Subscribe: Security shareware freeware adware software downloads
http://www.brothersoft.com/rss/security.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
access  computer  data  file  files  internet  password  security  software  system  user  virus  windows windows  windows 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Security shareware freeware adware software downloads

Security shareware freeware adware software downloads



Security software download - Security freeware shareware downloads.



Published: Mon, 14 Feb 2011 20:37:41 GMT

Last Build Date: Mon, 14 Feb 2011 20:37:41 GMT

Copyright: Copyright 2007, brothersoft.com
 



Children's Care
(image) Limit the time and the way your children spend on the computer Children's Care is a unique combination of obligatory limitations and colorful cartoon illustrations, performed by cute animal heroes. This software ensures a friendly, but yet controlling approach towards children, being at the same time educational and amusing. Children's Care focuses on 6 important issues concerning computer usage by children: - Limits the time and duration of computer usage - Ensures regular breaks - Ensures good computer posture - Encourages proper and regular hydration - Prevents from dry eyes problems - Encourages development of proper attitude to personal healthcare and social sport activities Tag:parenting software kids children parental control time limit computer time time control limit PC time limit time cartoon internet timer dry eyes computer posture body hydration parents access control health health-care



TT Livescan
Online malware scanner limited only by internet latency. As of 5/11/2009, the database has well over 3.5 million definitions. In order to enable plugin support, simply use tweak.exe, copy/paste the install path and change the //disabled parameter to //enabled. Tag:Antivirus Antispyware Antimalware



Internet Access Controller
(image) Internet Access Controller is a leading software tool for controlling, blocking web sites and restricting internet & network access. Internet Access Controller can restrict internet access at specified times or on demand. You can password protect an internet connection. Protect your computer from viruses, trojans, worms that can be contracted from malicious websites or programs. Great for parental control or to prevent employess from inappropriate internet usage. You can block, limit or allow which programs and services have access to the internet. The timer feature allows you to disable the internet connection after a specified amount of time. IAC gives you complete control over your computer's network connection. Key features and benefits - Restrict internet and network access automatically at specified times - Password protect internet and network connection - Enable and disable internet on demand - Allow internet access for a specified amount of time - Allow only specified services or programs such as e-mail - Allow only specified web sites - Block specific web sites and allow the rest - Set daily internet usage limits applied to all users or only specific users - For Parents - Protect your children from the dangers of the web and limit online usage - For Businesses - Keep employees from online abuse at work Parents: Protect your children - Limit time spent online - Automatically turn off internet at night or at any other inappropriate time - Block harmful programs, such as chat and online games - Protect your computer from malicious websites or programs. Businesses: Increase employee production at work - Increase productivity by limiting temptation for inapporpriate web surfing. - Only allow websites needed for daily tasks. - Block unwanted websites or games. - Only allow access to programs such as email, file sharing and business related programs. Tag:Internet Access Control Restrict Block Limit Parental Control Software Internet Access Security Children Employees Kids Monitor



Folder Vault
(image) Folder Vault lock, hide, securely encrypt and protect files and folders in the blink of an eye. With one master password FolderVault will protect your files, folders and even entire drives from being viewed, deleted, renamed, removed or accessed. Encrypt and hide your folders, files, pictures, documents in a flash. Folder Vault has advanced features such as "Stealth-Mode", allowing the user to run the program completely hidden to prevent other snoopers from even knowing it exists. Folder Vault uses advance security features allowing you to hide your folders and files from Windows, Dos and even Safe Modes. Encrypt your files and folders in your "Vault" using 256 bit Advanced Encryption Standard (AES), also known as Rijndael, a block cipher adopted as an encryption standard by the U.S. government... Use Folder Vault's Log feature to view malicous login attempts. Other features of Folder Vault include: Auto Protect and close your vault, Auto-Shutdown your PC, Erase recent document history, Auto-Empty Recycle Bin, Clean Internet Explorer History, Clear Internet Explorer Address Bar History, Erase Internet Explorer Temporary Internet Files & Cookies, Can't be uninstalled without the owners permission, Hide from Add Remove Programs. Folder Vault can also be used to lock/ hide individual programs on your computer from being run, accessed or used. Block access to your email program such as Microsoft Outlook. Simply lock the Outlook program directory to secure it. Want to lock your Microsoft Internet Explorer favorites from being viewed or used? Simply lock the favorites folder and they will not show up in your browser application. Stealth mode features of FolderVault: -Hides from Add Remove Programs -Hides all shortcuts from Desktop, Startmenu -Hides the program folders -Hides from the taskbar -Hides from Alt > Tab Menu -Hides from Task Manager running process list -Assign a HotKey combination to bring it back up Tag:folder lock Folder Vault Hide Folders Files Lock Folders Files Privacy Software History Eraser Software



The Cleaner 2011
(image) The Cleaner protects, prevents and recovers your system from malicious software and is considered one of the best anti-virus programs, deleting malware that is often missed by other virus removers. The Cleaner 2011 Super fast - scan your computer in as little as 2 minutes Huge database Advanced heuristics - detect new and emerging threats Advanced recovery procedures World-class User Interface - multiple languages supported Daily database updates Over 12 years of proven reliability Compatibility with all anti-virus programs Affordable Supports Windows2K/XP/Vista/Windows7/Server 32bit and 64bit! Tag:pc cleaner microsoft registry cleaner cc cleaner cleaner trojan cleaner user interface THE CLEANER virus remover database update cleaner pro cyberdefender registry cleaner spam cleaner quusoft junk cleaner avs registry cleaner



