Best SignTool Alternatives in 2024
Find the top alternatives to SignTool currently available. Compare ratings, reviews, pricing, and features of SignTool alternatives in 2024. Slashdot lists the best SignTool alternatives on the market that offer competing products that are similar to SignTool. Sort through SignTool alternatives below to make the best choice for your needs
-
1
Entrust TLS/SSL Certificates
Entrust
$199Entrust TLS/SSL Certificates offer validation of identity and encryption to protect your website, users, and data. Entrust TLS/SSL Certificates will secure your website so that your visitors can feel confident in knowing that your organization's identity has been verified. Also, encryption will protect their data and transactions. Entrust TLS/SSL Certificates ensure that your visitors don't see any browser alerts advising them that their website is "not secure" and that their connection is not private. Entrust is a founding member the CA Security Council, the CA/Browser Forum and actively contributes in the development of industry standards for TLS/SSL and S/MIME, code signing certificates and code management. Trust your digital security to a Certification Authority. - 2
-
3
GeoTrust
GeoTrust
$149 per yearGeoTrust, a trusted certificate authority, offers retail and reseller services for SSL encryption. Every company today needs web security they can trust in today's digital economy. GeoTrust has over 100,000 customers in more than 150 countries. This is why businesses all over the world choose GeoTrust to provide SSL/TLS security solutions. GeoTrust has been delivering business-class certificates to all sizes of organizations, from large enterprises to small businesses with just one site. This is at the best value. GeoTrust offers a wide range of authentication levels that allow companies to meet their security needs on virtually all major browsers and mobile devices while also aligning themselves as a trusted digital security brand. -
4
CodeSign
Aujas
Code signing is a security practice that helps to extend trust-based software system and application usage. Secure code signing is required for organizations that use and publish software. This is done to ensure that legitimate software is not stolen as ransomware. CodeSign by Aujas is a secure, scalable, and easy-to-integrate DevOps-ready platform. It ensures the integrity software applications, allows for allow-listing to protect internal infrastructures, protects signing keys, and provides automated audit trails to combat ransomware. CodeSign can be used as an on-premise appliance or as a SaaS app. It can easily scale to hundreds of millions file signings each year. It offers unmatched flexibility to sign all file types across all platforms. Organizations use a variety of software programs that are vital for their day-to-day business operations. -
5
ClickSSL
ClickSSL
$13.21ClickSSL is a platinum partner of leading Certificate Authorities such as GeoTrust, Symantec, RapidSSL and Thawte. ClickSSL offers EV SSL and Code Signing Certificate, UCC Certificates, Wildcard SSL and more SSL Certificates at a low market price. ClickSSL's SSL certificates will provide you with irreplaceable proof of your website's identity and customer confidence in your online business' integrity and security. Secure your online business with affordable RapidSSL, GeoTrust, Thawte, Thawte, and Symantec SSL Certificates. ClickSSL offers SSL certificates at an affordable price that provide strong 256 bit encryption to protect your web sites, eCommerce, intranets, and extranets. Over 99% of all current browsers support our digital certificate. Secure your site(s) with SSL certificate at the lowest price. Take HTTPS one step further and you will never lose your customers' confidence. -
6
SSL2BUY was founded with the goal of providing online security with the help our vast experience. Our trustworth certificates protect our customers from phishing attacks and malware activities. SSL2BUY was created to provide online safety with the help of our vast experience. You can secure unlimited subdomains with the AlphaSSL Wildcard certificate. This saves you time and effort in managing multiple certificates. Your visitors will be impressed by the level of security provided by AlphaSSL Wildcard certificate. It provides seamless, secure experience and guarantees website security. To establish a secure environment for their business and show their trustworthiness, every organization should purchase an SSL certificate. Our low-cost SSL certificates offer hassle-free security solutions. SSL certificates secure online transactions with strong 256 bit SSL encryption. We offer SSL certificates at a low price, but we will not compromise your web security. All certificates are based on the latest algorithms recommended by CA/Browser.
