Freeware: Only Free Software, Games, Tools, Utilities. Free Download Center Freeware Home New Submit Links Contact Advertise
Business| Desktop| Developer Tools| Drivers| Education| Games| Home & Personal| Internet| Multimedia| Operating Systems| Utilities
 

 


Information Security

 

 Internet Security Tweak  License: Freeware

 
  Internet Security Tweak is an utility that customizes different features of the Internet Explorer Web browser. It lets you disable individual menu items, disable individual tabs in the Internet Options dialog, change the title caption, toolbar background, and animated icon; change default folders; and replace standard error information pages, etc.

Author:
1st Security Software Center| Date: 24-07-2002 | Size: 733 KB
  -
 

 Finger  License: Freeware

 
  Finger is the tool for discovering user information by using well known finger service. To use the finger tool enter the User@)Host in the Finger Input box, and click on the Finger button .The results will be shown in the Finger Response section. Using Finger tool makes possible to get Abuse Address of remote host. For example to get the abuse address of prontomail.com you should type [email protected] in the finger input section. As a result you will receive [email protected] (for prontomail.com) in the finger response section.

Author:
Nsasoft LLC.| Date: 28-11-2004 | Size: 308 KB
  -
 

 Lock Folder  License: Freeware

 
  Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be deleted, damaged or harmed in any other ways. Even if a virus gets introduced to your system, your locked folders will not be detected, infected or harmed. Here is the important part - Lock Folder uses the encryption standards approved by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees.

Author:
Leo van Opstal| Date: 09-08-2003 | Size: 1400 KB
  -
 

 Advanced Security for Outlook  License: Freeware

 
  Get rid of the annoying security alerts in Microsoft Outlook 2000, 2002/XP and 2003! Advanced Security for Outlook allows you to determine the violator and specify the permanent action for this program (and only this!) : allow access, block access or run the default Outlook handler. In future, the specified action by you will be executed automatically and Outlook Security will not annoy you with messages about trying to access e-mail addresses you have stored in Outlook. The standard security system has two drawbacks: first, it does not allow users to determine the source of the treat, second, a lot of other applications developed before the security system appeared can be really annoying due to their constantly appearing warnings. Since the security system is constantly updated, a "fresh" program can get into the list of such applications. There is still another drawback resulting from the first two: the user can temporarily disable the security system thus allowing any other program also to work without any security system restrictions. Our software solves all the above problems providing the information not only about the type of alert, but also about what program caused it and makes it possible to specify for this (and only this!) program the permanent action: allow access, block access or run the default Outlook handler. Later on you can change or delete the action. It should be mentioned that there is a range of tasks (which is rather narrow) that an Outlook developer can implement only through the use of the object model and its "blocked" methods. In this case Advanced Security is an indispensable program when using such an application.

Author:
MAPILab Ltd.| Date: 03-09-2004 | Size: 925 KB
  -
 

 ActMon PWL Password Finder (WASP)  License: Freeware

 
  WASP displays all passwords of the currently logged in user that are stored in the Microsoft PWL file password database. It allows the convenient management (i. e. supervision and /or deletion) of this file to improve the security / privacy of your PC. It is also very useful for educational purposes about computer security. The documentation also contains general information about the PWL files and their security. This software is designed for Win 95 / 98 / ME. Real Freeware.

Author:
Activity Computer File PC Network Monitoring| Date: 14-12-2004 | Size: 1351 KB
  -
 

 ICQr Information  License: Freeware

 
  ICQ .DAT (Database) files contain everything the user enters in his private details. ICQr Information is able to read and reveal personal information, such as nickname, address, birthday and much more. Supports ICQ 99a/b, 2000a/b and 2001. As it's THE ONLY KNOWN program that can display passwords of all supported ICQ versions, it can be used to get back your own lost password! With this freeware tool, you will be able to control your employees and to find out what they do not want you to know! You can also use ICQr Information to find already deleted friends, because the DAT file is NOT "cleaned" up after removing somebody from your contact list. You can export the gathered information into a multiplatform HTML file and save the contact list to a textfile. ICQr Information allows to select those elements you want to export.

Author:
Moritz Bartl| Date: 12-11-2001 | Size: 296 KB
  -
 

 TrafficEmulator  License: Freeware

 
  Nsasoft Network TrafficEmulator generates IP/ICMP/TCP/UDP traffic from clients to server to stress test servers,routers and firewalls under heavy network load.It is a very simple and fast program which can simulate client activity.

Author:
Nsasoft LLC.| Date: 10-01-2005 | Size: 332 KB
  -
 

 Chilkat Digital Certificates Component  License: Freeware

 
  Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure email.

