Dekart Logon for Citrix ICA Client 2.02
Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. An easy to use and convenient way to making the login to Citrix MetaFrame Presentation Server sessions fast and secure. Biometrics enabled (optional). No passwords being lost, forgotten or stolen.
See also: Citrix login, user authentication, biometric authentication, security Citrix, security device
Secure Hive 220.127.116.11
Secure Hive is a powerful tool for secure archiving and sharing of files. It enables you to create encrypted archives and self-extracting .exe files for secure storage and file sharing.
It also includes a simple but powerful means of encrypting parts of, or entire, documents, email messages, etc.
Secure Hive offers the enterprise a method of:
Securing sensitive documents
Protecting information during transfer
See also: encrypt, Office, email, file encryption, file protection, security, compression, encryption, secure file transfer
VeriFinger Extended SDK Trial 5.0
Multiplatform fingerprint identification SDK with biometric ActiveX clent/server components for rapid application development. Matching speed up to 40,000 fingerprints per second. Supports 20+ major scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Java, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: pattern recognition, access control, recognition, authentication, SDK, ridge, crime, scan, security, biometric, verification, matching, identification, recognition, fingerprint, criminalistics
SourceGuardian PHP Encoder 5.5
SourceGuardian Encoder the ultimate protection solution for you to encode your PHP scripts. Now with full native bytecode encoding, time limiting scripts, IP and domain locking. The most comprehensive and user-friendly protection solution on the market.
See also: php security, php protect, source code protect, encrypt php, php encoder, php encode, intellectual property protection
Easy SMTP Server 2.52
Send e-mail messages easily and securely from your portable PC while you are traveling around the world! Using this program instead of your ISP's SMTP server you will increase your e-mail security and privacy as well as get rid of annoying change of settings for your e-mail program. Easy SMTP Server is easy to configure!
See also: smtp, easy, server, send, messages, portable, servers, security, purchase, privacy, multitude, isp, internet, instead, fast, download, different, connections, configure, concurrently, change, working, version, user, try, traveling, supports, support
Scam Sensor for Outlook 2.0
Scam Sensor is a Microsoft Office Outlook add-in that examines every e-mail message you read and
notifies you if the message is a phishing scam. It does not use any online databases of fraud e-mails or forged hyperlinks. Instead, the program uses a set of special algorithms which use information received from an e-mail message to determine whether the message tries to cheat the reader. No training needed. Install Scam Sensor and feel safe.
See also: email, phishing, scam, spyware, spam, security, privacy
My Notes Center 1.4.3
E-Organizer and personal information manager jam-packed with features like an overstuffed sandwich. Store personal notes, e-mails, web links, phone numbers, addresses, even credit card numbers safely and securely. Use it as text editor and word processor for working on various projects or as a personal notebook with convenient tree-like structure of your records. The program comes with printing options, encryption support and file compression.
See also: tree-outline, security, privacy, encrypt, making notes, organizer, PIM, information keeping, notes, tree-structured
Maple Professional 6.2
Maple Professional is the flagship of the tree outline managers for power users. It enables you to create hierarchical trees for storing information such as documents, notes, and images. You can create unlimited nodes and sub-nodes and assign any document to each node. You can easily create a backup copies of your trees with a backup system and encrypt confidential documents. It supports rich text formatting as well as drag-and-drop.
See also: tree, organizer, notes, information, security
CHM2PDF Pilot 2.10
CHM2PDF Pilot converts chm into PDF files. The program supports command line, PDF security options, password protection mode (using 40-bit and 128-bit encryption keys), fonts embedding, and different compression modes. Using batch mode, you can convert several documents simultaneously. The program has Explorer-like interface.
See also: pdf, convert, chm, documentation, password, protection, security
File Lock DLL Device Driver 1.0
FOBS based device driver designed primarily to hide or deny access to files, folders and registry keys on the Microsoft Windows family of operating systems (Windows NT-based systems, including Windows 2000 and Windows XP). It provides the ability to completely hide the presence of an application and discourage tampering. Allows you to create applications with components for desktop, CD or DVD PIRACY lock.
