Ken Messenger 5.0.2
Ken Messenger is an Instant Messaging software. Works either with our free public server or with your own private Instant Messenger Server. It allows companies, organisations, institutions and dispersed workgroups to create and control their own private messaging network (Free up to 5 connected users) without having to use and depend on public IM servers.
See also: training, distance learning, distance, learning, colleges, college, universities, university, schools, school, educational, education, dispersed, privacy, private, IM network, networks, network, networking, extranet, VPN, intranet, internet, economical, cost-effective, cost effective, return on investment, ROI, compliance, compliant, finance, financial, medical, HIPAA, rules, SEC, NASD, off-line, offline, on-line, online, file transfer, files, file, message, messages, traffic, encryption, encrypted, security, secure, non-profit, Sonork EIM, GTV, Sonork, organizational, organization, industry, government, business, company, professional, EIM, enterprise instant messaging, enterprise, messenger, messaging, instant, instant messenger, instant messaging, Instant Messenger Server, KenMessenger Server, Ken Messenger Server, Instant Messenger, Messenger, KenMessenger, Ken Messenger, Wilcom2, collaboration, collaborating, work-group, workgroup, webapp, web application, web applications, application, applications, webapps, conference, conferencing, chat, chatting, chatrooms, peer-to-peer, p2p, peer to peer, server, servers
FingerCell PC EDK for Linux 1.2
FingerCell 1.2 Embedded Development Kit for PC with Linux. This EDK is intended for developers, who are going to create an embedded biometric system with a server on PC with Linux. Includes 1 license for FingerCell shared library, interfaces for image input from either files or fingerprint sensors, sample application with source code and software documentation.
See also: access control, authentication, ridge, crime, scan, security, biometric, evaluation, demo, binary, linux, embedded, verification, matching, identification, recognition, fingerprint, pattern recognition, criminalistics
Rock Solid Contact US System 0.7.2
A secure Contact US web form write in PHP, with visual optional confirmation, optional email confirmation, internationalization, easy to customize with template. Keep email private, eliminate 99.99% undesired spam. Prevent bot automation and invalid/spoof email. Double validations client/server keep resources used to minimum.
See also: communication, spoofing, spoof, privacy, security, anti-spam, spam, email, mail, apache, sqlite, php, form, web, Contact, Solid, Rock, template
Mil Shield 5.0
Mil Shield 5.0 protects your privacy by deleting all tracks from your online or offline computer activities: cookies, cache, history, INDEX.DAT files, Firefox tracks and all other tracks. There are some unique features in this program: Selective cleaning (selectively preserves cache, history and/or cookies for chosen by you safe Internet sites), Panic key combination, Automatic cleaning, Support for multiple user accounts.
See also: UserData records, typed URL history, home page, start page, privacy, most recently used, MRU, recent documents, evidence, tracks, cache, Firefox, Internet Explorer, history, cookies, automatic, security, index.dat, remove, delete, erase, clean
This superb utility eliminates your surfing tracks. Cache files, Cookies, Visited URLs, Typed URLs, History Folders, Strays, Recent Links, the IE UserData folder, Recycle Bin and the Windows Temp Folder are the categories you can eliminate. PurgeIE now has functions to assist in Cookie Control. PurgeIE manages its cleanup functions without requiring a system restart. Supports IE-4 thru IE-6. A recent upgrade implements a tabbed User interface.
See also: washer, strays, autocomplete, privacy, tracks, dropdown, typed urls, url, urls, files, cleaner, security zones, cookie blocking, history, cookies, cookie, cache, explorer, internet, userdata, index.dat, purge, purgeie, wash, tif, searches
Data Recall 1.0
Data Recall is Windows-based application that will easily and securely store of all of your critical data. Data Recall allows you to store an unlimited number of user names, passwords, web site URL's, insurance policies, bank accounts, and much more.
Data Recall automatically sets up over 40 pre-defined categories, and their related fields. You can modify these pre-defined categories, delete the categories, and add your own custom categories.
See also: Infokeep, security, encrypted, passwords, data, information management, password, secure, Info Keep, Ignyte Software
System Security 2006 4.0.0
System Security 2006 is the next generation of computer-security software. Software that enables you to protect your system from unauthorized use and unauthorized users. System Security 2006 includes new methods to secure and prevent unwanted use of your system. With this software, you can also disable feature of Windows to make your system even more secure.
See also: disable unauthorized, protect, protect pc, secure windows, windows security, restrict, secure, lock, lock pc, lock desktop, pc security, protection, system, security, system security, restrict access, limit access
AVIRA Antivirus for Sendmail-Milter (Linux) 1.0.2
AVIRA Antivirus for Sendmail-Milter checks all incoming and outgoing emails and, depending on the result of the scanning process, the emails are blocked or delivered. Email notifications can be issued for the message sender, the recipient and the administrator. The program scans emails based on their sender and recipient addresses, isolating suspicious and infected files, blocking emails containing suspicious archives or suspicious MIME emails.