Dr.Web CureIt!
(image) CureIt! is a FREE anti virus and anti spyware scanner based on the Dr.Web best of breed engine with the most up-to-date add-ons to the Dr.Web virus bases. As hundreds new viruses appear and spread in hours around the world daily, CureIt! with the newest definitions to the virus bases is re-built several times every day. CureIt! will help you quickly scan and cure, if necessary, a computer operated by MS Windows 95OSR2/98/98SE/Me/NT4/2000/XP/2003/2003R2/Vista without installation of the Dr.Web Anti-virus. The utility supports 28 languages: Russian, Arabic, Armenian, Bulgarian, Byelorussian, Chinese (China), Czech, Dutch, English, Esperanto, Estonian, Finnish, French, Georgian, German, Greek, Hungarian, Italian, Japanese, Korean, Latvian, Lithuanian, Persian (Farsi), Polish, Portuguese, Slovak, Spanish, Ukrainian. Dr.Web CureIT! detects and removes *Rootkits * Mass-mailing worms * E-mail viruses * Peer-to-peer viruses * Internet worms * File viruses * Trojans * Stealth viruses* Polymorphic viruses * Bodiless viruses * Macro viruses * MS Office viruses * Script viruses * Spyware * Spybots * Password stealers * Paid Dialers * Adware * Riskware* Hacktools * Backdoors * Keyloggers* Joke programs * Malicious scripts * Other malware* This software also supports the following language version:English,Arabic,Chine. Tag:dr.cureit dr. web dr.web .com dr.web dr web dr. web 4.4 dr web 4 dr.web.com dr.web 5.0 dr.web antivirus crack dr. web antivirus antispyware antispam anti-virus tool anti-virus solution anti-virus software anti spam



Noralabs Norascan
(image) Norascan is not any kind of anti malware product that you can find on the internet. We difference a lot from the competition. - The way we scan and interprete bad files. - The way we verify if a file is malware or not. - We are not a signature based security product. Although we use signatues we ARE NOT depending on it ! Features Scan known and unknown malware no need to reboot after installation Works together with other anti malware software Can scan in Windows safe mode very fast and new technology of scan engine auto update of signatures and new program versions Dual scanning and in the cloud scanning First Pattern Wave scanner Freeware Tag:safe mode anti malware auto update e scan windows safe o up scan in new tech security product program version



Norman Malware Cleaner
(image) Norman Malware Cleaner is a Norman program utility that may be used to detect and remove specific malicious software (malware). Note that it should not be used as a substitute for running normal proactive antivirus protection, but rather as a reactive tool to handle systems that are already infected. By downloading and running the program below it will clean an infected system completely: * kill running processes that are infected * remove infections from disk (including ActiveX components and browser helper objects) * reveal and remove rootkits * restore correct registry values * remove references created by malware in hosts file * remove windows firewall rules for malicious programs norman foster, norman hyde. Tag:malware microsoft registry cleaner pc cleaner cc cleaner cleaner trojan cleaner malware removal malware protection malware defense symantec malware cleaner cyberdefender registry cleaner spam cleaner



Anti Trojan Elite
(image) Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory. Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time before it starts. The ATE can detect more than 55000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time. Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all processes; The registry repair utility can been used to repair registry altered by malware; The registry monitor utility can been used to repair any change of important registry keys and values with real time. Tag:Anti Trojan Trojan Remover Anti Trojan Elite kill trojan clean trojan scan trojan remove spyware spyware remover kill spyware clean spyware scan spyware trojan scan virus virus scan pc protect pc guard trojan remover trojan hunter serial trajan



Nmap
(image) Nmap and Zenmap (the graphical front end) are available in several versions and formats. Recent source releases and binary packages are described below. Older version (and sometimes newer test releases) are available from the dist directory (and really old ones are in dist-old). For the more security-paranoid (smart) users, GPG detached signatures and SHA-1 hashes for each release are available in the sigs directory (verification instructions). Before downloading, be sure to read the relevant sections for your platform from the Nmap Install Guide. The most important changes (features, bugfixes, etc) in each Nmap version are described in the Changelog. Using Nmap is covered in the Reference Guide, and don't forget to read the other available documentation, particularly the new book Nmap Network Scanning! The Nmap executable Windows installer can handle WinPcap installation, registry performance tweaks, and decompressing the executables and data files into your preferred location. It also includes the Zenmap graphical frontend. Tag:windows installer e document nmap performance tweak platform from data f several versions graphical frontend graphical front binary packages network scan



SetClock
(image) Set PC Clock from an accurate atomic clock on the web. You can put in on your website so that others can use it to correct their clocks without having to install software or without you having to install software on your server. Java Web Start signed. Requires Java version 1.5 or later. Native code for Windows only. Full Java source code included, and native C JNI code. Tag:clock atomic clock synch setclock set clock accurate time



QPass
(image) QPass is password manager which can store your sensitive data crypted. It uses Qt4. The default algorithm is AES-256. Features: * It can stay in tray running so it can be always close at hand * uses AES-256 algorithm * multiplatform(tested on linux and windows) Tag:word manager password manager password manage linux and windows in tray sensitive data



