Dekart Logon for Citrix ICA Client 2.02
Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. An easy to use and convenient way to making the login to Citrix MetaFrame Presentation Server sessions fast and secure. Biometrics enabled (optional). No passwords being lost, forgotten or stolen.
See also: Citrix login, user authentication, biometric authentication, security Citrix, security device
File Lock DLL Device Driver 1.0
FOBS based device driver designed primarily to hide or deny access to files, folders and registry keys on the Microsoft Windows family of operating systems (Windows NT-based systems, including Windows 2000 and Windows XP). It provides the ability to completely hide the presence of an application and discourage tampering. Allows you to create applications with components for desktop, CD or DVD PIRACY lock.
See also: registry tweaks, filelock, File Folder Security, File System Drivers XP, FAT Security, NTFS Security, fobs drivers, device drivers, norton, file lock, folder lock, file spy, folder spy
LuxRiot Digital Video Recorder 126.96.36.199
LuxRiot is a Digital Video Recording (DVR) and remote surveillance software package for Windows. LuxRiot accepts video streams from Network (IP) cameras from all major manufacturers, ComArt HiCap and XeCap series frame grabbers for analog CCTV cameras and any Direct Show compatible devices including Webcams and USB cameras.
LuxRiot offers principally new concept for DVR solutions ? ?One Software/Choice of Hardware?.
See also: security camera, DirectShow device, camcorder, webcam, security system, CCTV, Motion Detector, Video Surveillance, IP camera, Network Camera, Digital Video Recorder, DVR, CCTV camera, AXIS, PIXORD, video recording, video playback, theft prevention
BlueAuditor is a easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network. It can discover and track any Bluetooth device and display key information about each device being detected as well as the services device provided. BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
See also: Bluetooth, device, wireless, network, private area network, PAN, services, detecting, monitoring, security, vulnerabilities, discover, track, technology, administrator
LAN USB Controller 188.8.131.52
USB drive activities surveillance application provides real time monitoring of multiple connected external USB storage devices at client machine in windows LAN. Pen drive monitoring software support all USB media including memory card and provide instantly sound alert notification when USB connect to system and create log details of USB manufactures name, hardware ID, client machine name, IP address and USB storage capacity in text file format.
See also: USB, device, data, monitor, analyze, file, folders, transfer, block, storage, permission, display, theft, information, leakage, traffic, steal, network, protection, protect, LAN, view, port, move, store, security, record, log
CybSecure is an internet filtering and application blocking tool. CybSecure blocks access to illegal file downloads and it also provides you increased protection with its EXE and Window Blocker which will prevent the usage of mis-usable software. The Device Security feature provides you with additional protection against data theft by blocking USB and other storage devices which are a threat to company?s sensitive internal data.
See also: email filter, web security, parental control, internet security, web security, network security, application blocking, window blocking, exe blocking, Restrict window, Restrict usage of device, Device Blocking, Block USB Port, URL Filtering
USB Drive Disabler Tool 184.108.40.206
USB data theft protection application automatically maintains log file in text or HTML format and provides USB device detailed information. Software also provides facility to user to enable or disable access permission of any USB drive storage media within LAN network. USB drive disabler tool monitors multiple computer system simultaneously within local area network. Pen drive blocker utility supports all windows operating system including VISTA.
See also: USB, drive, disabler, data, theft, protection, network, store, log, record, information, move, folders, manage, security, block, file, prevent, transfer, permission, detect, local, network, monitor, port, leakage, device
USB Data Leakage Protection Software 220.127.116.11
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance tool facilitate administrator to block or change different access permission of USB port and log connected USB disk information with machine domain name, IP, storage capacity, manufacture details etc.
See also: steal, LAN, network, leakage, analyze, theft, protect, USB, record, permission, security, device, block, log, folders, move, data, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage
CD-Door Guard 3.2
CD-Door Guard is utility designed to prevent crash of your computer's CD/DVD/Blu-ray drive. CD-Door Guard provides effective protection for such kind of devices and helps you to save money. How? You won't pay for a new DVD drive if your old one is working correctly.
See also: DVD, protect, lock, unlock, guard, device, door, crash, drive, tray, CD-ROM, DVD-ROM, Blu-ray, HD-DVD, DVD-RW, optical, security
Pen Drive Blocking Software 18.104.22.168
Pen drive blocking software ensures full security to important data and files transfer, captures each and every performed operation (cut, copy, paste) on your system or client network using USB drive. Removable drive data leakage protection tool supports all USB media such as digital cameras, mp3 players, iPod, mobile phone, memory stick etc. Software facilitates with beep sound alert on system when unauthorized USB drive connected to network.
