ContraVirus is able to detect and protect against a verity of Spyware, Adware, Trojans and other Malware. After removing existing infections, it uses its SpyWall feature, which will protect against infections before they make their way into your PC.
See also: live monitor, Spam, Adware, Keystroke Monitors, System Monitors, Trojan Viruses, Security Disablers, Browser Hijackers, Page Hijackers, firewall, security breach, security vulnerability, trojan, virus, spyware, adware, spyware threat, spyware monitor
True Eraser 1.0
TrueEraser is an advanced security tool for Windows, which allows you to completely remove sensitive data from your compute.TrueEraser implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with TrueEraser, your file data is gone forever.TrueEraser is also very easy to use.Just right click on any file/folder and choose TrueErase from the windows's context menu.
See also: file, delete, erase, shredder, wipe, security, obliterate, data, cleaner
PDF DLL BasePack 1.0
The function library package with the modules (dll) PDFinternals, PDFdocuments, PDFlayout and PDFsecurity for your own (batch-)application. Here bundled for a lower price! You can use the dlls with your commercial applications without paying any further fees - It's royalty free! The dlls are tested with delphi and vba/visual basic... but there should be no problems with any other main programming language, too. Read more on the product pages.
See also: DLL Delphi Visual Basic VBA pdf function Acrobat password document layout security Adobe properties batch library
BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each individual access control entry (ACE) to see the effective permissions for different users and groups (trustees). BPACLer quickly displays all allow and deny access control entries (ACE) from the ACL for a selected file or folder. The selected file or folder owner information is also displayed on the same screen.
See also: administrator, system, entry, security, folder, file, permission, List, Control, Access, ACE, ACL
CD-DVD Lock 2.11
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, Hard drive, DVD, download
Encryption Workshop 3.2 Build 060220
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer.
See also: security, encryption, encrypt/decrypt folder, encrypt/decrypt file
Access Denied XP 1.1
Security program that request username and password on Windows load-up and fast lock your desktop by one mouse click . All unwanted people are getting away from your computer. It is stronger what Windows XP security. You can see and manage easily user privileges within colored list of users. Empty password users now can be fast detected too. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time.
See also: access, denied, boot, lock, screen, protect, privileges, safe, guard, password, security
Advanced ID Creator Professional 6.10.25
Create and print professional ID cards and badges instantly! Advanced ID Creator allows you to create great looking id cards. Use the wide variety of tools to add text, graphics, shapes, barcodes, shadows and other effects to your design. Use the previously saved template to get started in a matter of seconds. Once your basic design is created tweak it or print it just the way it is. Create you own ID cards and badges in minutes!
See also: nametags, name tag, nametag, printing, printer, photo id, id cards software, id cards, card software, security, badge, id card printing, id card creation, id card, card, identification, barcode, badge, biometric, biometrics
Koffix Blocker 1.01
Koffix Blocker is a desktop application that helps you to block or restrict sites that are involved in questionable practices. When you surf the web you may sometimes accidentally visit sites that, for example, try to install some sort of spyware on your computer. If you had known that beforehand you probably wouldn't have visited these sites at all. Koffix Blocker can help you block these sites.
See also: phising, hole, exploit, security, privacy, spyware, freeware, free, worm, virus, trojan, spyware, zone, restricted, file, hosts, web, sites, site, blocker, block, koffix
Password Recovery Console 2.52.050505
The Password Recovery Console is a web-based application that enables the delegation of password recovery privileges. The Password Recovery Console interface can be accessed from any networked system, and can be configured to allow specific users in your enterprise to recover the password of any or all accounts that have been set and stored by User Manager Pro and/or Random Password Manager. The Password Recovery Console offers granular control.
