ContraVirus is able to detect and protect against a verity of Spyware, Adware, Trojans and other Malware. After removing existing infections, it uses its SpyWall feature, which will protect against infections before they make their way into your PC.
See also: live monitor, Spam, Adware, Keystroke Monitors, System Monitors, Trojan Viruses, Security Disablers, Browser Hijackers, Page Hijackers, firewall, security breach, security vulnerability, trojan, virus, spyware, adware, spyware threat, spyware monitor
File & Folder Protector 2.51
Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: free, screen, lock, restrict, privacy, files, protect, control, access, administrator, security, password, download
Hide Files & Folders 2.5
Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
See also: lock, screen, free, download, computer, restricting, restrictions, restrict, privacy, protect, control, access, security, password
User Time Administrator 18.104.22.168
User Time Administrator lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date and after the specified date.
See also: time, control, limit, restrict, restrictions, specify, allow, shedule, log, password, guard, security, time table
This Assembly Language program is for splitting large files for easier distribution. Using either a normal window or a wizard interface, files can be split by either the number of files that you want, the maximum file size, or you can use preset common sizes for EMailing, floppies, Zips, CDs, etc... The program supports file time and attributes preserving, CRC, BAT file unchopping, command line operation and even simple encryption.
See also: Command line, CRC, wizard, chop, Sinner, security, assembly, Bat, Split, File
MailScan for MDaemon 4.5a
MailScan for MDaemonŽ is a proven antivirus solution designed to protect against email viruses and block spam. Situated directly on the MDaemonŽ email server, rather than dispersed on each client computer, MailScan proactively secures the network by banning harmful email messages at the server.
MailScan for MDaemonŽ scans and cleans all viruses and worms on every component (e.g. HTML attachments, HTML scripts, S/Mime) in an email message.
See also: security analysis tools, spam blocker, antivirus, mdaemon, scanner
AceBackup allows you to back up your data locally or on any storage device. You can also back up your files on the internet or on FTP servers. Its effective performance is achieved through powerful functions and integration with Windows Explorer which makes it handle with ease. Scheduled, encrypted (up to 256 bit) and compressed backups. 1:1 Backup or Archive with individual paths. Restore data in the original folder or in any folder you like.
See also: for free, AceBIT, securely, secure, encoded, encrypted, data security, backup data, data, system program, system utilities, AceBackup, Backups, Backup, FTP backup, manage, FTP, security copy
StormWindow XP 7.01
Cetus StormWindow [TM] for Windows XP will allow the authorized user to add several types of protections to the desktop and system of a Windows XP computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows XP PC. StormWindow protections would probably be most useful to a system administrator at a school or business.
See also: StormWindow, StormWindows, Security, Cetus, Win XP, WinXP, Registry, Explorer, Password
Corporate SMTP Server 1.61
Corporate SMTP Server is a high-performance SMTP server program that can be used by corporations and Internet Service Providers where having an ultra fast and reliable outgoing mail server is a necessity. It can be used along with virtually any mailer or email program including Microsoft Outlook, Outlook Express, Eudora, Netscape and The Bat. Although, Corporate SMTP Server is very simple from the first look, it hides a real power.
See also: server, smtp, pop, internet, service, providers, performance, mail, email, servers, enterprise, deliver, security, ddos, block, attacks, travel
Best Mail Server 1.71
Ultra fast mail server program. Send mail using any mail client complaint with SMTP protocol. Configure this server to be your corporate mail server. Accept mail on behalf of users, until users will retrieve it using POP3. Security features to protect the server from DDoS attacks and block SPAM and spammers. SMTP/POP3 servers work as NT services and without logged in users. Use multiple SMTP gateways if you cannot deliver your email directly
See also: server, smtp, pop, internet, service, providers, performance, mail, email, servers, enterprise, deliver, security, ddos, travel
Shared Monitor 1.0
Shared Monitor is an advanced shared resource monitor and logger. The program sits in your system tray and constantly monitors all the Microsoft Network connections. It allows you to monitor active connections to your resources and browse the historical data. In addition, you can generate HTML reports, set alerts on specific events (for example, when a new computer connects to your resources) and run the program automatically on Windows start.
See also: network monitoring, network monitor, network security, system monitor, computer security, security software, network protection, network access
642-531 Downloadable Exam Simulator 2.1
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Certification Exam Preparation Materials provide you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers.