-
7
A trusted solution for obtaining Code Signing Certificates from globally reputed authorities that are compatible with signing all kinds of software,apps,EXEs and scripts for your business's security.
-
8
CodeSign Secure
Encryption Consulting LLC
Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD, and streamlined workflows for hands-free code signing. -
9
GaraSign
Garantir
There are many great enterprise security tools available. Some tools can be managed on-premise while others are available as a subscription. Others still use a hybrid model. The problem enterprises face isn't a lack in tools or solutions but a lack a seamless interconnectivity between these privileged management tools and a single place for managing and auditing them. GaraSign allows enterprises to integrate their security systems securely and efficiently in a way that doesn't disrupt existing business processes. GaraSign can centralize and simplify enterprise's most sensitive areas. This includes privileged access management (PAM), secure software development, privileged identity management, code signing, data security and PKI & SSM solutions. DevSecOps and many more. Security leaders in enterprise must be attentive to data security, privileged identity management (PAM), and other areas. -
10
SignPath
SignPath
In an era of increasing cyber security breaches, both platform vendors and their customers demand that all applications be digitally-signed. Code signing is the only method to ensure that software hasn't been modified by third parties. SignPath's corporate solutions enable DevOps to seamlessly integrate code signing into their development lifecycle, while empowering InfoSec to define secure policies and gain visibility over private key use. Code signing has become more complex due to frequent software updates, the popularity and use of microservices, as well as the stricter enforcement of security measures within the company. SignPath was designed for developers at one of Europe's leading software development companies. We automate security practices to keep your development agile. -
11
CheapSSLWeb
CheapSSLWeb
$2.99 1 RatingCheapSSLWeb is an authorized Sectigo partner (previously known as Comodo). We offer the cheapest SSL certificates from internationally reputed Certificate Authorities such as COMODO, SECTIGO and CERTERA. We offer all types of SSL & Code signing certificates such as OV certificates, DV certificates, and EV certificates. -
12
jarsigner
Oracle
The jarsigner software has two functions: to verify the integrity and signatures of signed JAR files, and to sign Java Archive files (JAR). A digital signature is a sequence of bits that are computed using some data (the signed data) and the private keys of an entity (a company, person, etc.). A digital signature is similar to a handwritten one in that it has many useful features. Its authenticity can be verified using the public key of the private key used to create the signature. It is a function for the data signed, and cannot be claimed as the signature for any other data. The signed data cannot also be changed. If the data has been altered, the signature cannot be verified and it cannot be forged if the private key is kept confidential. -
13
Keyfactor Signum
Keyfactor
Keyfactor Signum protects sensitive keys, automates policy, and integrates signing with your tools and build process. Create and store sensitive private keys in a cloud-based, FIPS 140-2 certified Hardware Security Module (HSM). Define granular policies for accessing and using private signing keys. Authenticate users, build servers and sign with a full audit. Integrate with native signing tools on the platform to protect access to signing keys without changing workflows. Integrate with signing software via lightweight Windows and Linux Agents that can be quickly installed on build servers or developer desktops. Create key attestations to comply with CA/B Forum requirements to verify that the keys are generated and stored in an HSM. -
14
SignServer Enterprise
PrimeKey