Author:
Matt Fausey| Date: 18-12-2002 | Size: 1000 KB
  -
 

 pcAudit  License: Freeware

 
  You have seen many times “Secured web site” or “Your transaction on this page is secured” on your bank's web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer. Run pcAudit while on a secured web page and see for yourself that whatever you type while on a secured web page - CAN be seen by a hacker, unless your computer is protected.

Author:
Internet Security Allaince, Inc| Date: 29-09-2004 | Size: 97 KB
  -
 

 FreePortScanner  License: Freeware

 
  Free Port Scanner is a small, fast, easy-to-use and robust port scanner for the Win32 platform. You can scan ports on fast machines in a few seconds and can perform scan on predefined port ranges.The tool is designed with a user-friendly interface and is easy to use.

Author:
Nsasoft LLC.| Date: 21-01-2005 | Size: 320 KB
  -
 

 Stop Thief Screen Saver  License: Shareware

 
  Pixel Paradox makes NO claim that STOP THIEF will prevent any kind of criminal activity whatsoever, under any circumstances. It has NO ability to detect motion, or call the police. Everything is FAKE. It is comparable to "the electronic barking dog", which is not really a dog, but just a recording of a barking dog. DO NOT RELY ON THIS PRODUCT TO PROTECT YOUR PROPERTY, OR OFFER ANY KIND OF HOME SECURITY.

Author:
Pixel Paradox| Date: 05-01-2003 | Size: 2100 KB
  -
 

 Any Password  License: Freeware

 
  Any Password is an easy-to-use tool that lets you store and arrange all your passwords, user IDs, and related information in a tree form. The program saves this information in encrypted files which can be protected by a password. So, the only thing you need to remember is the password for the file. Any Password can also generate random passwords with specified parameters (length, used characters, etc.). You can find any stored information using the incremental search feature.

Author:
RomanLab Software| Date: 16-10-2004 | Size: 610 KB
  -
 

 Evidence Destructor  License: Freeware

 
  When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you downloaded, all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security when you use all these features. If somebody were to look at your PC, which happens quite often. For example your wife wanted to use it for something, or your kids would need to play with it. Or if your computer is at work, your coworkers or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a virus or a malicious program or pictures or other offensive content without you even knowing anything about it or suspecting anything like that has happened. They can also use your computer to make purchases on the Internet (remember, your credit card an all the details are stored there and you will be left to bare the consequences of all their actions. To solve this problem, you need to clean up all the unwanted garbage that is cluttering your computer to get rid of the unwanted evidence that may be used against you one day. You need Evidence Destructor to do the job for you. This program will let you remove all the unwanted evidence from your computer and continue getting rid of it on a scheduled basis as the clutter starts to co

Author:
emailarms emailarms| Date: 10-02-2004 | Size: 984 KB
  -
 

 HSLAB Logger Lite  License: Freeware

 
  The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user's passwords. Using this software you can: - record user's activity; - record actions only the selected users or all users; - record the restricted actions or all actions; - use a ban list for prevention of some actions; - rectrict access to removable drives end execute some actions when the restriction occur; - rectrict access to programs end execute some actions when the restriction occur; - rectrict access by keywords end execute some actions when the keyword found; At access to removable drives you can set the following actions: - write information about this event to log and continue; - eject removable media and continue; - shutdown Windows. At access to programs you can set the following actions: - write information about this event to log and continue; - kill restricted program and continue; - shutdown Windows.

Author:
Oleg Golub| Date: 04-03-2003 | Size: 1816 KB
  -
 

 CleverCrypt Lite (Freeware)  License: Freeware

 
  Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. <p> The instant you save data into a CleverCrypt drive, CleverCrypt automatically scrambles the data before it is saved on the drive. Once you close your drive or turn off your computer, your secure drive is automatically locked. You don’t have to remember to secure your data: CleverCrypt does it for you every time. To access your data again, simply open CleverCrypt and supply the correct passwords to access your confidential information. <p> Even if your whole computer is stolen, your data will remain locked in the virtual drive, safe from prying eyes. Without your passwords, the data is simply not there! <p> CleverCrypt is the perfect security tool for lawyers, doctors, government establishments and any practice dealing with highly sensitive information. <p> You can use CleverCrypt to protect any office documents, including spreadsheets, confidential documents, presentations, emails, client lists, accounting information and scheduling diaries. <p> CleverCrypt Lite is completely free! <p> If you like our product, please consider purchasing the full version to support our work.

Author:
Quantum Digital Security| Date: 24-08-2004 | Size: 3730 KB
  -
 

 Notes Keeper  License: Freeware

 
  Notes Keeper is a private information manager. It can hold passwords, plastic card numbers, serial numbers and other important information. You just need to keep in mind only one password from your account. Notes Keeper is very easy to use software. Most of operations can be performed by a couple mouse clicks. Notes Keeper provides convenient data store system. You can divide your records into your own groups. Notes Keeper is a multiuser software. Each user has own protected account. Our software uses strong password encryption algorithm BlowFish.

