Proactive Security Auditor FE 1.1.0
Proactive Security Auditor FE (Freeware Edition) is a free, small, fast and easy to use program to assist Windows(R) system administrators and ordinary users to keep their computers secure by identifying what security updates are installed on local and remote machines, and allowing to download and install missing patches from Microsoft web site.
See also: audit, vulnerability, patch, patches, update, updates, administrator, security, network
Network Security Map Poster 2006
All in one chart displays the network security risks in association with specific protocols, the most up-to-date security technologies and protocols, and the product solutions such as AAA solutions, firewalls, IDS/IPS, VPNs, as well as Anti-Virus Anti-Spyware/Anti-Adware Anti-Spam/Anti-Phishing systems. All security problems, technologies and solutions are well illustrated in the OSI 7-layers model and TCP/IP 4 Layers model.
See also: network vulnerability, network security, computer security, internet security, information security
Proactive Password Auditor 1.60
PPA is a password security test tool that's designed to allow Windows systems administrators to identify and close security holes in their networks. It helps secure networks by executing an audit of account passwords, and exposing insecure accounts. The software features brute-force and dictionary attacks on password hashes, effectively optimized for speed, and can also use pre-computed hash tables that allow to find most passwords in minutes.
See also: audit, recover, recovery, vulnerability, password, administrator, security, network
SecureCentral ScanFi Free Edition 4.1
ScanFi is a web-based vulnerability management software for detecting, assessing and remediating network vulnerabilities across heterogeneous networks. ScanFi discovers, scans, reports and supports vulnerability remediation. It features both scheduled and on-demand vulnerability scanning capabilities, based on comprehensive vulnerability database collated from multiple sources and vendors that is constantly kept up-to-date.
See also: Network Security Tools, Vulnerability Assessment Software, Vulnerability Scanner, Port Scanner, IP Scanner, Vulnerability Reports, Vulnerability Remediation, Vulnerability Management, Security Scanners, Vulnerability Management Software, Vulnerability Assessment
ContraVirus is able to detect and protect against a verity of Spyware, Adware, Trojans and other Malware. After removing existing infections, it uses its SpyWall feature, which will protect against infections before they make their way into your PC.
See also: live monitor, Spam, Adware, Keystroke Monitors, System Monitors, Trojan Viruses, Security Disablers, Browser Hijackers, Page Hijackers, firewall, security breach, security vulnerability, trojan, virus, spyware, adware, spyware threat, spyware monitor
Sax2 Intrusion detection system(Free) 3.0
Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network.
See also: intrusion detection, intrusion prevention, intrusion detection system, IDS, intrusion prevention system, IPS, intrusion detection software, intrusion prevention software, internet security, information security, network security, internet threats, vulnerabilities, vulnerability management, regulatory compliance, managed security services, security research, security appliance, security software, NIDS
WebCruiser - Web Vulnerability Scanner 2.3.3
WebCruiser - Web Vulnerability Scanner, a compact but powerful web security scanning tool that will aid you in auditing your site! It has a Vulnerability Scanner and a series of security tools. It can support scanning website as well as POC for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc. So, WebCruiser is also an automatic SQL injection tool, an XPath injection tool, and a Cross Site Scripting tool!
See also: WebCruiser, Web Vulnerability Scanner, SQL Injection Tool, SQL Injection Scanner, SQL Injection, Cross Site Scripting, Web Security
GFI LanGuard 2012 SR1
GFI LanGuard gives you a complete picture of your network setup and helps you maintain a secure network state. It is a patch and vulnerability management solution which allows you to scan, detect, assess and rectify security vulnerabilities on your network. This is what is required to help comply with regulations such as PCI-DSS. It automates the essential task of patch management freeing up time for your staff and maximizing network uptime.
See also: security, security scanner, security scanning, vulnerability scanner, patching, network security, network monitor, network, port scanner, vulnerability scanning, server packs, hotfix, languard
Dekart Logon for Citrix ICA Client 2.02
Stop memorising logins, passwords, Citrix servers and manually entering them; store all your Citrix connections on one USB flash drive, smart card, or token; enjoy automated access - simply insert the USB drive and pass convenient identification. An easy to use and convenient way to making the login to Citrix MetaFrame Presentation Server sessions fast and secure. Biometrics enabled (optional). No passwords being lost, forgotten or stolen.