All your electronic signature needs can be met by a single platform. Integrates with business applications using standard interfaces. SignServer can be deployed in a number of ways to meet your requirements - as a hardware appliance, software appliance or cloud-based service. SignServer is a platform that covers all of your signing needs in one solution. This includes standard document signing, eIDAS Advanced Signing and Seal, code signing for different formats, timestamping and ICAO ePassport. Centralize your signature processes and avoid managing a multitude of signing solutions. This multitenant solution will also improve security policy compliance. Server-side solutions for signatures give you maximum control and security, and let you leverage your hardware security modules (HSMs) in the best possible way. Signature keys are created and used to sign in your HSM. SignServer supports the majority of HSMs available, as well as keys with a short lifecycle and keys or certificates that have a longer one. -
15
iOS App Signer
iOS App Signer
FreeiOS App Signer allows you to (re)sign your apps and bundle them in ipa files ready for installation on an iOS device. -
16
apksigner
Google
The apksigner, available in Android SDK Build Tools revisions 24.0.3 and above, allows you to sign APKs, and confirm that the signature of an APK will be successfully verified on all versions supported by the APK. This page is a quick guide to using the tool. It also serves as a reference of the different command-line parameters that the tool supports. This page provides a detailed description of the apksigner's use for signing APKs. The lowest Android Framework API level that is used by apksigner to confirm that an APK's signing will be verified. Higher values allow apksigner to use stronger security measures when signing the app, but limit the APK to devices running the latest versions of Android. By default, the value of minSdkVersion is taken from the manifest file. -
17
Magnum Wallet
Magnum Wallet
It is important that you learn more about our wallet. We will give you the most important information about Magnum. Magnum is a lightweight wallet. We do not store or receive private keys, backup files, or personal information. A lightweight wallet is the best way to manage coins and tokens. During the entire session, users have complete control over their private keys. Your private keys are never stored on your device. They are encrypted and saved in the browser's local storage. An encrypted SSL connection controls all transactions using blockchain. Magnum uses a backup file that includes the encrypted private keys. It is important to download a backup file and keep it safe. The backup can be used to access all your wallets from different devices or browsers. To decrypt the backup, users must enter the passphrase. If you forget or lose the passphrase, we cannot recover your backup file and private key. -
18
Yandex.DNS
Yandex
FreeYandex has more than 80 DNS servers in different countries and cities. Yandex.DNS is in "basic" mode, so each user's queries will be processed by the closest server. There are websites that contain malware that can infect your computer with viruses. Sometimes viruses can be found even on a site that has been checked. Hackers can also create other pages that steal passwords and personal data or take money out of telephone accounts. Yandex.DNS will warn you if you try to open a site under "safe" or "family" mode. Yandex.DNS uses its own anti-virus software to check for malware on sites. Yandex.DNS has its own anti-virus software that uses Yandex algorithms and signature technology from Sophos. Every time you visit a website, your browser searches for its address in DNS. The site will open faster if it is opened by the closest DNS server. -
19
Comodo Internet Security
Comodo
$29.99 per yearOur sandbox technology automatically protects unknown files in a secure environment, while our Valkyrie system monitors their behavior in real time. This protects you from malware that the virus industry has yet to discover. Hot spot protection encrypts all data sent over wired and wireless Internet connections, up to 10GB per year. Secure Shopping allows you to shop online and bank online with confidence. This innovative technology locks your browser in a secure container that cannot be hacked, tracked, viewed or viewed by malware or other internet thieves. Tracks down and destroys any malware that may be hiding on a computer. Detects and eliminates all spyware infections. Prevents malicious software turning your PC into a zombie. Protects important system files and blocks malware installation. Innovative protection against sophisticated buffer overflow attacks. -
20
GameMaker Language (GML)
YoYo Games