CryptoExpert 2010 Professional
(image) CryptoExpert is on the fly disk encryption software. It creates big encrypted files on your hard drive. It is possible to open these files as usual hard drives looking like G:,H:,I:,J: and etc (this operation requires password authorization). You can work with files located on these hard drives from any program including Microsoft Word, Excel, Windows Media Player and etc. You can also move all your private movies from digital video camera to this encrypted hard drive. No limitations! Features: Multiple "virtual" hard drives in your system protected by password Strong encryption using AES 256 bit Support for huge encrypted drives 256 Gb and larger Two factor authentication support - strong passwords plus decryption keys located on any type of USB Memory Sticks Disk Firewall to protect private data from stealing Compatibilty with Windows(R) Vista(R) 32 and 64 bit as well as XP 32 and 64 bit (Windows 2000 is also supported). Tag:microsoft word windows xp professional AutoCAD 2008 windows media player windows 2000 professional flash menu



CryptoExpert Lite
(image) CryptoExpert Lite is a free encryption software. It uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is read by CryptoExpert from the volume file, decrypted, and presented to the application trying to read the data. Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase. The latest version includes special tool to erase all personal traces on computer. Features Using powerful encryption algorithm to encrypt your data: CAST 128 bit Ability to create encrypted containers (files vault) up to 20 Megabytes in size Access to your files on virtual volume on the fly Mapping any free drive letter like G:, F:, K: for virtual volume Requires password authentication before the files become accessible Works with all Windows application - even DOS applications Really Fast Looks like normal hard drive Freeware! Tag:encrypt fly password protect encryption blowfish cast disk virtual drive volume shred wipe des container



CryptoUP
(image) CryptoUP is a 32Bit application running under all current Microsoft Windows operating systems for PCs only. CryptoUnPlugged was designed to code or decode any kind of file no matter what ingredient. This utility does not leave a trace in the encrypted file. The file size differs slightly compared to the original. This is quite normal and offers enhanced security. The whole power of this Application is in the key, the key extension and the key file, if desired. CryptoUP is not optimized to speed, but to security. Any possible opponent is invited to use CryptoUp without any disadvantage. There are several modes available, for example it is possible to use 'one time pad'. The manipulation of the FPU-Modes offers additional combinations. Hence it's not a method itself, only for the sake of compatibility. An other utility enables building of alphanumerical groups to five characters each often found on shortwave broadcasts. Use the Hash-function as a signature to ensure the file content is valid. CryptoUP has never been broken so far. But be careful no encryption method on earth has the one and only security. Use this program completely at your own risk and take care of your key. If you have lost it please sit down keep cool and pour a stiff drink. Tag:windows operating system operating system microsoft windows he man encrypted file f file operating syst no encryption not optimized rating systems windows operating systems



OhCrypt
(image) OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Triple DES. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. Features: * Easily encrypt and decrypt any file * Clean user interface * Lightweight and suitable for portable use * Cross-Platform Software Tag:user interface triple des encryption algorithm decrypt files decrypt file clean user interface clean user secure your data clean and simple simple interface



Encrypted RunAs
(image) Encrypted RunAs let users run restricted programs without having to make them members of the Power Users or Administrator groups Encrypted RunAs is a small tool that is created to make the job of Administrators a little easier, it can be used to run applications or software installations with access rights a standard user does not have. Why Encrypted RunAs? When you work with computers you will soon come across software that will not work with limited user rights. Normally you would have to either add the user to the administrators or Power User group or find why the software requires administrative rights in the first place, this could be due to many reasons ie, trying to access the local machine registry, registering a dll or ocx control etc etc. With Encrypted RunAs installed, a shortcut to an application can be created that uses an account on the local machine that has administrator rights. Therefore only giving rights that are required for the application to run correctly and not the whole machine. As an additional security factor, the program uses a CRC fingerprint, to make sure that the program launched is indeed the one that it was intended for, and also verifies the account. Encrypted RunAs also creates files that can be called from logon scripts. Tag:encryption software encryption tool file encryption folder encryption CRC fingerprint fingerprint ocx ocx control Administrators local registry



SilentEye
(image) SilentEye is a cross-plateform application design for friendly use of steganography, in this case hidding message into pictures. It's provides a pretty interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: Cryptography plugins: Allow application to encrypte data before hidding them, for exemple AES 128. Image format plugins: By default it's provided a BMP plug-in which allow you to save encoded images into .bmp files. (JPEG plug-in is on his way...) The simplest way to open an image is to drag and drop it on the main window of SilentEye. You can also use the clasic browsing system as well. Tag:drag and drop bmp file bmp files image format the sim application design use st easy integration s way aes 128 s pro



Protectorion
(image) Protectorion is the program for secure file management on your PC! Protect your files and folders with strong encryption. Manage and transport data securely between USB flash drives and hard drives. Create encrypted backup copies of your data. Give your files a description for immediate retrieval when required. Better organize your files by creating file versions. Send encrypted files via E-mail. Strong encryption Strong and quick encryption for all file types. Secure and recognized industry standard AES 256 bit. Encryption and decryption of folders and files with a mouse click. Secure Exchange and Backup Safe transportation and exchange of encrypted files. Strong encryption for file on USB flash drives and hard drives. Encrypted backup copies of all data. Encrypted E-Mails Send encrypted files as an e-mail attachment. automatically with a mouse click with your personal e-mail program. The encrypted attachment is protected with a unique code. Descriptions and Versions Describe files and folders with clear descriptive texts. Create versions for frequently used files. Automatic encryption of all descriptive texts and versions. Files and Templates Select and create new files from the file templates. Easy creation of a template collection for frequently used files. Automatic encryption of all new files and templates. Search and Find Search quickly and clearly with search result rating. Find files, descriptions and versions based on search criteria. Organize search results by dragging them to the appropriate folder. Tag:mouse click usb flash drive flash drive usb flash aes 256 bit file man file manage file management file managemen secure file use c encrypted e search and find mail pro easy creation