See also: linux virus protection, email scanner, server antivirus programs, email filters, antivirus mail server, phishing, email viruses, network virus protection, antivirus linux, email virus, antivirus for linux, email filter, antivirus sendmail, email virus detection, linux security, email virus scanner, linux antivirus, email antivirus
StorageSafe provides high performance security for USB and IEEE1394 based storage with on-the-fly device encryption, guards against 180,000+ common passwords, and secure file/device erase. Devices are split into custom sized public and private areas. The public area is not encrypted. The private area is encrypted with the 256-bit Advanced Encryption Standard. Protected devices look and feel the same as before.
See also: flash disk, hard disk, FireWire, IEEE 1394, USB, FIPS 140-2, Encryption, Security, Secure Hash Algorithm, AES, Advanced Encryption Standard, Privacy, Secure Erase, 5220.22-M, HIPAA, Sarbanes-Oxley
Home CHAOS 3.5
Encrypt text files, images, documents, programs and entire folders giving additional security to your information. . Drag and Drop support. CHAOS made the security simple.
See also: GOST, safety, e-mail, shredder, protect, chaos, stream cipher, public key, security, Blowfish
Metadata Analyzer 2.0
Metadata can get you into trouble! Whenever an MS Office document is created it is complemented with such properties as the author, corporate name, document changes, editing time and other metadata. All this makes the private information available to a third party that may put your company at financial risk and/or an embarrassing situation. Metadata Analyzer shall advise you of this information and prevent its unauthorized disclosure.
See also: Document Integrity, MS Office Metadata, Document Security
PDFBlackbox (VCL) 4.2
PDFBlackbox (VCL Edition) is a comprehensive collection of native components that help you compress, encrypt and sign PDF documents from your Delphi or Kylix applications. Both symmetric and certificate-based (X.509) encryption and signing is supported. VCL edition can be used with Delphi 4-7 and 2005-2006, C++Builder 4-6 and Kylix 2-3.
See also: VCL, Delphi, control, component, encryption, certificate, sign, compress, encrypt, security, PDF
Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files
See also: cryptography, security, shredding, message digest, hashing, decryption, encryption, cipher
Program Selector Pro 2000/XP 4.9
Program Selector Pro provides access control and usage management. Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security, lock desktop
Whois Tool is a client utility that communicates with WHOIS servers located around the world to obtain domain registration information. Whois supports IP address queries and automatically selects the appropriate whois server for IP addresses. This tool will lookup information on a domain, IP address, or a domain registration information .
See also: information security, enterprise security, computer security, event log, intrusion detection, port scanner, network security, network utils, port scan, network monitoring, net tools, network software, network tool, whois, internet scanner, internet security, security software, freeware
Advanced Netstat 1.0
Did you ever wonder what program opened that strange port that suddenly appeard in netstat ? Then Advanced Netstat is what you need ! Many trojans,backdoors,viruses and worms open ports on your system to allow an attacker to access your system and remotely control it. Advanced Netstat helps you to spot such applications. It shows you exactly which applications listen on the network for connections. It is the perfect tool for Administrators but al
See also: protocol, port, udp, tcp, status, network, win, secure, groundzero, monitor, monitoring, trojans, trojan, worm, virus, process, network, security, netstat, advanced
SPAM Shredder 3.1
SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control under incoming emails, thus helping to save your time and money! Applying the SPAM Shredder allows to determine up to 99.9% of spam emails.
See also: express, safe, client, encrypt, spam, protect, mail, e-mail, email, spam, public key, security
Web Padlock 3.2
Web Padlock gives you control over what Web pages can be viewed on your computer. Once installed, it blocks other Web browsers ( Internet Explorer, etc.) from running, leaving Web Padlock as the only Web browser. Only Web sites on the password-protected user-defined authorized list can be visited.
See also: Web security, Web browser, Internet, access control, Internet security
My System Optimizer 2.0
My System Optimizer is an ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. It provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance.
See also: pc control, system security, control pc, system optimizer, system utility
Assign Multiple Daily Tasks to 20 People 7.8
Assign multiple tasks to your employees for one week. These spreadsheets are very popular with home care agencies that send caregivers to several client homes each day. It can schedule up to 20 employees and 50 daily tasks. The program interacts with QuickBooks Pro for use in client invoices and employee payroll and creates a vCalendar file for your PDA, Smart Phone and Outlook Calendar. The spreadsheet comes in sizes for up to 160 employees.
See also: Personnel, Scheduling, Shift Schedules, Work Schedules, Multiple Tasks