FreeGameMaker's proprietary scripting language, the GameMaker Language (or simply GML), is the GameMaker GameMaker Language. This language is designed to allow users to create games in an intuitive and flexible manner, while still offering all the power of major programming languages. It can also be used with GML Visual if necessary. Each event has its own tab within the editor. You can edit, delete, or add code to them at any moment (for more information about events, see Object Events). The code must have a basic structure. It can contain resource indices and variables, functions, expressions or keywords. All of these are explained in the sections below. It is recommended that beginners to programming or those who are making the transition from GML Visual start with the page on basic structure. Next, read through the pages in this section and then test your code within GameMaker. -
21
Steller VPN
PAX Global Technology Limited
FreeWith Steller VPN, you can create an environment in which your online activities are your own. Your data is protected from prying eyes with military-grade encryption. This ensures that your sensitive information remains private. Steller VPN is proud to preserve your internet speed, unlike some VPNs. The core of Steller VPN is trust. We adhere to a strict policy of no-logs, which ensures that your digital footprints won't be recorded. Your passport to uncharted digital freedom is Steller VPN. You control your online destiny. Download Steller VPN and watch your online world flourish. -
22
Delivr
Delivr
$25 per monthAll you need to create, track, and manage dynamic QR codes, short URLs and NFC tag links within a single dashboard. Delivr was established in 2008 and is trusted by thousands. It allows businesses to add connectivity, content, actions, labels, packaging, and labels to print and broadcast media. Delivr FREE is available to first-time subscribers. This includes a free 90-day trial for personal, non profit, educational and limited commercial use. Your QR codes are dynamic-ready and require an upgrade to allow link editing. You can upgrade to a paid subscription plan anytime during or after your trial period to continue using the software. You can use static QR codes to direct users to a specific destination. Once printed and distributed, one cannot change the destination URL. Delivr's dynamic QR codes can be modified in any way you like. Even after printing and distribution, you can modify the URL. -
23
qmail
qmail
qmail is an efficient, reliable, and simple message transfer agent. Security is not just a goal but a requirement. Users cannot turn off mail delivery, so it needs to be secure. The straight-paper-path philosophy of qmail ensures that a message, once accepted into the system will never be lost. qmail can optionally support maildir, an ultra-reliable new user mailbox format. Maildirs will not be corrupted by a system crash, unlike mbox and mh files. Not only can an NFS client safely deliver mail to a user, but it can also be used by multiple clients at the same time. qmail is much smaller than any Internet MTA. Other MTAs use separate mechanisms for forwarding, aliasing and mailing lists. qmail offers a simple forwarding feature that allows users to manage their own mailing lists. -
24
The IN
UPlanet
$1Interactive Guide Navigator. It takes just seconds for participants to locate their pavilion and to find the appropriate pavilion. They can also get in touch with managers or other visitors to the exhibition. Sign up. Sign up. Exhibitions. The screen "Exhibitions", which contains information about the expo center's current, past, and future exhibitions, can be found on the screen. After signing up for the exhibition, you can download all data about the exhibition (layout, exponent data, etc.). News. The "News" screen allows the user to view expo center news and participate in surveys. Layout The "Layout” screen displays an interactive layout of the downloaded exhibit. -
25
Ant Download Manager (AntDM)
AntGROUP
$11.95 one-time payment 1 RatingAnt Download Manager (AntDM), is a fast download manager for any Internet file. It fully integrates with all major browsers. AntDM supports streaming video and audio downloads from many websites. It also supports peer-to-peer P2P protocol. AntDM supports the downloading of files from most popular premium link generators. Ant Download Manager (AntDM), a tool that can increase file download speed due to multiple download streams, resume and schedule downloads, as well as capture and download audio or video streams. It automatically processes download errors, recovers temporary network errors, reconnects if server response delays occur, and can resume interrupted downloads due loss of connection, network problems or unexpected power outages. You can accumulate download links at a time that is convenient for you. -
