|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
Security Zone Manager 1.0
Security Zone Manager is the first internet security tool to unleash the power of Microsoft Internet Explorer security zones. You can easily identify insecure websites and move them to the restricted zone with just one click. The integrated configuration assistant helps you securing your surfing environment. While surfing the web you confirm any ActiveX usage. You can easily identify advertising providers and move them into the restricted zone.
See also: sites, internet, trusted, restricted, speed, Microsoft, privacy, security, online, zones
FFGuard is a secure and easy to use program that lets you password-protect and easily prevent access to your important files and folders that may be your privacy. It can lets you specify which programs are still able to access protected items, such as virus scanners or disk drive utilities. A protected folder and its contents will be prevented from being renamed, modified, deleted, copied, moved, accessed or even seen on the system.
See also: Folde, file, protection, hide, lock, privacy, security, password, trusted program
2Peer is a free application that lets you create your own Private Internet network with your friends & family. You can easily edit and resize a batch of photos and create albums or slide shows and share them from your computer with people you trust - privately, safely, and securely. There are no limitations - bandwidth, storage, file size - ever! Because it is your own Private Internet! Get it now at 2Peer.com!
See also: Private Internet, File Sharing, Social Network, Virtual Private Network, Peer-to-Peer, P2P, Photo Sharing, Photo Editing, Create Slide Shows, Privacy, Friend-to-Friend Networks, Private Chat, Security, Free, Trusted Networks
XMicro Personal Firewall 220.127.116.1172
XMicro Personal Firewall is designed to protect your PC against attacks from the internet via a local area network and supports multiple adapter configurations. It allows you to apply rules and prompts you for required actions when it detects an unknown packet. It monitors any Internet connection in real time and prevents any unauthorized traffic. Real time traffic monitoring enables you to react instantly to threats and also helps you identify
See also: Trusted Zone, Security, Denied Hosts, Global Lock, Program control, Internet connection