See also: 2000, LANICU, HIPAA, SOX, Security, Management, Pwdump, Passwords, Hash, Migration, SAM, single sign on, forgot password, Common Credentials, Password Reset, Help Desk, 2003, Microsoft
HIPAA Security Rule Assistant 7.2
HIPAA Security Rule Assistant provides HIPAA covered entities a program to learn and understand the HIPAA Security Rule. It contains Risk Analysis worksheet, sample policy templates, sample disaster recovery plan, and a sample Incident Report form. It also has areas to tract actions taken and enter policies and procedures developed to meet the requirements of the rule. You can view the entire rule or portions thereof.
See also: HIPAA Security, HIPAA Consultant, HIPAA Assistant, HIPAA Security Rule, HIPAA
PHP Processor 18.104.22.168
PHP Processor is designed to help you protect your intellectual property when distributing PHP source files. The other use for PHP Processor is to optimize PHP source code and considerably decrease size of your source code files. PHP Processor provides a fast, intuitive way to obfuscate your PHP source code. Both variable and function names can be replaced with meaningless strings making your code difficult to read and alter for a third party.
See also: comments, code, backup, FTP, analyse, processor, security, PHP protect editor source analyse processor security FTP backup code comments, PHP, protect, source, editor
Complete Internet Cleanup Pro 3.0.1
Complete Internet Cleanup is a utility to erase your Internet tracks. All your Internet traces are logged to index.dat files and deleting Cache, Cookies and History does not clear the contents of index.dat files. Additionally deletes the typed URLs, user names, passwords, Internet plugins, etc. Complete Internet Cleanup is also a utility to help running your PC faster by removing Windows junk files.
See also: index.dat, cookies, internet, web, security, delete, clean, clear, erase
Acid Scanner 1.0
Acid Scanner is advanced monitoring tool that allow administrators or common users scan their networks for possible security risk and uncover unprotected ways to their computers. It offers many tcp/ip utilities in one program: shared resource scan, ping scan, port scan, traceroute, advanced terminal (tcp/udp session, traffic logging), netbios info, remote resource mounting, results exporting and much more...
See also: telnet, traceroute, ping, udp, tcp, port, shared resource, monitor, security, free, scanner, acid, acidscanner, terminal
MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom) web-server scripts, full identification of RPC services and more.
See also: network security scanner
Security Toolkit 0.6
The Security Toolkit allows you to create encrypted virtual drives, encrypt your hard drives, USB (flash) drives and CD/DVD?s. Also included is a secure file shredder, Internet & Application History shredder, encrypted password manager, random password creator, spyware remover and more. You can even create your own deletion algorithms and spyware removal routines with the fully scriptable deletion engine. Freeware for non-profit use.
See also: internet history, shred, delete, protect, lock, secure, file, folder, password manager, password protect, encrypt cd, encrypt usb, encryption, spyware, security, internet explorer, firefox history, wipe history
R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages.
See also: Firewall, Online Security, On-line Security, Data Security, Data Protection, PC Protection
YGS Password Manager 2006.06
This is simple manager for not safe keeping passwords. It help you keep passwords for numerous web accounts (for example when you submit your software everywhere). There are search, edit, delete and add functions in this manager. All data to be kept not in code in passman.txt (in same directory with passman.exe).
See also: security, generator, password
Argus Surveillance DVR 1.6
The program designed for security hybrid platforms working simultaneously with IP cameras, USB cameras, and capture cards. It produces MPEG-4 coded video and completely controllable remotely that surveillance computer can be operated with no monitor, keyboard, and mouse. The program performs "cyclic" recording that the "disk full" situation never occurs. Video playback is synchronized for event analysis from multiple cameras simultaneously.
See also: CCTV, SECURITY, CAMERA, DVR, SURVEILLANCE
1-abc.net Password Organizer 6.00
These days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning secure password management, a random password generator, own encryption engine, txt export..
See also: manager, manager, organize, un-allowed, shield, encryption, encrypt, hide, hidden, secrecy, secret, messenger, eBay, credit card, PIN, login data telephone, login, privacy, personal, private, to secure, access data, Security, Passwords, password