|
|
System Security
|
HomeWatcher Lite License: Freeware
|
|
|
HomeWatcher is an "intelligent" WebCam software program. It can sense changes in the image of an attached camera, and take action: upload the image to a Website, send it to you by e-mail, initiate a loal sound alarm or start any other program. This way you can use it as a low-cost ye highly functional home security system.You can also use it to keep an eye on your dogs, birds or kids when you are away. At work, you can see how they are behaving
Author: HomeWatcher.Com| Date: 28-01-2001 | Size: 1232 KB
|
|
- |
|
Softtanks Security Software License: Freeware
|
|
|
Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues. You just need to remember the passwords which you can change any time. It will Protect your Computer from · Unauthorize use by anyone. · You can Start the security system whenever you leave your computer. · It will not allow others to view your data and update them in your absence. · It will stop viruses comming from other people when you are away from your PC. Anyone working on your system will have to provide the proof that he/she is allowed to use that computer. Please give your PC password only to those people whom you have full faith. You need to re-install the software if you forget your passwords. So keep a copy of install software as backup.
Author: Softtanks.com| Date: 02-08-2004 | Size: 1308 KB
|
|
- |
|
Advanced Security for Outlook License: Freeware
|
|
|
Get rid of the annoying security alerts in Microsoft Outlook 2000, 2002/XP and 2003! Advanced Security for Outlook allows you to determine the violator and specify the permanent action for this program (and only this!) : allow access, block access or run the default Outlook handler. In future, the specified action by you will be executed automatically and Outlook Security will not annoy you with messages about trying to access e-mail addresses you have stored in Outlook. The standard security system has two drawbacks: first, it does not allow users to determine the source of the treat, second, a lot of other applications developed before the security system appeared can be really annoying due to their constantly appearing warnings. Since the security system is constantly updated, a "fresh" program can get into the list of such applications. There is still another drawback resulting from the first two: the user can temporarily disable the security system thus allowing any other program also to work without any security system restrictions. Our software solves all the above problems providing the information not only about the type of alert, but also about what program caused it and makes it possible to specify for this (and only this!) program the permanent action: allow access, block access or run the default Outlook handler. Later on you can change or delete the action. It should be mentioned that there is a range of tasks (which is rather narrow) that an Outlook developer can implement only through the use of the object model and its "blocked" methods. In this case Advanced Security is an indispensable program when using such an application.
Author: MAPILab Ltd.| Date: 03-09-2004 | Size: 925 KB
|
|
- |
|
Quick Security Center License: Freeware
|
|
|
Quick Security Center will help you manage, turn on or off Windows Firewall and Windows Automatic Updates from the convenience of your system tray. Quick Security Center is 100% free of Spyware and completely free to use. This software is a must for laptop users who change for LAN to Dialup regularly.
Author: GetData Software Company| Date: 01-03-2005 | Size: 483 KB
|
|
- |
|
Internet Security Tweak License: Freeware
|
|
|
Internet Security Tweak is an utility that customizes different features of the Internet Explorer Web browser. It lets you disable individual menu items, disable individual tabs in the Internet Options dialog, change the title caption, toolbar background, and animated icon; change default folders; and replace standard error information pages, etc.
Author: 1st Security Software Center| Date: 24-07-2002 | Size: 733 KB
|
|
- |
|
Harden-It License: Freeware
|
|
|
Harden-It 1.1 Windows Security Hardening Tool, harden your TCP/IP Stack and Local System. Harden-It is a Network and System hardening tool for Windows. By hardening the IP stack your Network can sustain or completely twarth various sophisticated network attacks. By hardening your Local System lots of current malware, spyware, worm infection are completely blocked, proactively harden your system even against future uknown attacks. Network Hardening : · Harden your server's TCP and IP stack (Netbios, ICMP, SYN, SYN-ACK..) · Protect your servers from Denial of Service and other network based attacks · Enable SYN flood protection when an attack is detected · Set the threshold values that are used to determine what constitutes an attack · Various other protections. Local System Hardening : · Harden your Local Security settings. · Reduce potential intrusion vectors by disabling non used services. · Proactively disable scripting or Active-X controls which proofed potential propagation vectors in the past and continue to be exploited. · Various other protections.