26
Avant Browser
Avant Browser
FreeAvant Browser is a fast web browser. Its user-friendly interface adds clarity and efficiency to your browsing experience. Regular upgrades have steadily improved its reliability. Avant Browser is 100% freeware! No ads, no virus, no spyware, no malware! Absolutely, with no hidden costs to you ever. Multi-Processing design ensures that you have a smooth internet browsing experience with high reliability and no crashes. It won't lock the browser or force you to close other tabs if one tab crashes. Avant Browser is the web browser with the lowest memory usage on Windows. Memory usage is an important factor in determining a browser's performance. Avant Browser was designed to prevent memory leaks and provide the best possible experience. Avant Browser can automatically detect videos on the page you're browsing and allow you to download them with one click. Avant Browser's multi-threaded downloading engine makes it much quicker to download files from websites or email boxes. -
27
ProfileTailor
Xpandion
ProfileTailor Security & Authorizations. Take control of SAP Authorizations SAP Authorizations are complex. However, authorization teams must be in control at all costs. It is important to address urgent issues such as granting sensitive permissions and identifying suspicious uses of SAP authorizations. ProfileTailor Dynamics Security & Authorizations was created to provide 360deg control over SAP Authorizations as well as Behavior-based Security. Get Expert Information on SAP Authorizations ProfileTailor Dynamics Security & Authorizations was created with both novice and expert users in mind. Novice users can feel like experts by having all the details of SAP Authorizations without needing to dig into the finer points of SAP Authorizations like objects and fields. They can optimize authorization roles and have control over sensitive SAP permissions. -
28
Xtreme Download Manager
Xtreme Download Manager
FreeXtreme download manager is a powerful tool that can increase download speed by up to 500%, save streaming video from websites, resume dead/broken downloads, schedule and convert downloaded files. XDM seamlessly integrates to Google Chrome, Mozilla Firefox Quantum and Opera. It can also take over downloaded files and save streaming videos from websites. XDM includes a built-in video convertor that allows you to convert downloaded videos into different formats so you can watch them on your TV or mobile (100+ devices supported). XDM can download streaming content directly from most websites. Here is the best way to download embedded video from webpages. Once you have installed XDM, the "download videos" button will appear whenever you view a video on the Internet. To start downloading clips, click on the button. XDM can speed up downloads up to five times thanks to its intelligent dynamic file segmentation technology. -
29
MyCleanPC
MyCleanPC
MyCleanPC removes files that could slow down your computer or internet browsers. MyCleanPC can remove software and files that could cause annoying pop-ups or other irrelevant warnings, and computer crashes. The all-new MyCleanPC software has a stronger scanning engine that locates and repairs files that could slow down your computer. MyCleanPC is easy to download and install. MyCleanPC eliminates files that slow down your computer or internet browsers. Your computer can be cleaned and diagnosed in three simple steps. This will improve your performance and speed. MyCleanPC was designed for Windows users and works with Windows Vista and Windows 7, Windows 8 and Windows 10. This means that your computer will receive personalized care tailored to your OS. -
30
Softros LAN Messenger allows you to send and receive messages on any local network. The chat application doesn't require an Internet connection. It guarantees confidentiality of all information that is sent and received. Softros LAN Messenger is easy to install and use. It features an intuitive interface. It can be used to control certain functions and adjust its settings by the network administrator. This is useful for large companies with scattered infrastructure. The messaging app does not require a dedicated server and is distributed.
