|
|
Firewalls
|
TrafficEmulator License: Freeware
|
|
|
Nsasoft Network TrafficEmulator generates IP/ICMP/TCP/UDP traffic from clients to server to stress test servers,routers and firewalls under heavy network load.It is a very simple and fast program which can simulate client activity.
Author: Nsasoft LLC.| Date: 10-01-2005 | Size: 332 KB
|
|
- |
|
Morevil Web Chat Lite License: Freeware
|
|
|
Morevil Web Chat Lite is single-room chat for web site. Client side is Java applet which can be embedded on a webpage. The server side is PHP script. Easy to use. Quick loading. Communication behind proxies/firewalls.
Author: Morevil Software| Date: 13-11-2004 | Size: 32 KB
|
|
- |
|
PRTG - Paessler Router Traffic Grapher License: Freeware
|
|
|
With PRTG (Paessler Router Traffic Grapher) you can easily set up and run a monitoring station that logs the amount of data flowing out and into any SNMP enabled network component. The most common usage is monitoring the bandwidth usage of leased lines, routers and firewalls. But you can also monitor the usage of servers, managed switches, printers and other network components. Using PRTG (Paessler Router Traffic Grapher) you can set up a traffic monitoring machine for your router or server in minutes. Free Edition and Pro Edition: The Free Edition is free for personal and commercial use. Simply download PRTG and give it a try. The Pro Edition offers additional features.
Author: Dirk Paessler| Date: 11-02-2004 | Size: 4399 KB
|
|
- |
|
pcAudit License: Freeware
|
|
|
You have seen many times “Secured web site” or “Your transaction on this page is secured” on your bank's web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer. Run pcAudit while on a secured web page and see for yourself that whatever you type while on a secured web page - CAN be seen by a hacker, unless your computer is protected.
Author: Internet Security Allaince, Inc| Date: 29-09-2004 | Size: 97 KB
|
|
- |
|
pcSuper Scanner License: Freeware
|
|
|
Ordinary online scanners will only scan for fraction of the ports. Our proprietary pcSuper Scanner is the only scanner in the world that will scan ALL 65,535 ports, TCP server and client as well as UDP. What's more - it will doing this at an unbelievable rate in mere seconds! No other scanner gets even close. If it finds that you have opened ports on your computer - it is not a reason to panic. Ports may be opened by a legitimate program and that is OK. The opened port is only a problem if it was opened by a malicious program. In that case you will need pcInternet Patrol to sort it out.
Author: Internet Security Allaince, Inc| Date: 23-03-2004 | Size: 21 KB
|
|
- |
|
FTP Component License: Freeware
|
|
|
Microsoft’s .NET Framework class library contains no classes that will allow developers to access File Transfer Protocol (FTP) services directly. KCommon’s FTP component was designed to compensate for the fact that .NET lacks FTP support. With this FTP component, programmers can build either Windows Forms or ASP.NET (Web Forms) applications that will allow users to send or receive a single file or multiple files, using the FTP protocol. Operations for synchronous and asynchronous (using a callback or an event) transfers are supported. KCommon supports passive mode, but does not support active mode, which could cause problems with poorly written firewalls. Recall that in passive mode, the data flow is set up and initiated by the FTP client, rather than the server. This means improved security for the client computer, because it won’t have to deal with data flow being set up by the server. The component is written in C#. It is not marked as CLS compliant. It does not support proxy servers. The online description erroneously refers to an FtpSession type (it should be Session).
Author: ComponentSpot| Date: 08-05-2002 | Size: 843 KB
|
|
- |
|
ToolButton License: Freeware
|
|
|
ToolButton is the only toolbar you need. No need to browse to the search engine home page. Just type away. Send searches to virtually any search service on the Internet. Add searches for spelling, stocks, medical terms, patent applications, customer knowledge databases and many others. Your favorite website's ToolButton is customized to provide links and feeds for content. No need to browse, hunt and search to find the content you want. Simply click on the ToolButtons you have chosen to install in your toolbar. That same website can send "Alerts" to you via ToolButton. These messages are like e-mail but are not e-mail. No need to worry about spam or unsolicited e-mail because you control who sends you messages. Get your newsletters, bulletins or late breaking news delivered through ToolButtons. The information you want and expect will not be blocked by spam filters and firewalls. But the best is left for last! Sign-in to ToolButton and watch as your personalization choices appear in the toolbar. You can have the same ToolButton environment at home, at the office or at a public terminal.
