|
|
Unauthorized
|
connectionGuard License: Freeware
|
|
|
Monitor any Internet connection in real time. Prevent unauthorized traffic. As the number and quality of Internet / network connections keeps growing, it has become more important to accurately monitor the actual speed of data transfers. Whether you are staying in a budget motel, struggling with a dial-up connection, or paying top dollar for wireless access, you need a reliable, real-time method to get this information. And this is precisely what connectionGuard can do for you! Keep an eye on our compact, easy-to-read window and you will soon learn to judge whether you are getting the speed that was promised to you. Even better, you will be able to assess how websites and servers respond ... no more guesswork. Run it on your desktop to detect spyware. Unauthorized data transfers and traffic can no longer remain hidden. Sweet!
Author: connectionGuard.com| Date: 01-09-2004 | Size: 48 KB
|
|
- |
|
Hide & Protect any Drives License: Freeware
|
|
|
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
Author: IM-Soft| Date: 08-10-2004 | Size: 765 KB
|
|
- |
|
Smart Popup Blocker License: Freeware
|
|
|
Stops all 'Popups' from causing your PC to crash. Removes advertisement 'Popups' and related bugs. Cleans any unauthorized 'Popups' added on your PC. Adds a faster and better performance to your IE browser. Safeguards your PC from multiple window attacks. Adding this plug-in in your IE browser is as easy as 1, 2, 3.
Author: Mr Daniel Adam| Date: 01-10-2004 | Size: 293 KB
|
|
- |
|
Badger License: Freeware
|
|
|
Badger 2.0 is a downloading robot that fetches multiple files for you, without spying on you or taking over your downloading life. If you care about privacy this is a great alternative for downloading. You can post Badgerscripts on your own website to distribute those multifile packages without disrespecting your webhost, since your visitors will actually be seeing more of the site, undistracted by retry hassles.
Author: InspiredCode| Date: 01-04-2001 | Size: 1500 KB
|
|
- |
|
WinGuard Pro 2003 License: Freeware
|
|
|
Password your programs, files and web pages all in one easy to use program. Give yourself peace of mind from people tampering with your PC with WinGuard Pro 2003 - Free Edition, stop people changing your settings, accessing unauthorized programs, and important files. Best of all it's completely FREE!
Author: WinGuard Pro Team| Date: 01-06-2003 | Size: 525 KB
|
|
- |
|
HDHide -- Hide Drives Hide License: Freeware
|
|
|
Hide Drives Hide (HDHide) can be use to hide or unhide drive letters A: - Z: on any computer using Windows 95/98/ME/NT/2000/XP operating systems - whether they are actual physical drives on a local machine or logical drives (partitions, server volumes, mapped drives, etc.). Any of these drives can be hidden or unhidden.The hidden drive letters will not be visible in Explorer or any other application that use the common Windows dialog boxes.
Author: Troy Thompson, CISSP| Date: 05-11-2001 | Size: 14 KB
|
|
- |
|
Ad-Rage 2003 License: Freeware
|
|
|
Password your programs, files and web pages all in one easy to use program. Give yourself peace of mind from people tampering with your PC with WinGuard Pro 2003 - Free Edition, stop people changing your settings, accessing unauthorized programs, and important files. Best of all it's completely FREE!
Author: Paul H| Date: 01-06-2003 | Size: 278 KB
|
|
- |
|
602Pro LAN SUITE License: Freeware
|
|
|
602Pro LAN SUITE is an easy-to-install and manage all-in-one server application for MS Windows. Its standards-based SMTP/POP3 e-mail server provides effective e-mail communication without the risk of destructive virus infiltration and productivity robbing unsolicited e-mail. Fax services seamlessly integrate into user mailboxes to unify e-mail and fax message access. The built-in firewall provides effective protection against unauthorized access.
Author: Software602, Inc.| Date: 10-06-2003 | Size: 13731 KB
|
|
- |
|
Softtanks Security Software License: Freeware
|
|
|
Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues. You just need to remember the passwords which you can change any time. It will Protect your Computer from · Unauthorize use by anyone. · You can Start the security system whenever you leave your computer. · It will not allow others to view your data and update them in your absence. · It will stop viruses comming from other people when you are away from your PC. Anyone working on your system will have to provide the proof that he/she is allowed to use that computer. Please give your PC password only to those people whom you have full faith. You need to re-install the software if you forget your passwords. So keep a copy of install software as backup.