-
31
Forcepoint Remote Browser Isolation
Forcepoint
Employees must be able to work online. Up to 75% of the work done today is done online. Cyberattacks can be dangerous, originating from malicious sites, drive-by downloads, or being disguised in emails as helpful links. Zero Trust Web Access is easy to implement and use with Forcepoint RBI and Zero Trust Content Disarm and Reconstruction. Zero Trust Web Access enables employees to be more productive safely and efficiently from anywhere. Automate policies without manual investigation at the endpoint. Reduce costs by letting web security handle the majority of traffic and only sending risky or unknown sites to isolation. Use full isolation for highly valuable targets and targeted isolation for all other users. -
32
Maqetta
Maqetta
Maqetta, an open-source project, provides visual authoring for HTML5 user interfaces. Maqetta is HTML-authored and runs in browsers without the need for additional plugins or downloads. Maqetta is freely available under a commercial-friendly, open source license. You can download the source code, install it on your server, modify the code to suit your needs, and/or contribute to the open-source project. Maqetta's HTML pages work with all browsers, except IE. This depends on the JavaScript toolkit and coding details. You will need to use the latest version of one of these browsers to run Maqetta. They all support HTML5 features. The code of the project is built using 100% open-standards technologies. -
33
Guard My Web
Guard My Web Solutions
Free 1 RatingWebGuard mobile protection against ads, dangerous websites, surveillance, viruses, and other threats. Firewall, web anonymity and personal data encryption, faster internet to reduce data traffic in any browser. WebGuard is the best ad-blocker to remove ads from games, apps and browsers to protect privacy. All ads are blocked. You can hide your IP address to increase anonymity and choose the country of origin for the new IP address. This is currently available in France and Germany. Traffic compression, ad blocking, and other technologies can increase download speed and help you save money. Data encryption is used when working on public WiFi networks (restaurants and conferences). etc.) Blocking malicious web pages. Protection against surveillance (banners and tracking, social networks) as well as concealment of personal data. Our app is available for free 7-day trial. The app monitors data traffic using its own VPN. -
34
SameMovie Video downloader allows users to download movies and TV series from different streaming platforms, for offline viewing without any limits. Offline playback on any device, without using internet traffic or disrupting limitations. It is also very user-friendly. Search the video in the built-in browser and click "Download". You can download and binge-watch all the videos you want.
-
35
VSCodium
VSCodium
Microsoft's vscode code is open-source (MIT-licensed), however, the product (Visual Studio Code), which is available for download, is licensed under this not FLOSS license. It contains telemetry/tracking. The VSCodium project is available so that you don’t need to download+build directly from the source. This project contains special build scripts that clone Microsoft’s vscode repo and run the build commands. The resulting binaries are then uploaded to GitHub releases. These binaries are licensed under MIT. Telemetry is disabled. For Mac OS X Mojave users: If you see the message "App cannot be opened because Apple can't check it for malicious code" when opening VSCodium for the first time, right-click on the application and select Open. This is only necessary for the first Mojave launch. This document contains the most current information about migrating from Visual Studio Code, as well as any quirks that might occur. -
36
MetaCert
MetaCert
$2.19 per monthMetaCert's Zero Trust browser reduces the likelihood of organizations being compromised by a phishing-led hacker attack by more than 98%. It is important to block dangerous URLs and dangerous sites, but it is not enough. Every major security company that has a "threat Intelligence System" is focused on blocking known malicious URLs. MetaCert has a database of malicious URLs, just like other companies. If a dangerous link is able to get through security systems, you will need to use your intuition to determine which links are safe and which sites you can trust. This legacy approach can still expose organizations that use security solutions from multiple vendors. We use the most up-to-date URL classification technology we have developed internally to show you which links are safe and which websites you can trust. Our software reduces the risk of cyberattacks that begin with dangerous URLs by verifying that millions of URLs are safe. -
37
iCab
iCab
$10 one-time paymentiCab, an alternative web browser for Apple Macs, offers many useful features that are not available in other browsers. iCab can block unwanted content such as pop-up windows and ads. Many settings can be configured automatically based on the URL of the page that you are visiting. This allows you to have different browser settings for different websites. iCab will take over the entire screen while in Kiosk mode. All other applications are blocked. When the computer is accessing public places (such as hotels, fairs, or exhibitions), the Kiosk mode provides the best environment. Users should be able access information but not allow anyone to access your system. You can also restrict access to specific pages. You can download files and entire web pages to access the content offline at your convenience without ever having to go online again. -