Author: ToolButton Inc.| Date: 20-11-2003 | Size: 3154 KB
|
|
- |
|
Imaginary Web Server License: Freeware
|
|
|
An unprotected Windows computer connected to the Internet is in danger of being broken into by outside intruders who continuously scan the Internet for security holes. Many computers use a firewall for protection. Unfortunately, firewalls can be bypassed by clever attackers. The Imaginary Web Server (IWS) makes the attackers think that they have found a web server which is no longer active. When they come to your computer, the server will give them an error message and send them to http://some.imaginaryplace.com - some imaginary place on the web. Now, don't worry, you will not be sending them to some unsuspecting web site! Whiz Kid Technomagic has secured the imaginaryplace.com domain and delegated the some.imaginaryplace.com subdomain, so they will, indeed, find the "new" location of "your" web site. They will go there and leave your computer in peace. Meanwhile, your computer remains perfectly safe from these attackers. No matter what file they try to access on your computer, no matter what command they try to execute on your computer, your IWS always reacts the same way. It never lets them access the inside of your computer but always sends them off. Some attackers try a different approach. Instead of trying to get to your files, they try to upload files to your system. Often these are scripts or programs they want to run on your computer. The Imaginary Web Server will, again, tell them there no longer is anywhere to upload files on your system and will send them away. Some attackers try to upload huge files, just to keep your system busy and to slow down your Internet access. The IWS shuts the door on them. Other attackers try to sneak in a hidden web server on your system and let that server cooperate with the attackers. But only one web server can exist on your computer. With IWS running, they cannot run. And if they start running first, IWS will tell you that another web server is already running, so you can find it and disable it.
Author: G. Adam Stanislav| Date: 25-02-2003 | Size: 28 KB
|
|
- |
|
Omniquad Personal Firewall License: Freeware
|
|
|
Omniquad Personal Firewall is a personal security system to protect your computers from unauthorised access over the LAN and / Internet. Personal Firewall is a software application used to protect a single Internet-connected computer from intruders. Personal firewall protection is especially useful for users with "always-on" connections such as DSL or Cable modem. Such connections use a static IP address that makes them especially vulnerable to potential hackers . Often compared to anti-virus applications , personal firewalls work in the background at the device (link layer) level to protect the integrity of the system from malicious computer code by controlling Internet connections to and from a user's computer, filtering inbound and outbound traffic, and alerting the user to attempted intrusions. Some of the features of Firewall are as follows: a. 4-level packet filter firewall protection for the local network / dial up/ ASDL and cable modem connections b. Global lock immediately shuts down all net access c. Define & enforce trusted zones d. Alerts for denied network connection attempts e. Real-time network activity indicators f. 3-level program control intercepting connection attempts by any program on your computer g. Automatic lock shuts down internet access after specified period of inactivity
Author: Daniel Sobstel| Date: 08-10-2003 | Size: 4126 KB
|
|
- |
|
dfg ShutDown XP License: Freeware
|
|
|
This program is a professional shutdown, automation, atomic time synchronizing, disk cleaning and PC protection utility - the best you can get today. dfg ShutDown XP gives you an easy and thorough time controlled and automatic way to shutdown, restart or log off your system with optional power off and shutdown forcing (no questioning). An optional Countdown Counter (visual and acoustic) enables you to cancel the system shutdown within a time period of up to 99 seconds. The program also has a built in alarm clock function (alarm sound). Optionally will dfg ShutDown XP will protect the computer while you are absent. You can also launch a program (and wait for exit) before shutdown e.g. to start your daily backup program. All actions (log off, shut down, restart, etc. including system crash info) together with time and userID will be stored in a log file. Synchronization from your system clock to the exact time using the Internet can be done manually or automatically. It queries one of the National Institute of Standards and Technology timeservers, which then returns the correct standard time. It works through firewalls and proxy servers and supports 12(AM/PM) and 24 hour time format incl. all time zones. The standard time is converted to local time and compared with the internal system time on the computer, and adjustments are made accordingly. Optional time check automatically after Windows / program start and the Internet connection is available. The disk cleaning function is optionally accomplished before the shutdown starts.
Author: d.f.g| Date: 17-03-2004 | Size: 1057 KB
|
|
- |
|
Webroot Spy Sweeper - Smart Spyware Removal License: Freeware
|
|
|
Spyware has eclipsed viruses as the fastest growing online threat, infecting nearly 90% of Internet connected PCs. Spyware can infect your system in many different ways: visiting a spy-spreading web site, opening a spy-carrying email attachment, downloading a spy as part of another (often "free") software program, etc. Your privacy, and even your identity, is at high risk if you surf the Internet more than one hour a week, share your computer or use file-sharing programs like KaZaa. Traditional anti-virus programs and firewalls don't offer protection from invasive and harmful spyware programs that can manifest themselves in many ways on your PC. New from Webroot, the leader in privacy protection, Spy Sweeper safely detects and removes more traces of spyware than any other program including; Trojans, adware, keyloggers and system monitoring tools (e.g. Gator, Xupiter, Backorifice and more). Unscrupulous marketers, hackers and thieves work daily to create new intrusive, harmful and annoying spyware to invade your privacy and steal your personal information. Spy Sweeper spy definition databases are updated on a regular basis, offering protection against the latest threats, arming you with knowledge including background information such as where spies came from and the level of harm they pose, and offering recommendations on how to protect yourself and your PC. And because removing some spyware can break other programs on your system, Spy Sweeper offers the ability to quarantine (or disable) spyware, preventing the spy from functioning, but still allowing you access to your favorite free or shareware programs. Don't get caught without protection from harmful spyware that invades your privacy and can even lead to identity theft. Protect yourself and your PC with the most comprehensive anti-spyware tool available. Download Spy Sweeper today - it's free to try!
Author: Steve Thomas| Date: 17-11-2003 | Size: 2602 KB
|
|
- |
| 1 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|