Author:
Edward Kozadaev| Date: 13-07-2003 | Size: 211 KB
  -
 

 Oracle Security Check  License: Freeware

 
  Oracle Security Check will connect to your database and test against an internal list of standard usernames and passwords. If any are found, they are reported as potential security holes.

Author:
eNSYNC Solutions| Date: 21-12-2002 | Size: 400 KB
  -
 

 AES Free  License: Freeware

 
  AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal to storage and electronically distribute the information because they contain multiple compressed files and folders.

Author:
Safe Soft Corporation| Date: 22-08-2004 | Size: 515 KB
  -
 

 sqlDESKTOP  License: Freeware

 
  sqlDESKTOP is a computerized manual filing system arranged just like an office. Users can organize information (files, data on CD ROM or DVD, WEB pages, emails, newsgroups etc... ) they access regularly using familiar, everyday office supplies (folders, binders, filing cabinets, etc.). It's easy because you don't have to remember the exact name of the document or where you put it. Just visually locate it in an ordinary office environment.

Author:
P.I.M.| Date: 04-03-2003 | Size: 19401 KB
  -
 

 Softtanks Security Software  License: Freeware

 
  Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues. You just need to remember the passwords which you can change any time. It will Protect your Computer from · Unauthorize use by anyone. · You can Start the security system whenever you leave your computer. · It will not allow others to view your data and update them in your absence. · It will stop viruses comming from other people when you are away from your PC. Anyone working on your system will have to provide the proof that he/she is allowed to use that computer. Please give your PC password only to those people whom you have full faith. You need to re-install the software if you forget your passwords. So keep a copy of install software as backup.

Author:
Softtanks.com| Date: 02-08-2004 | Size: 1308 KB
  -
 

 Evidence Exterminator  License: Freeware

 
  Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is stored in various files and in the Windows registry? Did you know that anybody with a minimal computer knowledge including your spouse and children, your boss and the police can easily extract detailed information about your activities and use it against you? Did you also know that when you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder, and even if you use the Empty Recycle Bin command, some files may stay in this folder and can not be deleted by Windows? Evidence Exterminator is a complex security system that ensures your privacy by destroying all hidden information connected with your activities on demand, according to a user-defined schedule or on each boot/shutdown. The program does not damage your Windows and does not delete your documents, it only cleans needless registry items and files, which potentially may contain evidence and endanger you needlessly. Think for a second: How many people you know would enjoy hurting you? Your boss or your coworkers, and how about those people you don't know? Don't loose your job just because you enjoy surfing the Internet at work! Install Evidence Exterminator on your PC before it is too late! Evidence Exterminator will remove all evidence, and will also clean all the temporary files left by your system making it cleaner and running faster.

Author:
IM-Soft| Date: 08-10-2004 | Size: 984 KB
  -
 

 ABC Security Protector  License: Freeware

 
  This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads.

Author:
Ixis Ltd| Date: 01-11-2004 | Size: 563 KB
  -
 

 HomeWatcher Lite  License: Freeware

 
  HomeWatcher is an "intelligent" WebCam software program. It can sense changes in the image of an attached camera, and take action: upload the image to a Website, send it to you by e-mail, initiate a loal sound alarm or start any other program. This way you can use it as a low-cost ye highly functional home security system.You can also use it to keep an eye on your dogs, birds or kids when you are away. At work, you can see how they are behaving

Author:
HomeWatcher.Com| Date: 28-01-2001 | Size: 1232 KB
  -
 

 Kinar KeepSafe FreeMail  License: Freeware

 
  Kinar KeepSafe is the easiest to use secure email solution available today.Based on patent pending Universal Digital ID (TM) technology, FreeMail provides the enterprise level security without any prior setup, use of passwords, or manual key/certificate exchange. Simply download, install and activate your existing email account as a secure e-mail account. Then you'll be ready to send encrypted e-mail and attachments to anyone with an email address. It's that simple. It is the only secure email solution that allows you to use public-private key cryptography with anyone, beyond the boundaries of an organization. KeepSafe works as a standalone email application or with popular e-mail applications. Also, it is deeply integrated with Microsoft Outlook and Outlook Express. FreeMail allows an unlimited number of encrypted messages to up to ten other users. Also check out KeepSafe Professional. It allows you to send restricted documents - documents that cannot be shared or forwarded by the recipient with other users. Now you can ensure that your pictures or documents do not end up in the wrong hands or all over the Internet. Kinar KeepSafe does NOT install any spyware or adware. Your emails go through your email gateways; NOT through any Kinar servers. Kinar does not collect any private information about you. Get the power of Universal Digital ID working for you.