38
Getright
Getright
$19.95 one-time paymentGetRight®, a download manager, simply optimizes and improves the files that you download from the Internet. Never again will you have an incomplete or lost file. Downloads can be speeded up by downloading files from multiple servers at once. Downloads can be re-established if they are interrupted due to lost connections, crashes, or other reasons. No more lost files. You can easily see what is happening and locate your completed downloads. It works within your web browser to make it easy to download, and gives you easy access to advanced features that will help power users. Advanced downloading technology for the novice and the experienced! Supports HTTPS, HTTPS FTP, FTPS and BitTorrent™. Firefox, Internet Explorer, and Opera browsers are supported. It runs on Windows 7, Vista and XP. GetRight eliminates the risk of your internet connection going down during large downloads. This is great for any Internet connection, but it is especially important for those who use a dial-up or wireless connection. -
39
QR Stuff
QR Stuff
$11.95 per monthA QR Code, which stands for "Quick Response", is a mobile phone-readable bar code that stores website URL's, plaintext, phone numbers, and email addresses. You can create dynamic or static QR codes with the QR Stuff QR Code Generator and then download them for immediate use. They can store up to 4296 characters and are internationally standardised by ISO 18004. QR Stuff QR Code Scanner makes it easy to scan QR codes from your browser. You don't need to download or install any QR code scanner software. You can scan a QR code with your mobile device or laptop by simply going to Scan in the menu bar. -
40
Reshare Commerce
Reshare Commerce
Reshare Commerce solves the #1 problem that prevents most brands from selling directly to consumers on the Internet. Our unique channel management solution ensures that brand partners are paid for sales to customers even though they happen on the brand's website. -
41
Init Dine
Indocosmo Systems
$133.96 one-time paymentSoftware Development. Software Development. Our software development services will provide you with a customized, efficient and user-friendly desktop application that runs offline and is independent from your web-browser. Every organization faces a challenge in finding the right resource with the required skills at the right moment. Through the Internet of Things, we bridge the gap between technology and industry, providing businesses with low-cost, easy-to-use remote monitoring solutions. Indocosmo Systems provides machine learning and artificial intelligence solutions to our clients. We understand that each client has different needs and requirements. Our complete, modular package of software, hardware, and support services can be tailored to optimize the operation of all types of restaurants, from single-unit shops to multi-outlet chains. You will receive fully-supported, ready-to-use solutions that guarantee your satisfaction. -
42
Advanced Download Manager
AdvancedApp
FreePowerful downloader for Android. You can download up to five files from the internet at once. Multithreading (16 parts) speeds up downloading. Interception of links via android browsers and clipboard. After failure, download files in the background. Loader for images and documents, archives, as well as programs. Download to SD-card Marshmallow and Lollipop. Smart algorithm to speed up downloading. Only download via the internet over Wi-Fi. Downloader booster for 2G, 3G and 4G networks. You can change the maximum speed in real time. Video and music downloader. Resume of interrupted downloads. Support files larger that 2 gigabytes Parallel download files in queue. Torrent downloader. Add torrent and magnet via editor, clipboard and browser. File explorer. Display of the required files and folders, their size and type, search for them by name, sorting. -
43
ToDesktop
ToDesktop
$58 per monthWe sign your desktop application with EV Microsoft Authenticode certificates and Apple Gatekeeper. Code signing is essential because your app will download and install without any warning dialogs. Your app will automatically update to ensure that the browser underlying it is always current. This is also how we deliver performance enhancements, security patches, or additional features to your application. You'll receive a customized installer that works on Windows, Mac, and Linux. We provide a special link that will detect the operating system of your users and download the latest version of your application. ToDesktop can detect your icon colors and icon when you provide the URL of your web app. You can always edit them if they are not right. -
44
ezPaycheck
Halfpricesoft.com