See also: Citrix login, user authentication, biometric authentication, security Citrix, security device
Secure Hive 126.96.36.199
Secure Hive is a powerful tool for secure archiving and sharing of files. It enables you to create encrypted archives and self-extracting .exe files for secure storage and file sharing.
It also includes a simple but powerful means of encrypting parts of, or entire, documents, email messages, etc.
Secure Hive offers the enterprise a method of:
Securing sensitive documents
Protecting information during transfer
See also: encrypt, Office, email, file encryption, file protection, security, compression, encryption, secure file transfer
VeriFinger Extended SDK Trial 5.0
Multiplatform fingerprint identification SDK with biometric ActiveX clent/server components for rapid application development. Matching speed up to 40,000 fingerprints per second. Supports 20+ major scanners and sensors on Windows, Linux and Mac OS X. Includes programming samples in C, C++, C#, Java, Visual Basic 6, VBA and Delphi 6. The trial requires constant internet connection and Microsoft Visual C++ 2005 Redistributable Package (x86).
See also: pattern recognition, access control, recognition, authentication, SDK, ridge, crime, scan, security, biometric, verification, matching, identification, recognition, fingerprint, criminalistics
SourceGuardian PHP Encoder 5.5
SourceGuardian Encoder the ultimate protection solution for you to encode your PHP scripts. Now with full native bytecode encoding, time limiting scripts, IP and domain locking. The most comprehensive and user-friendly protection solution on the market.
See also: php security, php protect, source code protect, encrypt php, php encoder, php encode, intellectual property protection
Easy SMTP Server 2.52
Send e-mail messages easily and securely from your portable PC while you are traveling around the world! Using this program instead of your ISP's SMTP server you will increase your e-mail security and privacy as well as get rid of annoying change of settings for your e-mail program. Easy SMTP Server is easy to configure!
See also: smtp, easy, server, send, messages, portable, servers, security, purchase, privacy, multitude, isp, internet, instead, fast, download, different, connections, configure, concurrently, change, working, version, user, try, traveling, supports, support
Scam Sensor for Outlook 2.0
Scam Sensor is a Microsoft Office Outlook add-in that examines every e-mail message you read and
notifies you if the message is a phishing scam. It does not use any online databases of fraud e-mails or forged hyperlinks. Instead, the program uses a set of special algorithms which use information received from an e-mail message to determine whether the message tries to cheat the reader. No training needed. Install Scam Sensor and feel safe.
See also: email, phishing, scam, spyware, spam, security, privacy
My Notes Center 1.4.3
E-Organizer and personal information manager jam-packed with features like an overstuffed sandwich. Store personal notes, e-mails, web links, phone numbers, addresses, even credit card numbers safely and securely. Use it as text editor and word processor for working on various projects or as a personal notebook with convenient tree-like structure of your records. The program comes with printing options, encryption support and file compression.
See also: tree-outline, security, privacy, encrypt, making notes, organizer, PIM, information keeping, notes, tree-structured
Maple Professional 6.2
Maple Professional is the flagship of the tree outline managers for power users. It enables you to create hierarchical trees for storing information such as documents, notes, and images. You can create unlimited nodes and sub-nodes and assign any document to each node. You can easily create a backup copies of your trees with a backup system and encrypt confidential documents. It supports rich text formatting as well as drag-and-drop.
See also: tree, organizer, notes, information, security
CHM2PDF Pilot 2.10
CHM2PDF Pilot converts chm into PDF files. The program supports command line, PDF security options, password protection mode (using 40-bit and 128-bit encryption keys), fonts embedding, and different compression modes. Using batch mode, you can convert several documents simultaneously. The program has Explorer-like interface.
See also: pdf, convert, chm, documentation, password, protection, security
File Lock DLL Device Driver 1.0
FOBS based device driver designed primarily to hide or deny access to files, folders and registry keys on the Microsoft Windows family of operating systems (Windows NT-based systems, including Windows 2000 and Windows XP). It provides the ability to completely hide the presence of an application and discourage tampering. Allows you to create applications with components for desktop, CD or DVD PIRACY lock.
See also: registry tweaks, filelock, File Folder Security, File System Drivers XP, FAT Security, NTFS Security, fobs drivers, device drivers, norton, file lock, folder lock, file spy, folder spy
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: attendance, access control, authentication, identification, security, password, fingerprint, toolkit, biometric, recognition, matching
1st Network Admin 1.61
Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download