Author: YASC LTD| Date: 04-01-2005 | Size: 433 KB
|
|
- |
|
ABC Security Protector License: Freeware
|
|
|
This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads.
Author: Ixis Ltd| Date: 01-11-2004 | Size: 563 KB
|
|
- |
|
PAL PC Tracker Lite License: Freeware
|
|
|
PAL PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer.
Author: PAL Solutions Ltd.| Date: 01-04-2003 | Size: 1200 KB
|
|
- |
|
Omniquad Personal Firewall License: Freeware
|
|
|
Omniquad Personal Firewall is a personal security system to protect your computers from unauthorised access over the LAN and / Internet. Personal Firewall is a software application used to protect a single Internet-connected computer from intruders. Personal firewall protection is especially useful for users with "always-on" connections such as DSL or Cable modem. Such connections use a static IP address that makes them especially vulnerable to potential hackers . Often compared to anti-virus applications , personal firewalls work in the background at the device (link layer) level to protect the integrity of the system from malicious computer code by controlling Internet connections to and from a user's computer, filtering inbound and outbound traffic, and alerting the user to attempted intrusions. Some of the features of Firewall are as follows: a. 4-level packet filter firewall protection for the local network / dial up/ ASDL and cable modem connections b. Global lock immediately shuts down all net access c. Define & enforce trusted zones d. Alerts for denied network connection attempts e. Real-time network activity indicators f. 3-level program control intercepting connection attempts by any program on your computer g. Automatic lock shuts down internet access after specified period of inactivity
Author: Daniel Sobstel| Date: 08-10-2003 | Size: 4126 KB
|
|
- |
|
ShareAlarm License: Freeware
|
|
|
Share alarm is a tool that allows you to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder, connection time will available via this tool .The tool is designed with a user-friendly interface and is easy to use.The program have firewall system that allows to block any unwanted connection to your shared resources.
Author: Nsasoft LLC.| Date: 15-05-2005 | Size: 444 KB
|
|
- |
|
FileMap by BB License: Freeware
|
|
|
Don't become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong. FileMap by BB lets you take control of the growing number of files by making a record of those in the Windows, the System, and the Disk Root directories whenever you like, easily disclosing differences when compared. If ever secret files play havoc on your computer, you'll be glad you had this extra layer of security. It does not have to be running in the background to detect changes, in fact, it simply gives a reliable comparison between before and after file lists. It downloads in a few seconds and has a simple drag and drop installation, with no changes to the computer. This program is a FREE full working version. There are NO registry changes or secret files made. FileMap by BB contains no Spyware or AdWare, and is totally non-intrusive.
Author: Bernie-Built Manufacturing| Date: 20-11-2004 | Size: 143 KB
|
|
- |
|
Stop Thief Screen Saver License: Shareware
|
|
|
Pixel Paradox makes NO claim that STOP THIEF will prevent any kind of criminal activity whatsoever, under any circumstances. It has NO ability to detect motion, or call the police. Everything is FAKE. It is comparable to "the electronic barking dog", which is not really a dog, but just a recording of a barking dog. DO NOT RELY ON THIS PRODUCT TO PROTECT YOUR PROPERTY, OR OFFER ANY KIND OF HOME SECURITY.
Author: Pixel Paradox| Date: 05-01-2003 | Size: 2100 KB
|
|
- |
|
MyOdd Desktop Application License: Freeware
|
|
|
MyOdd is a complex application that allows you to take control of your desktop and processes currently running on your system. With a higher level of security you can prevent or simply limit the use of any application, (even if you are not the administrator). For example could prevent your kid from playing games after 8:00 pm so they can do their homework… You can take screen shots on regular basis to see what other users where doing while you were away. With MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys. Any hotkey that you choose will stop, start or hide any software you want. With a simple update function you get the latest version for maximum protection. Now with MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys. Some of the security options allow you to... -Take a picture of the screen at regular intervals or when a new application is started. -Control, monitor, what is running on your system -Who is running what, and when they were running it. -When a certain application can run, (great if you need to ensure your kids are not playing more than they really should). -A complete logging system allows you to monitor who used what application. And much more... The help manual offers a tutorial as well as a Frequently asked question section. An advanced web update system ensures that you have all the latest versions available at all time. By http://www.myoddweb.com
Author: MyOddweb.com| Date: 01-02-2004 | Size: 2537 KB
|
|
- |
|
HttpTrafficGen License: Freeware
|
|
|
This is a HTTP traffic generator for testing web applications. You can specify the requests count and interval between two requests. The generated requests are sent to the specified URL. It is a very simple and fast program which can simulate client activity.