See also: USB, device, data, theft, protection, record, network, file, leakage, control, LAN, security, access, permission, pen, drive, blocking, log, unauthorized, removable, media, activity, monitor, information, transfer
Protegent 360-Complete Laptop Security 12
Port Locker - We are providing laptop tracking software, laptop theft, notebook theft, laptop data security, notebook data security, notebook tracking, lost laptop, laptop travel security, locate stolen laptop.
See also: Complete Laptop Security, Protegent PC Complete Laptop Security, Laptop Security Locks, Unistal Laptop Data Security, Laptop Security Products, Free Data Recovery Software, Laptop Security Device, Data Recovery Freeware, Laptop Encryption, Laptop Se
Protegent PC - Complete PC Security 12
Protegent PC Software For Desktop Data Security design to provide compete security solution to Desktop users.
See also: Complete Desktop Security, Protegent PC Complete Desktop Security, Desktop Security Locks, Unistal Desktop Data Security, Desktop Security Products, Free Data Recovery Software, Desktop Security Device, Data Recovery Freeware, Desktop Encryption
uHook Enterprise Device Control 4.4.1
uHook Enterprise Device Control lets you control and manage the access of removable media devices such as USB sticks, CDs, DVDs etc in your business network from one single place. uHook Enterprise is meant for businesses, where it is not possible to track who is copying business critical information on removable media devices.
See also: endpoint, security, usb, monitor, disk, ipods, camera, protection, device, control, dlp, enterprise, data, loss, prevention, dvd, block, protect
PHP Processor 22.214.171.124
PHP Processor is designed to help you protect your intellectual property when distributing PHP source files. The other use for PHP Processor is to optimize PHP source code and considerably decrease size of your source code files. PHP Processor provides a fast, intuitive way to obfuscate your PHP source code. Both variable and function names can be replaced with meaningless strings making your code difficult to read and alter for a third party.
See also: comments, code, backup, FTP, analyse, processor, security, PHP protect editor source analyse processor security FTP backup code comments, PHP, protect, source, editor
Complete Internet Cleanup Pro 3.0.1
Complete Internet Cleanup is a utility to erase your Internet tracks. All your Internet traces are logged to index.dat files and deleting Cache, Cookies and History does not clear the contents of index.dat files. Additionally deletes the typed URLs, user names, passwords, Internet plugins, etc. Complete Internet Cleanup is also a utility to help running your PC faster by removing Windows junk files.
See also: index.dat, cookies, internet, web, security, delete, clean, clear, erase
Acid Scanner 1.0
Acid Scanner is advanced monitoring tool that allow administrators or common users scan their networks for possible security risk and uncover unprotected ways to their computers. It offers many tcp/ip utilities in one program: shared resource scan, ping scan, port scan, traceroute, advanced terminal (tcp/udp session, traffic logging), netbios info, remote resource mounting, results exporting and much more...
See also: telnet, traceroute, ping, udp, tcp, port, shared resource, monitor, security, free, scanner, acid, acidscanner, terminal
MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom) web-server scripts, full identification of RPC services and more.
See also: network security scanner
YGS Password Manager 2006.06
This is simple manager for not safe keeping passwords. It help you keep passwords for numerous web accounts (for example when you submit your software everywhere). There are search, edit, delete and add functions in this manager. All data to be kept not in code in passman.txt (in same directory with passman.exe).
See also: security, generator, password
Argus Surveillance DVR 1.6
The program designed for security hybrid platforms working simultaneously with IP cameras, USB cameras, and capture cards. It produces MPEG-4 coded video and completely controllable remotely that surveillance computer can be operated with no monitor, keyboard, and mouse. The program performs "cyclic" recording that the "disk full" situation never occurs. Video playback is synchronized for event analysis from multiple cameras simultaneously.
See also: CCTV, SECURITY, CAMERA, DVR, SURVEILLANCE
1-abc.net Password Organizer 6.00
These days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning secure password management, a random password generator, own encryption engine, txt export..
See also: manager, manager, organize, un-allowed, shield, encryption, encrypt, hide, hidden, secrecy, secret, messenger, eBay, credit card, PIN, login data telephone, login, privacy, personal, private, to secure, access data, Security, Passwords, password