$89 one-time paymentezPaycheck is a simple-to-use payroll program that's affordable, reliable, and easy to use. It was designed by our developers to be an in-house payroll tax solution for small businesses. It can calculate taxes, print paychecks for employees and contractors, generate reports, and print tax forms. To process paychecks, you don't need an internet connection. -
45
LexisNexis Instant Age Verify
LexisNexis Risk Solutions
Online, telephonic, and in-person transactions that involve products or services that legally require purchasers or users to be of a certain age require companies to do the necessary due diligence to verify identities and ages, regardless of how the transactions are conducted. LexisNexis®, identity verification and authentication solutions give you the security and peace of mind to conduct business safely, securely, and profitably. The internet can bring in a lot of revenue, but it can also present additional risks. Online and face-to-face transactions need to be validated in different ways. It is crucial to verify an individual's age when selling products intended for adult consumption. These products are too expensive to sell. -
46
Our media downloaders allow you to instantly download videos and music from the Internet. iTubeGo Video downloader fully supports multiple video downloads at once. You can paste many video URLs into the program. iTubeGo does not have any download limits. All videos can be downloaded to your computer in one click. iTubeGo comes with a built-in browser that makes it easy to browse music and video sites. The website allows you to download videos directly without the need to copy and paste URLs. You can download YouTube playlists, channels, as well as all videos from user pages in high-quality and different formats. iTubeGo YouTube downloader automatically detects the playlist URL and displays all available videos for download. You can rename your playlist in numerical order and skip repeated downloads. Manage your playlist files better
-
47
ConcealBrowse
Conceal
Create a worry free user experience to enable online access without second thoughts. ConcealBrowse detects, defends and isolates malicious, unknown internet activities across all applications. Your users and customers are protected. Internet use has become a part of daily operations in today's globalized environment. Unavoidable cybersecurity risks are created by internet usage that is continuous. Clicking on a link within an email can reveal information about your company and its attack surface. Open a downloaded file, and you can create a path for ransomware groups to enter your network. ConcealBrowse will be your first line of defense. ConcealBrowse is your line of defense. -
48
Download Accelerator Manager (DAM)
Tensons
$25 one-time paymentThe fastest downloader, Download Accelerator Manager (DAM), allows you to download Internet files and web videos from almost any site, including YouTube. DAM works best with Firefox and other browsers. DAM's intelligent download logic accelerator can increase download speeds and allow you to schedule, resume, and manage your downloads. DAM dynamically splits downloads, unlike other download managers that do this before the download starts. DAM reuses connections and keeps connections busy, instead of dividing them into separate parts. DAM eliminates the file-part-appending stage, which can be time-consuming and wasteful. This will allow you to save even more time on file downloads. Downloads can be downloaded at their maximum performance using DAM's best-built download logic accelerator. You can also schedule, recover, resume, or manage your downloads. -
49
threatYeti by alphaMountain
alphaMountain AI
$0 1 RatingWith threatYeti, alphaMountain turns security professionals, as well as hobbyists, into senior IP threat analysts. The platform is browser-based and renders real-time threats verdicts for any URL, domain, or IP address on the internet. With threatYeti the risk posed to a domain can be rated instantly, with a color-coded scale from 1.00 (low) to 10.00. ThreatYeti protects cyber threat analysts, as well as their networks, from risky websites. The no-click categorization of threatYeti places sites into one or more of 83 categories, so analysts don't need to visit the site and risk downloading malware or encountering objectionable content. ThreatYeti displays related hosts, threat-factors, passive DNS certificates, redirect chains, and more to give analysts a complete picture of any host. The result is a faster, safer investigation that allows organizations to take definitive action on domain and IP threat. -
50
The internet is dangerous and vulnerable. Hackers, data harvesters, and malicious websites are always waiting for users to make mistakes. Don't fall for this trap. Ivacy - The Best VPN Service. Protect your online interests. Geo-restrictions can make it difficult to access foreign content. Geo-restrictions can be a problem with Ivacy VPN. Ivacy VPN allows you to access content from any location and at any time. Ivacy VPN supports up to 10 devices at once. Log in to any device you wish and you'll never need to log out. IVacy VPN keeps all your devices and those of your family safe. A Virtual Private Network (VPN), is a secure connection route that ensures anonymity and online privacy through an encrypted tunnel. VPNs mask your IP (Internet Protocol) address, making you virtually invisible online.