Free Secure Wallet - Free Secure Wallet for storing sensitive data on mobiles (secure notepad),like Credit card, password and all sensitive data that should be kept secure. The application provide a lot of security measures like log in password, encode stored data for more security , expire session after 30 min. (in version 1
MemoryUp is a powerful mobile RAM boosting tool and Java virtual machine (JVM) management application specially designed for smartphone users. It is a handy memory optimizer tool that will keep your smartphone running faster and efficiently. It increases your cell phone performance by making more memory available for both your applications and the mobile system
TinyEncryptor is a mobile application meant for file encryption and editing protected texts. Encryption algorithm: TwoFish. Actually, the program is a shell for freely distributed encryption library from Legion of the Bouncy Castle. Size of file being encrypted isn't limited, minimal key length - 8 characters
Smart Store Free Want to keep your Web, Email, ATM, & Online Banking Logins, Passport #, License #, etc., handy with you? Now keep them all in your Phone Accessible and Safe! Store all your Secret Info in your mobile phone. Easy access to all your Secret stuff. Access to Secret Store is Password Protected. No one can see your Protected Data
Hidden pictures and videos are vanished from Gallery and only visible in the photo and video vault can also lock Facebook, Whatsapp, Gallery, Messenger, SMS, Contacts, Gmail, Settings, incoming calls and any app you choose
J2MEDataMatrix - Have you ever notice DataMatrix 2D barcode symbols become more and more popular these days?
Will that be cool if you can encode and decode such 2D barcodes using your mobile phone?
With this application, depending on your mobile phone's functionality and java setting, you can:
1) Encode a string to a DataMatrix barcode image
screenlock keys - A lock screen is a user interface element used by various operating systems. They regulate immediate access to a device by requiring that the user perform a certain action in order to receive access: such as entering a password, using a certain button combination, or by performing a certain gesture using a device's touchscreen