See also: 642-531 VPN and Security, VPN and Security 642-531642-531 CCSP, CCSP 642-531, Cisco Exams 642-531, Cisco Exam 642-531, 642-531 Cisco
the Software Safe 2
The Software Safe is a secure way to protect confidential information such as pictures, documents, PIN codes etc. You can use a password, but with the personal locks, you don't need to remember difficult codes anymore! Choose your favourite colors, click on a secret spot in your own pictures, or use personal questions to which only you will know the answer! Any number of personal locks may be used, and they can be combined with the password.
See also: security, encryption, passwords, scrambling, storage, safe, secret
PDF Encrypt Tool 2.00
PDF Encrypt Tool V2.0 can be used to protect your PDF files with 128-bit strength user and owner passwords, set all permissions(such as coping, editing, printing, selecting text and graphics, fill in etc), and prevent PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged. It is the fast, affordable way to encrypt a lot of pdf files to encrypted pdf files once time for saving your time! Its easy-to-use i
See also: PDF, encrypt pdf, pdf secure, lock secure pdf permission, pdf protector, protection, pdf security, acrobat
Advanced ID Creator Premier 6.10.13
Create and print professional ID cards and badges instantly! Advanced ID Creator allows you to create great looking id cards. Use the wide variety of tools to add text, graphics, shapes, barcodes, shadows and other effects to your design. Use the previously saved template to get started in a matter of seconds. Once your basic design is created tweak it or print it just the way it is. Create you own ID cards and badges in minutes!
See also: card, id card, id card creation, id card printing, badge, security, card software, id cards, id cards software, photo id, printer, printing, nametag, name tag, nametags, badge, identification, barcode, biometric, biometrics
Hyper Wiper 2007
Hyper Wiper is the #1 software on the web for deleting _ and other objectionable material from your computer. Fast and easy. Hyper Wiper can clean your entire system and allow you to keep what you want. Not only will it get rid of the things you don't want, selectively it will also add a "dummy" history instead of leaving the PC obviously wiped clean. KEEP YOUR JOB, KEEP YOUR MARRIAGE, KEEP YOUR DIGNITY AND KEEP OUT OF TROUBLE.
See also: hyper wiper, hyperwiper, delete temp files, eliminate, eliminator, wipe, erase, clean, wiper, cleaner, delete, hide, security, privacy, cache, internet, cookie, cookies, temp, files, temporary, temporary internet files, history, recent, documents, pcsoftware1, 6.6te.net
Here are some key features of "CafeMan":
ˇ Keeping track of user activity.
ˇ Automating the billing process.
ˇ Implementing pre paid system.
ˇ Relief from the bargaining problems.
ˇ Taking care of hundreds of users in a moment.
ˇ Being accurate with the management.
ˇ This becomes the evidence, if you require.
ˇ Guards your cafe against illegal activities.
See also: virtual cyber cafe manager, cyber cafe management, billing, monitoring, security, remote control
Webcam Surveyor 1.5.5
Webcam Surveyor is a utility that allows you to easy control your web cams. You worry for your home or office? Webcam Survayer will help to track safety and will inform you if something happen. Webcam Survayer?s motion detection feature to alert you immediately when activity is detected. Webcam Survayer support E-mail and FTP alerts or you can simply capture sequence of images with an interval of time of a second to 59 hours.
See also: webcam surveyor, webcam, soft, web cam, camera, motion detection, capture, surveyor, security cam, surveillance system, video surveillance, monitoring, AVI capture
APS PC REGISTRY CLEANER 7.8.10122
Registry Cleaner cleans and repairs your computers registry with an easy to use system that will not only speed up your computer but also prevent your computer from crashing in the future. Overloaded registrys are a major cause of computer instability and MyRegistryCleaners repair system will insure that you systems runs faster, stops crashing and boots up easier.
See also: my registry cleaner, registry repair, repair registry, clean registry, registry clean, registry utility, registry cleaner, registry fix, registry fixer, registry maintanace, pc security shield, recover registry, registry recovery
Cryptex - 100 GB Vault 2
Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format.
See also: vault, encryption, laptop security, laptop encryption, on the fiy encryption, secure data, data security, crypted, criptex, cryptes, secure, locked, safe, hidden, stolen, privacy, intrusion, bit encryption, 128 bit encryption, vulnerable, relief, reass