gpg4win
(image) Gpg4win is a installer package for Windows (2000/XP/2003/Vista) with computer programs and handbooks for EMail and file encryption. Both relevant cryptography standards are supported, OpenPGP and S/MIME (the latter is in progress and currently works with GnuPG2 and Claws Mail). The Gpg4win project aims at updating the Gpg4win Windows installation package with GnuPG encryption tool, associated applications and documentation on a regular basis. Especially the documentation (handbooks "Novices" and "Durchblicker") are directly maintained as part of the Gpg4win project. Another central aim is the united support of both relevant cryptographic standards, OpenPGP and S/MIME. This is work-in-progress, but should be finished by the end of 2007. Gpg4win is an international project. Due to the origin of the project and many members, German language is fully supported as well. Any additional translators are very welcome! The main difference compared to all other similar approaches (mainly GnuPP, GnuPT, Windows Privacy Tools and GnuPG-Basics) is that the first piece developed was the Gpg4win-Builder. This builder allows to easily create new gpg4win.exe installers with updated components. It runs best on a GNU/Linux system. Almost all products are even automatically cross-compiled for integration into the installer. With this concept it is hoped to good practical support to prevent quick aging of the installer package. Because updating is much easier and does not depend on a single person. Tag:file encryption e document windows installation german language r package installer package for windows for windo win pro x system fully supported c standard international project



CryptoLicensing For ActiveX 2011
(image) CryptoLicensing for ActiveX provides a robust, yet easy way to add licensing, copy-protection and activation capabilities to your VB6, VBA, RealBasic, Delphi, Borland, MFC, ATL, C++, etc applications, libraries, components and controls. CryptoLicensing for ActiveX uses the latest military strength, state-of-the-art cryptographic technology to ensure that your software and intellectual property is protected. CryptoLicensing offers the right balance of: Military-strength security Secure and unbreakable cryptographic licenses offer maximum protection to your software. Customer friendliness Easy on your customers. Hassle-free activation and hardware locking scheme. Flexibility Adaptable to suit your exact needs. Reliability We have been developing, improving and honing licensing schemes for all our products since years. We have expert domain knowledge in the area of licensing and copy-protection. Functionality Variety of licensing rules for the most common licensing scenarios. Cryptographic licenses for full versions of your software. Evaluation or trial versions. Online or manual activation and hardware locking. Network Floating licenses. On-demand licenses. Subscription licenses. And more! Tag:install activex control activex control activex printable 2011 calendar super bowl 2011 free 2011 calendar 2011 yearly calendar



Deskman
(image) Deskman is an advanced desktop security tool for administrators and power users. The New Deskman includes new profiles for fast deployment, Windows Vista support, new restrictions, new options and much more. Advanced Security Full control over keys, mouse and critical system options: Taskbar, Control Panel... Secure, Lock Desktops Deskman allows you to lock down PCs and restrict access the way you want. Simple Yet Powerful One button configuration. Advanced, yet accessible, desktop security. Deskman Features: * Computer Usage Restrictions -Desktop restrictions -Start Menu restrictions, configuration -Internet Explorer restrictions -Control Panel restriction -Taskbar restrictions -Windows Explorer restrictions * Advanced Desktop Security - Drive access protection -Disable USB drives -Disable Ctrl-Alt-Del (WinXP only) - Disable Alt-F4 -Disable all Winkeys - Disable Task Manager hotkey -Disable any key combination -Disable any mouse button -Build a new, secure Start Menu (WinXP only) -Kiosk Mode * Autorun Options -Add new entries -Block new entries -Enforce programs: make sure a critical program will be always running. * Desktop Lockdown -One-button desktop protection - Password protection -Leave notes on the desktop -Lock workstation * Security Profiles -Defaulft profile: Basic Protection -Defaulft profile: Limited Access -Defaulft profile: Advanced Protection - Defaulft profile: Internet Explorer Protection - Defaulft profile: Kiosk Mode -Add your own profiles * Advanced Setup - User exceptions - Autologon -Silent installation available - User profiles for fast deployment - Tight hotkey + password security system - No network connection required Tag:security windows microsoft windows ms windows security program secret secretly record secretly data program keystroke record keystroke network administrator answer questions make it easy web site computer usage warning message hidden usage informatio



DeviceLock
(image) Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity via Group Policy. Using endpoint data leak prevention (DLP) solution called DeviceLock®, network administrators can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, serial and parallel ports, PDAs and smartphones, local and network printers and many other plug-and-play devices. Once DeviceLock® is installed, administrators can control access to any device, depending on the time of day and day of the week. With DeviceLock® you can: Control which users or groups can access USB, FireWire, Infrared, COM and LPT ports; WiFi and Bluetooth adapters; any type of printer, including local, network and virtual printers; Windows Mobile and Palm OS-based PDAs and smartphones; aswell as DVD/CD-ROMs, floppy drives, and other removable and Plug-and-Play devices Selectively grant or deny access to certain true file types for removable media Control access to devices depending on the time of day and day of the week Define which types of data (files, calendars, emails, tasks, notes, etc.) are allowed to synchronize between corporate PCs and personal mobile devices Define different online vs. offline security policies for the same user or set of users Detect encrypted PGP® and TrueCrypt disks (USB Flash Drives and other removable media) as well as Lexar® SAFE PSD encrypted flash drives and apply special "encrypted" permissions to them Authorize only specific USB devices that will not be locked regardless of any other settings Tag:generate report generate report plug and play PnP USB FireWire Fire Wire PCMCIA Multi Document Interface MDI structure task audit result microsoft excel excel analysis review snapshot LDAP



