algorithm with $RANDOM
Highly configurable, including allowing for generation of FIPS 181 compliant passwords
Download File Size: 84 Kb
macOS features one of the best network firewalls: PF (Packet Filter). It comes in an "under the hood" fashion, installed and disabled by default. Murus's purpose is to unleash its potential. With its easy and intuitive icons-based and drag&drop-based interface, visual layers of abstraction and a friendly view of the PF firewall it's a lean and mean tool to protect your Mac and network.
Download File Size: 25.2 MB
With NetShade, you connect to the Internet through the server of your choice. Access content overseas, and protect your privacy online. NetShade runs 13 servers in 7 different countries.
Now with IPv6. - IPv6 is the Internet of the future. NetShade 7 gives you access to IPv6 right now, even if your Internet provider doesn't support it yet. NetShade 7 is all you need to access to the entire IPv6 Internet. Open up new routing possibilities, and unblock previously inaccessible content. Learn more about IPv6
A higher class of proxy & VPN service. - If you’ve had bad luck with slow, unreliable, fly-by-night VPN providers in the past, we’re glad you found us. NetShade has been in operation for 13 years, and over that time we’ve build a reputation of trust and reliability with our customers. We take pride in the quality of our app, and the integrity and reliability of our services.
Download File Size: 15.4 MB
Repair permissions. Securely delete files and folders (Important: You should not perform this operation on a solid-state drive or Fusion drive.) OnyX is a maintenance, optimization, and personalization utility. It also makes it possible to configure certain hidden parameters of the Finder, Dock, and Safari, to remove a certain number of files and folders that may become cumbersome, preview the different logs and CrashReporter, and more.
Download File Size: 30.4 MB
The Mac server account creation, permissions setting, and password generation tool.
1. Import Database Text
2. Name Concatenation
3. Generate Passwords
4. Duplicate Checking
5. Set Account Parameters
6. Exports for Mac OS X Server and user-defined customized export
7. Create Folders
8. Migrate Account Folders
9. Set Permissions
Download File Size: 10.1 MB
PasswordWallet is a convenient, easy to use, secure place to store all your usernames, passwords, PINs, or combinations. It just doesn't get any easier than this!
- PasswordWallet has a tight user interface that allows you to use your passwords as quickly and as painlessly as possible.
- Our unique Auto-typing technology is more secure than copying your password to the clipboard.
- Use Auto-typing to enter multiple usernames and passwords across multiple web pages.
- For security, PasswordWallet uses the BlowFish encryption algorithm with 448-bit keys to protect your data. For safety, PasswordWallet can copy your password to the clipboard and clear it automatically after you paste.
- Keep your master password in the Mac OS X keychain.
Download File Size: 9 MB
Pastor is a tool to store all your passwords, website logins, program serial numbers, etc. RC4-encrypted and password-protected. With built-in password generator.
Download File Size: 6.2 MB
Permanent Eraser 2.7.1
When you normally delete your files in Mac OS X, the operating system is only forgetting where those particular files are placed, while the data still physically remains on the drive. Beginning with Mac OS X 10.3, Apple enhanced its security by introducing the Secure Empty Trash feature, which follows the U.S. DoD pattern of overwriting data seven times.
Permanent Eraser provides additional wiping methods such as the 3-pass DoE or 35-pass Gutmann algorithms. This utility overwrites your data multiple times, scrambles the original file name, and truncates the file size to nothing before Permanent Eraser finally unlinks it from the system. Once your data has been erased, it can no longer be read through traditional means.
Can Permanent Eraser erase data from a flash-based drive (SSD, thumb drive, etc.)?
Due to the differences in how flash-based drives read and write data (versus traditional magnetic media hard drives), it is not recommended to use Permanent Eraser or any other traditional hard drive wiping method on flash-based drives. At this time, there does not seem to be a reliable method via software to erase data from flash-based drives. The best advice is to encrypt your drive, which can help provide some measure of protection for your data. However, if Permanent Eraser finds that a file is located on a SSD, the file will only be erased once to prevent unnecessary overwriting.