Author: Softtanks.com| Date: 02-08-2004 | Size: 1308 KB
|
|
- |
|
ROI Web Site Traffic License: Freeware
|
|
|
Online service for calcuating return on investments put into advertising. Effective system and affordable pricing. Automatic code generation. Convenient and easy-to-use Web interface of admin area with step-by-step wizard for advertisement campaigns. Complete financial reports of different types about return of your investments. Information about your advertisement campaigns will be password protected from unauthorized access or modifications. Using PWT Online Service you can set up as many advertising campaigns as you want, using all statistics which will also be provided to you.
Author: Pilot ROI Software| Date: 05-07-2004 | Size: 1500 KB
|
|
- |
|
BCArchive License: Freeware
|
|
|
With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your files, either via knowing correct password or via using public/secret key technology. All already generated public and secret keys used in other programs can be also used in BCArchive to create encrypted archive and e-mail it to desired recipient. BCArchive uses strong symmetric encryption algorithms such as Blowfish, IDEA, Triple-DES, CAST5; secure hash algorithms: SHA-1, MD5, RIPEMD-160; asymmetric (public/secret key) algorithms such as RSA, ELGamal/Diffie-Hellman; conforms to specifications PKCS #5, PKCS #12, X.509. BCArchive is convenient software product providing you with strongest encryption technology and ability for efficient management of sensitive data.
Author: Jetico, Inc.| Date: 22-10-2004 | Size: 2399 KB
|
|
- |
|
Hard Angel License: Freeware
|
|
|
Do you remember CIH? The virus has injured 500000 computers and many computers have been destroyed as a result of erasing of the Flash-BIOS. Now owners of motherboards lock it but this problem is actual for hard disks still. Hard Angel it is jumper for your hard drive. Protect your hard drive with a Hard Angel! The Hard Angel: provides the hardware protection of your drive for the prohibition of unauthorized access; allows to lock attacks of viruses which use this mechanism for destruction of the information; allows to warn the user about the risk of a data loss if drive starts to fail; provides reliable storage of the passwords and possibility of their restoring; allows to bypass limitations of the BIOS of capacity of your drive; works under any OS. Ideas and algorithms are checked out in the gangsters world of Russia and by speculators of inside in America.
Author: AHI-2| Date: 12-03-2004 | Size: 195 KB
|
|
- |
|
Lock Folder License: Freeware
|
|
|
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be deleted, damaged or harmed in any other ways. Even if a virus gets introduced to your system, your locked folders will not be detected, infected or harmed. Here is the important part - Lock Folder uses the encryption standards approved by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees.
Author: Leo van Opstal| Date: 09-08-2003 | Size: 1400 KB
|
|
- |
|
Emsa Port Blocker License: Freeware
|
|
|
Emsa Port Blocker is a TCP blocking utility. What it does, is blocking unwanted tcp access from/to your computer.It is not a firewall, but up to some extent it could be regarded as a similar tool. Its purpose is to prohibit TCP access on certain ports and ip addresses. IT can also be used as a TCP monitor because it shows TCP connections currently active on the machine. This program works two ways. It can be configured to block access to certain local ports, but it can also prohibit access to specified remote ports as well. For example, you may try adding the port '80' to remote blocked ports. You'll immediately notice that you have disabled your browser's capability from accessing the www. You can use this program to block unauthorized access to certain ports on your computer, for example network ports like TCP 135 or 139 and so on. You can also use the configuration to permit connections between local IP's, or block even those as desired. The program comes with a function allowing to detect local ip's and adding them to the 'allowed' IP list. Functions: - When first started up, the program shows a list of TCP connections on your machine.If you don't see anything there, try opening browser and visit some site and you'll see them. - By unchecking the 'Show only connected' checkbox the program will also show tcp connections in other states, like LISTENING and so on. - The left hand list is versatile and its meaning depends on the last button clicked - check the label above to see what the list is currently displaying. - To add items to a list, type into the textbox below and click on add. Make sure you enter valid data (valid ip addresses/ valid port numbers).To delete one item, select it in the list and click on 'Delete'. - To view Allowed IP Addresses, click on the corresponding button. By default, here you will see your local IP address (127.0.0.1). You may want to add all your local IP addresses to the allowed list. This program is Freeware.
Author: EMSA SYSTEMS LTD| Date: 28-10-2004 | Size: 161 KB
|
|
- |
| 1 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|