AVG Internet Security
(image) AVG Internet Security 9.0 - 2 years for the price of 1 - Save 30%! Click Here Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office. Easy to download, install and use Protection against all Internet threats Real-time security while you surf and chat online Top-quality protection that does not slow your system down Free support and service around the clock and across the globe Compatible with Windows Vista and Windows XP All-in-one protection * Antivirus and Anti-Spyware: protection against viruses, worms, spyware, and trojans * Identity Protection: helps prevent identity theft * Anti-Rootkit: protection against hidden threats (rootkits) * Web Shield: screens downloads and IM for infections * LinkScanner: blocks poisoned web pages in real time * Anti-Spam with anti-phishing: filters out unwanted and fraudulent e-mails * Firewall: blocks hacker attacks * System Tools: tailor AVG for your particular needs Easy-to-use, automated protection AVG Internet Security gives you maximum protection with real-time scanning, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is analyzed to ensure nothing can get onto your system without your knowledge. Internet Security – prevention is better than cure AVG Internet Security provides multiple layers of protection to ensure nothing slips through. NEW Identity Theft Protection prevents new and unknown threats from stealing your personal information like bank and credit card details. Tag:avg avg security avg firewall avg anti viurs avg antivirus avg download avg spyware avg 7.5 avg 7 avg 7.0 avg grisoft anti virus antivirus anti worm anti spyware anti adware anti trojans anti spam AVG Anti Spyware



KeyFreeze
(image) KeyFreeze is a small, simple application designed to block your keyboard and mouse without "locking" the screen. So your kids can safely watch a cartoon or have a videochat with their grandparents and bang the keyboard as much as they want. Tag:the key chat with application design simple application k y small tool



Advanced Desktop Locker Home Edition
(image) Protect your desktop and prevent people from accessing your desktop icons and your private files. Advanced Desktop Locker (ADL) is an easy to use desktop protection software, you can lock your desktop with one mouse click. With this software no one can access your desktop or your important files, you can password protect your desktop and display custom message to any one click your desktop, our software record mouse clicks and invalid passwords input to enable you know if someone try to access your PC. You can password protect ADL options, set and change master password of the program easy, Advanced Desktop Locker allows you to create virtual desktop to prevent people from accessing your desktop icons and your private files, you can select from many virtual desktop and you can download more from our website for free. Advanced Desktop Locker prevent access to Task Manager, (CTRL+ALt+Del), (Alt+F4),.... When your Pc being locked to prevent people from closing the locker. You can lock your desktop by many virtual desktop types, you can use transparent locker, color locker and virtual desktop locker, you can customize each type of lockers easy. With this software no one can access your desktop icons, programs and documents, you will love our Advanced Desktop Locker software. Home Edition Limitation: Home Edition is a trial version of the program. Tag:desktop calendar 3d home architect alienware desktop theme desktop clock xp home edition desktop world clock home alone 2 mouse click avg home edition desktop memo pad



Cain & Abel
(image) Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it. Tag:password recovery password recover recover password password encryption encrypt password password decoder password calculator Microsoft Operating Systems network VoIP conversations SSH-1 HTTP APR Arp Poison Routing system security cryptanalysis



SpotFTP Password Recover
(image) SpotFTP Password Recover is Windows utility that offers administrators and users a comprehensive solution for recovering FTP passwords and other critical business information stored in users' computers. SpotFTP recovers FileZilla, WS_FTP, Far ftp client, CuteFTP, FlashFXP ftp, FFFTP, SecureFX ftp client, WebDrive, FTP Voyager, AutoFTP, 32bit FTP, FTP Now, FTP Navigator, CoffeeCup Direct FTP and FTP Control Passwords. If you forget your passwords or need to access some passwords or confidential information stored in your computer, SpotFTP can really help you to do it. All the mentioned features are provided with a user friendly graphical interface. Tag:ftp password recovery password recovery CuteFTP FileZilla CoffeeCup FTP Navigator FlashFXP SecureFX FTP passwords WS_FTP FTP Voyager AutoFTP FTP tools FTP software ftp server password encryption FTP manager



SpotIM Password Recover
(image) SpotIM Password Recover is a tool that is able to automatically find and decrypt the passwords of most popular Instant Messenger programs. The program recovers lost or forgotten passwords for ICQ, Trillian, Miranda, RnQ, Camfrog and Easy Web Cam instant messenger accounts. SpotIM is the best Instant Messenger password finder that instantly cracks and decrypts the passwords stored on computer. All major protocols are recognized (ICQ, AIM, MSN, Yahoo, Jabber, IRC), multiple profiles are supported. All the mentioned features are provided with a user friendly graphical interface. Tag:instant messenger password recovery password finder Password Recover icq Trillian Miranda IM AIM MSN Yahoo Jabber IRC CuteFTP Camfrog FileZilla CoffeeCup FTP Navigator Instant Messenger programs