See also: registry tweaks, filelock, File Folder Security, File System Drivers XP, FAT Security, NTFS Security, fobs drivers, device drivers, norton, file lock, folder lock, file spy, folder spy
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: attendance, access control, authentication, identification, security, password, fingerprint, toolkit, biometric, recognition, matching
DOLeye is a Universal Multimedia Application (Home/Office Security System plus TV/Radio Tuner). DOLeye works with Digital Video/Photo Cameras, Web Cameras, CCTV Cameras, TV Tuner cards, Video Recorders and can be used for
1. organizing home/office security
2. watching broadcast or cable TV, listening FM/AM Radio
3. creating Home Videos/Photos
4. dialing faces of VHS and audio cassettes.
See also: DOLeye digital camera video CCTV web security system supervising motion detection DVR tv tuner radio fm cable broadcast photo recorder VHS audio AVI player
Sentry locks down your computer on demand so it stays secure when you aren't using it. No other programs can be opened, no browser history snooped at, and nobody will be touching your files while you're gone. Sentry even takes messages from people who dropped by while you were away. The program appearance is customizable, and can be quickly deployed to a USB flashdrive, floppy disk, or CD to quickly lock any public workstation you may use.
See also: usb, security, password, screen, screensavers, screensaver, secure, lock, policy
Nsasoft Network Traffic Emulator generates IP/ICMP/TCP/UDP traffic from clients to server to stress test servers, routers and firewalls under heavy network load. It is a very simple and fast program which can simulate client activity. The tool is designed with a user-friendly interface and is easy to use.
See also: information security, enterprise security, computer security, network security, network utils, network software, network tool, stress test, firewalls, routers, traffic generator, internet scanner, internet security, network attack, security software, freeware
Email Security Bulldog 1.2.1
Security Bulldog protects you against all dangerous email content including viruses, scripts, popups, webbugs, spyware, hoaxes and more.
No updates are required, you pay a one time fee of only $40.
Compatible with all existing email scanners.
Whereas most anti-virus programs only scan for known viruses Security Bulldog removes all content not known to be safe.
Take the FREE email security test at: www.Apocgraphy.com/SecurityTest
See also: worm, phishing, hoax, eudora, outlook, privacy, security, anti-virus, attachment, antivirus, virus, email
ProxyInspector for ISA Server 2.6g
With information becoming the greatest value of modern era, finding a way to control data flow is essential step towards predictable business operation. ProxyInspector takes advantage of innovative data processing technology analyzing Microsoft ISA Server log files and generating visually-rich self explanatory reports on virtually every aspect of corporate Internet usage. Learn what's going on your network! Download FREE trial now!
See also: site, firewall, proxy, report, log, traffic, monitoring, Microsoft, security, Internet, ISA
Permission Analyzer 1.4.4
Manage your network user rights and enhance the network security. Permission Analyzer gives you an overview of the access rights per user or user group. Permission Analyzer can also give you an overview of the software installed on each workstation.
See also: Permissions, network, directories, users, security, installed
File Security Manager 18.104.22.168
This program allows you edit access rights for users and groups (advanced file and folder permissions), change owner of the files, view effective permissions in Windows XP Home. Interface of the program is like XP Pro Access Control editor. The program includes even more useful features: Security Wizard, Secure deletion. Get the power of Win XP Pro. And... Make your Windows XP Home like windows XP Professional Now - Get File Security Manager.
See also: rights, user, prevent, lock, secure, tab, security, Permissions assignment, Deletion, Wipe, Secure, File System, File management, Permissions, XP Home Edition, Home, Laptop, Access Control, Security, NTFS, securing, remove, restrict, deny
Monitor ALL programs running on your computer. Prevent unauthorized activities. Keep an eye on our compact, easy-to-read window to detect all Windows applications and processes. Much more thorough than Windows Task Manager; you will see programs you had no idea were running on your PC! Save reports or logs to text files any time. Detect adware, spyware, trojans, popup ads, and viruses. Nothing can remain hidden! Recover speed and wasted memory.
See also: windows application, security, popup ad block, worm, trojan, virus, spyware, adware, windows process, freeware
1st Network Admin 1.61
Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download