Author:
Kinar, Inc.| Date: 04-08-2004 | Size: 4749 KB
  -
 

 l0stat  License: Freeware

 
  l0stat is a tool that uses L0phtcrack or LC3 results in order to generate a set of statistics that provide a global security view of the NT password database.It provides statistical info about all user or computer accounts in terms of:- Basic Analysis: gives a global view of strength of password account.- Position Analysis: gives a detailed view of patterns of password contents.

Author:
DLC Sistemas| Date: 11-04-2002 | Size: 1340 KB
  -
 

 SplitSafe  License: Freeware

 
  SplitSafe: Security–Software mit TĂśV-Zertifikat SplitSafe protects your data on notebooks and PCs from unwanted access. Comparable to the concept of a pirate´s treasure map that is torn in two parts, SplitSafe divides your data and saves it on two different storage media, e.g. your notebook´s hard disk and a USB memory drive. What makes SplitSafe different from today´s security technologies? Known procedures like encryption and password protection are not safe when it comes to hacker attacks or careless use of passwords. SplitSafe closes this security gap by physically dividing the data onto two storage media and offers data security that has been certified by the German authority for product quality, the TĂśV. The data is divided in such a way, that the individual parts do not allow access, reading, changing or reconstruction of the original information. All you have to do for perfect data protection is to keep your mobile storage device, e.g. a USB memory stick, apart from your notebook or PC. How does SplitSafe work? After the installation of SplitSafe an additional virtual hard disk will be available in your Windows system. Once you have connected a mobile storage medium to your notebook or PC you can save the files you want to protect on your virtual hard disk and you can access, copy open, change or delete the files as usual. If you save a file on your virtual SplitSafe drive, the data is automatically divided.

Author:
Living Byte Software GmbH| Date: 23-07-2004 | Size: 2599 KB
  -
 

 FlexiBrowser  License: Freeware

 
  FlexiBrowser is a free, full web browser, designed to improve Internet security and to offer convenience features that neither Explorer nor Opera implemented. Security settings are simple and safe - FlexiBrowser remembers security settings for each web page that requires permission to execute scripts or other controlling actions. It also allows multiple page browsing, a comfortable download manager, searchable link history; imports IE and Opera Favorites and Bookmark, kills popup windows and cleans cookies automatically. Additionally, it has functions to ease and speed up copying, pasting and organizing.

Author:
Heuristic Research| Date: 08-03-2004 | Size: 1524 KB
  -
 

 GRL RealHidden  License: Freeware

 
  GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden information. In order to keep the final file size a low as possible, GRL RealHidden gives you the option of compressing the hidden file.

Author:
Galen Lande| Date: 30-07-2002 | Size: 1967 KB
  -
 

 SIW  License: Freeware

 
  The Freeware SIW is a System Information tool that gathers detailed information about your system properties and settings. A utility that includes detailed specs for Motherboard, BIOS, CPU, Devices, Memory, Video, Drivers, Ports, Printers. It displays information about Operating System, Installed Programs, Processes, Services, Serial Numbers, Users, Open Files, System uptime, Users, Network, Network Shares, and more, as well as real-time monitors for CPU, Memory, Page File usage and network traffic. SIW also displays currently active network connections, Passwords hidden behind asterisks, installed codecs, and more. A standalone tool that does not require installation.

Author:
Gabriel Topala| Date: 10-01-2005 | Size: 1212 KB
  -
 

 IP_NetLogoff  License: Freeware

 
  Automatically log off users when they abandon their stations. Adjustable modes allow for different log off styles such as logoff, shutdown, and reboot. Never walk by an un-secured workstation again. With today's security climate and increasing security threats, this is a simple hole to patch. Simple and free.

Author:
IP Worx| Date: 02-05-2004 | Size: 4345 KB
  -

| 1 | 2 | 3 | 4 | 5 |

 

 
Sponsored Shareware

Universal Explorer
Powerful
windows explorer file manager and viewer.

File Manager - Windows Explorer Replacement

Disk Size Manager
Analyses hard disk space and collects statistics.

Powerful Disk Space Manager

Web Data Extractor
Email marketing software to extract specific contact.


Web Data Extractor

BackStreet Browser
Powerful Offline Browser - Download Entire Website.

Offline Browser

ListMotor
Email List Manager, operates with email stored in simple text files or csv files.

Email List Manager

 

www.DirFile.Com - Freeware Software Download

Ads: Webmaster Tool - Download Junction - Rafasys ElecDir - Direct Email - HealthInfo - Web Spider