Unlock Access MDE Design
(image) Unlock Access MDE Design unlocks MS Access MDE, ADE and ACCDE forms and reports for editing. If you have lost the original MDB/ADP/ACCDB file and need to make design changes to the application this is the ideal software tool. * The software securely unlocks the MDE applications allowing you to edit forms and reports in MS Access. There will be no damages to the MDE application; the original file is not written to. * Edit MDE forms and reports in MS Access like editing MDB/ADP/ACCDB files. * The code will continue to work the same way while the MDE application is unlocked and when you re-lock it later. You can change the way the application works using Access macros and expressions, but you can not change or view the VBA code. * There is no need to rewrite the application, lose time, money and introduce new bugs. Tag:microsoft access microsoft access 2003 access 2003 interior design logo design ms access landscape design motorola imei unlock garden design symbols colorful design



Remove PowerPoint Password to Modify
(image) Remove PowerPoint Password to Modify instantly and securely removes any password to modify from MS PowerPoint 2007 presentations.Remove PowerPoint Password to Modify There is no need to try to re-create your presentation, loosing you valuable time. · Passwords of any length and character set are supported and removed in seconds. · Secure password removal without damages to the file + automatic backup. · The software supports the PowerPoint 2007 file formats. Works on all MS Windows platforms including Windows 7. · Full money back guaranty for the unlike event of a failure. Tag:windows 7 powerpoint 2003 microsoft powerpoint yahoo password hack yahoo password hacking Remove WGA password finder yahoo password cracker powerpoint remove duplicate images my password generator netwrix password manager



Remove VBA Password
(image) Remove VBA Password instantly and securely removes any VBA password and unlocks locked VBA projects in MS Excel, Word, PowerPoint, Access, Publisher, Outlook, FrontPage and Project files. Remove VBA Password - Passwords of any length and character set are supported and removed in seconds. Intentionally (Excel VBA Lock ) or accidentally locked VBA projects are unlocked instantly. - Secure password removal without damages to the file + automatic backup. - The software supports Office 97 to 2007 file formats of all supported VBA host applications. Works on Windows 2000, XP, 2003, Vista and 2008. - Features include allowing you to view the VBA code in PowerPoint PPA (and PPAM) add-ins, removing of the protection applied with a high Office version in a lower Office version and repairing of some VBA project damages - Supports command-line usage for custom scripting. (Pro edition only) - Full money back guaranty for the unlike event of a failure. Tag:yahoo password hack yahoo password hacking remove wga password finder yahoo password cracker office 97 hotmail password cracker windows 2000 trillian password decrypter vba programming mdw password



ParseIT
(image) ParseIT is a handy and easy to use parser tool that will help you analyze transactional messages from raw data and logs. It provides a simple and effective way to fast parse and compare messages. The intuitive interface provides quick access to the fields of the message, their value and their description. Supported Protocols: ISO 8583 with one, two or three bitmaps. ISO 7816 (EMV). SPDH and derivatives. HEX, ASCII, BCD or EBCDIC format. LVAR, LLVAR and LLLVAR variable fields. TLV fields. Complex fields and sub-fields structures. Header and Trailer. Multiple messages formats versions. Here are some key features of "ParseIT": · Friendly interface. · Ready to use message format configuration file for Visanet, Banknet, SPDH, etc. · Message format configuration file can be easily edited to handle any message format. · Show parsing errors. · Compare two messages. Tag:quick access ds s friendly interface s form it pro



Sticky Password
(image) Try the intelligent password manager that works with all popular web browsers and usual programs. The first and foremost advantage of Sticky Password is the fact that it works with web forms and dialog windows of regular applications. Most password keeping applications are adapted for web environment only, and many work properly only with Internet Explorer. Another advantage of Sticky Password is an unique and innovative "password protector" feature. The program constantly watches on how the passwords are used on the computer. Password protector is effective to prevent keylogger and trojan-horse attacks. The complete list of features: * Password protector prevents phishing. * The passwords are stored in a strongly encrypted database. * Can work from portable device. * Private information easily associated (sticked) to any program window or WEB page. An intelligent feature will automatically retrieve password for you. * The passwords and other fields are filled automatically to the appropriate fields of usual applications and web pages. * Multiple logins and password for single account. * Microsoft Windows user accounts support: each computer user has own passwords database. * Ease of use: two steps to add password to the database and only one step to retrieve the it! * Simple interface: user usually works with single control on the screen. * The strong passwords generator: be safe with unpredictable passwords. * Automated backup of passwords database: you can restore modified or deleted passwords on any day and at any time! * Automated security: the database is locked automatically after the specified timeout. You can unlock it again only by entering the master password. * Simplified collaboration: you can export passwords to different file formats and merge them with other accounts. * Easy search: you can search for your password by any keyword. Tag:



Maftoox Anti Virus
(image) Maftoox ANti Virus provides a package of applications that aim to protect your computer from a possible virus infection or other malware threat. Is Very , Simple , Fast And Have Many Tools . Simple To Update . Anti Malware Anti Autorun Anti Virus Mulit Language Incress Speed Decress Update Size Tag:maftoox anti virus anti malware



Autorun Virus Remover
(image) Autorun Virus Remover provides fully USB security solutions , it not only allows you to gain full control of every usb port, but also provides 100% protection against any malicious programs trying to attack via USB storage. All data in your computer and usb drives will get fully protection provided by Autorun Virus Remover. Key Features: * Prevent data leak via USB storage devices * 100% protection against any autorun virus via USB drive * Clean Autorun virus in your infected system * The best solution to protect offline computer * The world's fastest and smallest antivirus software * 100% compatible with all software * Easy to use * Supporting all kinds of external removable media Tag:vocal remover autorun.inf removal tool vocal remover karaoke autorun exe