Author: Nsasoft LLC.| Date: 24-04-2005 | Size: 384 KB
|
|
- |
|
RegistryProt License: Freeware
|
|
|
RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.
Author: Diamond Computer Systems| Date: 18-10-2001 | Size: 68 KB
|
|
- |
|
DynamicalPassword License: Freeware
|
|
|
With "Dynamical Passwords" you may generate passwords on any date (even each day). There is no need to remember or save all these generated passwords as far as you can remember you personal password (key) and the date. It is also useful for discovering weak links in a complex security system with many passwords protected elements/units.
Author: Igor| Date: 02-12-2002 | Size: 11 KB
|
|
- |
|
Charlies Angel Code Breaker License: Freeware
|
|
|
Your mission is to prove that you have what it takes to get past the ultimate security system. You are faced with a walls of code blocks, which you must break through. Clear them all and you are one step closer to gaining full access to the main computer system and the secrets the hold.
Author: Free Web Games| Date: 10-01-2005 | Size: 560 KB
|
|
- |
|
Hide Files & Folders License: Freeware
|
|
|
Hide Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Hide Files and Folders does not modify your media: in protecting your files or folders, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Hide Files and Folders will never lose your data, as may happen if you use other file- and folder-protecting software. Due to unique technology, the program also lets you protect system files and folders such as the Windows System, Registry and Swap files. Go ahead! Download the program right now! You will find it very easy to use.
Author: IM-Soft| Date: 08-10-2004 | Size: 808 KB
|
|
- |
|
Lock Folder License: Freeware
|
|
|
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be deleted, damaged or harmed in any other ways. Even if a virus gets introduced to your system, your locked folders will not be detected, infected or harmed. Here is the important part - Lock Folder uses the encryption standards approved by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees.
Author: Leo van Opstal| Date: 09-08-2003 | Size: 1400 KB
|
|
- |
|
Ip2CountryResolver License: Freeware
|
|
|
Ip2CountryResolver allows you to identify the country by given IP Address. If you are doing business on the Internet and you want to know where your users are from, you've found the right place! Ip2CountryResolver will help you to identify visitor's geographical location country and country code. The tool is designed with a user-friendly interface and is easy to use.
Author: Nsasoft LLC.| Date: 09-05-2005 | Size: 681 KB
|
|
- |
|
IpDnsResolver License: Freeware
|
|
|
It is a very simple and fast program that easily lets you find your own IP address, resolve hostnames to IP addresses and IP addresses to hostnames using the DNS.
Author: Nsasoft LLC.| Date: 09-04-2005 | Size: 396 KB
|
|
- |
|
ActMon PWL Password Finder (WASP) License: Freeware
|
|
|
WASP displays all passwords of the currently logged in user that are stored in the Microsoft PWL file password database. It allows the convenient management (i. e. supervision and /or deletion) of this file to improve the security / privacy of your PC. It is also very useful for educational purposes about computer security. The documentation also contains general information about the PWL files and their security. This software is designed for Win 95 / 98 / ME. Real Freeware.
Author: Activity Computer File PC Network Monitoring| Date: 14-12-2004 | Size: 1351 KB
|
|
- |
|
Oracle Security Check License: Freeware
|
|
|
Oracle Security Check will connect to your database and test against an internal list of standard usernames and passwords. If any are found, they are reported as potential security holes.