Download File Size: 1.4 MB
Access geo-restricted content
Unable to access certain websites and services in your country, school or workplace? NordVPN can help by making you appear to be somewhere else! Avoid censorship: connect to a server in a location required to access your favorite content, and enjoy it anytime anywhere.
Stay secure and private
NordVPN secures your Internet traffic with military-grade encryption, protecting you from cyber criminals and snoopers. We keep no logs, so your browsing activity, including IP address, websites visited and session duration, remains absolutely private.
Download File Size: 14 MB
Outguess is an advanced steganography tool. Outguess will conceal your document inside an image (JPG) of your choice.
Download File Size: 6.7 MB
Private Internet Access 72.0
Private Internet Access provides state of the art, multi-layered security with advanced privacy protection using VPN tunneling. Scroll below to the Security Layers section to learn more about each individual layer.
Our services have been designed from the ground up to be able to operate using built-in technology pre-existing in your computer or smartphone device.
The services operate at the TCP/IP interface level, which means all of your applications will be secured, not just your web browser.
Download File Size: 61.2 MB - Installer
If you find yourself regularly toggling between showing all files, and hiding them, try downloading our free program that switches back and forth with the click of a button.
To use this program, simply run the program, and you will be presented with a few options. The top box allows you to toggle between showing and hiding files that have been designated as hidden on a mac. Just click the appropriate button, and the program will execute the two commands above. Pretty simple.
This app now also gives you control over which files / folders are visible when the AppleShowAllFiles flag is set to NO. To use this feature of the program, drag any files and folders that you wish to change the visibility of into the window in the second box. Once the files / folders are loaded, click the appropriate button to make these files visible / invisible. In order to make an invisible file become visible, you will need to have first clicked the "Show Special Files" button in box 1 (otherwise, you won't be able to see the files in order to drag them into the box).
Download File Size: 2.3 MB
SimpleAuthority is a free Certification Authority (CA). It generates keys and certificates that provide cryptographic digital identities for a community of people and/or computer servers. These identities are designed to be used in other applications for security purposes within this community.
SimpleAuthority is designed to be very easy to use and does not require an external database or similar supporting components. It is built on The Legion of the Bouncy Castle cryptographic library.
SimpleAuthority can be used to generate keys and certificates for:
- Secure email - for digital signing and encryption of email
- VPN access - to provide a much higher level of security than username/password access
- Client SSL authentication - to authenticate a person to a Web Server, such as to restrict access to a subversion repository or other online content, and
- Server SSL authentication - to authenticate a Web Server to people within the community.
Download File Size: 80.6 MB
In 1998, Martin Roesch wrote an open source technology called Snort, which he termed a "lightweight" intrusion detection technology in comparison to commercially available systems. Today that moniker doesn't even begin to describe the capabilities that Snort brings to the table as the most widely deployed intrusion prevention technology worldwide. Over the years Snort has evolved into a mature, feature rich technology that has become the de facto standard in intrusion detection and prevention. Recent advances in both the rules language and detection capabilities offer the most flexible and accurate threat detection available, making Snort the "heavyweight" champion of intrusion prevention.
Download File Size: 6.4 MB
TinkerTool is an application that gives you access to additional preference settings Apple has built into Mac OS X. This allows to activate hidden features in the operating system and in some of the applications delivered with the system.
The tool makes sure that preference changes can only affect the current user. You don't need administrative privileges to use the tool. With this design, it is no problem to use TinkerTool in professional networks where users have restricted permissions. The program will never change any component of the operating system, so the integrity of your system is not put at risk, and there will be no negative effect on system updates.
All preference settings changed by TinkerTool can be reset to Apple's defaults, or to the state that existed before using the tool. No dangerous background processes are used for TinkerTool's operation.
Because TinkerTool only gives you access to features already built into Mac OS X, its feature set varies greatly between different operating system versions.
Download File Size: 4.4 MB
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.
Download File Size: 63.6 MB
Denotes Mac OS X Intel Native
Denotes Mac OS X Intel & PPC Native
Denotes Mac OS X PPC Native
Denotes Mac OS 8/9 PPC Native
Denotes Mac OS 680x0 Native
Denotes Non-OS Specific Code