Returnil Virtual System Pro 2011
(image) Returnil Virtual System Pro is built with the end-user in mind. It shouldn't be stressful to surf the internet or to download a program you really would like to try out. Returnil's virtualization technology will give you peace of mind by protection your computer from all types of viruses and other malicious threats. Returnil Virtual System Pro 2011 uses an advanced virtualization technology. It clones (copies) your operating system and creates a virtual environment for your PC. Instead of loading the native operating system, a clone is loaded that allows you to run your applications and perform your online activities in an entirely isolated environment. In this manner, your actual operating system is never affected by viruses, Trojans, malware and other malicious threats. To return to the actual operating system environment, you just need to restart your PC. While working in the virtual environment, you have the option of saving documents and files so that your data will not be lost when the system is restarted. Overall Product * New an improved interface * Clear protection status of your system * Manage main features from one screen Virtual Mode * Protect your system - Virtualize it! * Virtual Mode Always On or just in current session * Ability to save files via File Manager * Browse real and virtual disks and registry Anti-Execute * Trust programs from real-disk only * Only allow trusted services to run * Allow all programs to run Online Remote Management * Manage client's features * Schedule AV/Windows Updates * Restart client machines * Create custom groups of clients Tag:virtual girl virtual dj crack virtual piano xp operating system windows operating system mac operating system windows update operating system virtual mixing console



Immunos
(image) Immunos is an extremely easy-to-work-with malware scanner that offers a straightforward interface and a powerful detection and removal system. It fully integrates into your system allowing you to scan any file on your computer individually. Immunos can be also configured to auto-update at intervals you select. When scanning with Immunos you can choose to scan subdirectories recursively, remove temporary files and add to contextmenu explorer. The program runs discretely in the background using the system tray. Another strong point of Immunos is its modest requirements when it comes to resource consumption. Tag:system tray e scan t com is it remove temporary malware scanner malware scan remove temporary file



Exterminate It!
(image) Computer security is no jada, jada, jada. The Internet threats are not gone. Whenever you are using your computer and the Internet, you are taking part in a war, whether you want it or not. The days when viruses or malware were made just to show off technical superiority are history. Viruses and malware have become a serious business. So have the threats from them. Now they range from showing unwanted advertisement to stealing your credit card information to turning your computer into an accomplice in attacking web sites and spreading viruses further. Our new SAFETY LINE products are designed to deliver powerful antivirus protection so you can enjoy a safe computer experience. Whenever you are under attack, we ensure that you get the best service on time with our SAFETY LINE! Exterminate It! Features Exterminate It! includes the Submit State functionality, by using which you can provide us with detailed info on the state of your PC with a single click and receive a remedy for your malware problem from us in the next database update within 24 hours. Exterminate It! will help your PC stay clean, ­- the computer security is of utmost importance in todays' business world! You can run the software when you need to, - don't waste the resources of your system. Easy-to-use, intuitively user-friendly GUI Low consumption of system resources 24 hours customer support Free user-tailored updates To completely purge Popuper from your computer, you need to delete the files, folders, and Windows registry keys, and registry values associated with Popuper. These files, folders, and registry keys are respectively listed in the Files, Folders, Registry Keys, and Registry Values sections. Tag:credit card Registry key powerful antivirus exterminate it reviews virus protection web sit virus protect exterminate antivirus protection exterminate mice credit c stealing your windows registry keys e update powerful anti s pro to exterminate



RemoveIT Pro 4 SE
(image) RemoveIT Pro v4 - SE in only simple antivirus protection that only scans for viruses from it's database. - For complete protection buy our RemoveIT Pro v4 Enterprise. - RemoveIT Pro v4 utilizes High-level protection technology (HLP) and spyware, adware and virus removal filters which filts all new executable files in Windows Directory and it keeps your computer clean from malware, spyware, adware, and worms up to 95%. Tag:Remove malwares remove viruses remove worm remove Trojan remove Trojan horses Remove adware remove spware spyware removal adware removal virus removal Trojan removal worm removal spyware removal tool adware cleaner spyware cleaner virus cleaner



Kaspersky Virus Removal Tool 2010
(image) The Kaspersky Virus Removal Tool is a free application was designed to be another virus scanner and detection software from Kaspersky. The produst will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Tag:kaspersky kaspersky key daemon tool amv convert tool kaspersky serial key iweb seo tool telnet scripting tool



Ebil Internet Security
(image) il Internet Security is a simple but efficient application that will protect your computer for viruses and other internet threats. Don't get infected, save your computer, download and use Ebil Internet Security now. Tag:internet explorer 8 internet explorer internet explorer 9 internet explorer 6 internet explorer 7.0 pc security avira internet security mcafee security center usb security internet usage meter izone internet turbo



Lynx VirusScan
(image) A small, compact and easy to use application that will enable you to scan and remove malware components from your computer. Besides this, Lynx VirusScan can also fix your registry, recover drives and block unwanted websites. Tag:virus scan lynx virusscan.jotti.org virusscan mcafee virusscan enterprise mcafee virusscan 11 www.virusscan.com over drive remove malware lynx pictures lynx internet radio lynx viewer block unwanted websites block unwanted fix your registry