Author: eNSYNC Solutions| Date: 21-12-2002 | Size: 400 KB
|
|
- |
|
Imaginary Web Server License: Freeware
|
|
|
An unprotected Windows computer connected to the Internet is in danger of being broken into by outside intruders who continuously scan the Internet for security holes. Many computers use a firewall for protection. Unfortunately, firewalls can be bypassed by clever attackers. The Imaginary Web Server (IWS) makes the attackers think that they have found a web server which is no longer active. When they come to your computer, the server will give them an error message and send them to http://some.imaginaryplace.com - some imaginary place on the web. Now, don't worry, you will not be sending them to some unsuspecting web site! Whiz Kid Technomagic has secured the imaginaryplace.com domain and delegated the some.imaginaryplace.com subdomain, so they will, indeed, find the "new" location of "your" web site. They will go there and leave your computer in peace. Meanwhile, your computer remains perfectly safe from these attackers. No matter what file they try to access on your computer, no matter what command they try to execute on your computer, your IWS always reacts the same way. It never lets them access the inside of your computer but always sends them off. Some attackers try a different approach. Instead of trying to get to your files, they try to upload files to your system. Often these are scripts or programs they want to run on your computer. The Imaginary Web Server will, again, tell them there no longer is anywhere to upload files on your system and will send them away. Some attackers try to upload huge files, just to keep your system busy and to slow down your Internet access. The IWS shuts the door on them. Other attackers try to sneak in a hidden web server on your system and let that server cooperate with the attackers. But only one web server can exist on your computer. With IWS running, they cannot run. And if they start running first, IWS will tell you that another web server is already running, so you can find it and disable it.
Author: G. Adam Stanislav| Date: 25-02-2003 | Size: 28 KB
|
|
- |
|
Purge-it License: Freeware
|
|
|
Purge-it! allows the End-User to take a look inside his System, see what Programs are running, which Ports are open The User does choose what happens to his system, and can clean himself from various Malware such as Backdoor, Trojans and Spyware. It heavily resides on the capability of the End-user. In order to deploy Purge-It! at its full strength the user needs to know at least the basics. Its up to the End-User to develop generic methods at monitoring the integrity of their system.
Author: YASC LTD| Date: 10-01-2005 | Size: 712 KB
|
|
- |
|
Ascella Log Monitor License: Freeware
|
|
|
Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates)
Author: AAR Software Ltd.| Date: 21-07-2002 | Size: 700 KB
|
|
- |
|
NetSendFaker License: Freeware
|
|
|
NetSendFaker allows you to send anonymous Net Send messages to anyone that is connected to the network. You can also emulate messages as if they were sent from other computer. The tool is designed with a user-friendly interface and is easy to use.
Author: Nsasoft LLC.| Date: 22-04-2005 | Size: 360 KB
|
|
- |
|
Imaginary Telnet Server License: Freeware
|
|
|
When your computer is connected to the Internet, it is opened up to attacks by anyone experienced with the Internet technology. One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system.
Author: Whiz Kid Technomagic| Date: 11-03-2003 | Size: 38 KB
|
|
- |
|
ArpCacheWatch License: Freeware
|
|
|
ArpCacheWatch monitors Windows ARP cache and allows to send an ARP request to obtain the physical address that corresponds to the specified destination IP address. The ARP cache contains IP/MAC translations so that every time an IP packet are to be sent, the MAC address doesn't have to queried through a broadcast, instead it can use the cached address.
Author: Nsasoft LLC.| Date: 25-04-2005 | Size: 1420 KB
|
|
- |
|
LucidLink Wireless Client License: Freeware
|
|
|
LucidLink Wireless Client makes it easy to access Wi-Fi networks. It can be used to connect to home networks, office networks, or public hotspots. This client is easy to install, easy to use, and it solves an array of problems Wi-Fi users face connecting to different wireless networks. The LucidLink Client automatically detects network security settings, alerts users to incompatible settings and provides instructions for resolving them, ensuring that users establish connectivity rather than being left to wonder what is wrong. It detects and warns against suspected security problems such as the Evil Twin and potential Man-in-the-Middle Security Attacks. Supports networks secured with LucidLink Wireless Security, WEP, WPA-PSK, and open (unsecured) networks.
Author: Interlink Networks, Inc.| Date: 01-04-2005 | Size: 19300 KB
|
|
- |
| 1 | 2 | 3 | 4 | 5 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|