DU Clean N' Optimize
Clean N' Optimize has highly customizable cleaning options and supports the most common web browsers and chat applications. It has a built in Shredder, so the cleaned files/folders can not be recovered again and separate shredder to manually shred files, folders, drives empty space, and recycle bin with the most famous and secure shredding algorithms. It is a powerful optimizer for Internet connection, System like optimizing hard drive, Windows Explorer like disable save settings at shutdown and Privacy like locking some hard drive partitions. Also it has Startup Manager to modify the applications that launch at windows startup and Uninstall Manager to modify or uninstall the user-installed applications. With Clean N' Optimize you can clean your system with One Click. It has easy to use interface. The main window is just the start guide for you to use Clean N' Optimize in efficient and easy way. Read the instructions and follow the links to start using the program. The Clean Settings Window consists from 3 main sections: 1)Internet items includes the following, categories Browsers: in the browsers tabs, you can check items that will be cleaned in each installed browser and Chat: in the chat tabs, you can check the items that will be cleaned in each installed chat program. 2)System Items consists of the windows category which consists from History Cleaner: check the history items that you want to clean which are related to windows system and Recent Files Cleaner: check the recent files that you want to clean which are related to windows built-in, the hard drive cleaner will free up the hard drive space by deleting the temporary and unnecessary files, you can include files with specific Extensions to be deleted. 3)Registry Items: the Broken registry items means the leftover registry keys that should be deleted from the system registry. With shredder you can shred 3 categories:1)Shred Files/Folders, 2)Shred Empty Space, 3)Shred Recycle Bin. Tag:Cleaner Optimizer Shredder shred files folders drives empty space recycle bin secure Powerful Internet connection System hard drive Windows Explorer Privacy locking[...]



Free BPS Clean N' Optimize
Clean N' Optimize has highly customizable cleaning options and supports the most common web browsers and chat applications. It has a built in Shredder, so the cleaned files/folders can not be recovered again and separate shredder to manually shred files, folders, drives empty space, and recycle bin with the most famous and secure shredding algorithms. It is a powerful optimizer for Internet connection, System like optimizing hard drive, Windows Explorer like disable save settings at shutdown and Privacy like locking some hard drive partitions. Also it has Startup Manager to modify the applications that launch at windows startup and Uninstall Manager to modify or uninstall the user-installed applications. With Clean N' Optimize you can clean your system with One Click. It has easy to use interface. The main window is just the start guide for you to use Clean N' Optimize in efficient and easy way. Read the instructions and follow the links to start using the program. The Clean Settings Window consists from 3 main sections: 1)Internet items includes the following, categories Browsers: in the browsers tabs, you can check items that will be cleaned in each installed browser and Chat: in the chat tabs, you can check the items that will be cleaned in each installed chat program. 2)System Items consists of the windows category which consists from History Cleaner: check the history items that you want to clean which are related to windows system and Recent Files Cleaner: check the recent files that you want to clean which are related to windows built-in, the hard drive cleaner will free up the hard drive space by deleting the temporary and unnecessary files, you can include files with specific Extensions to be deleted. 3)Registry Items: the Broken registry items means the leftover registry keys that should be deleted from the system registry. With shredder you can shred 3 categories:1)Shred Files/Folders, 2)Shred Empty Space, 3)Shred Recycle Bin. Tag:Cleaner Optimizer Shredder shred files folders drives empty space recycle bin secure Powerful Internet connection System hard drive Windows Explorer Privacy locking[...]



Free BPS Spyware and Adware Remover
BPS Spyware/Adware Remover is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. BPS Spyware/Adware Remover is a program that uses a database with tens of thousands fingerprints of spyware adware, trojans and worms that can be updated automatically to provide protection from the latest danger. It have the ablitiy to set a scheduled Liveupdate to automatically update your program periodically or to select Manual Update to apply. It is available in these languages: English,ChineseSimplified,ChineseTraditional,French,German,Italian,Japanes, Russian,Spanish. BPS Spyware/Adware Remover provides complete and quick scan feature. It gives the user the ablitiy to automatically remove all the infected files or just some of them. BPS Spyware/Adware Remover allows the user to choose either a full system scan or select a specific folder to scan for known data mining, aggressive advertising, hijacking, and tracking components. It is completely customizable to customers' needs. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered up), registry, & drives for known adware modules & for known SpyWare parasites & scum-ware components and lets you remove them safely from your system. Using BPS Spyware/Adware Remover Startup Manager, you can clean up and remove any unwanted programs from auto-starting, often freeing up CPU for your computer. BPS Spyware/Adware Remover BHO Manager (Browser Hijacker Object Manger, can help the user clears away those installed objects or modules that change browser settings, cause errors, reset home pages, and slow your browser. BPS System Shields protects the user from malicious spyware take over attacks and guards the user even before it infects his system. BPS Spyware/Adware Remover manages the LSP modules installed in your system and manages the startup entries in your system. Tag:adware spyware remover removal eliminator free anti detection removing killer from detecting detector scan blocker checker list stopper and internet[...]



Advanced File Vault
(image) Hide or password-protect any file instantly by clicking on it. Advanced File Vault works with all file types including pictures and movies. Once a file is locked or hidden, it is completely encrypted and none of its contents can be viewed. To lock a file or folder, simply right-click on it and select the lock option. Extremely easy to use. Online help is also available. Tag:Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003



Bulletproof Public PC
(image) Bulletproof Public PC is a comprehensive solution you can use to produce public PC and kiosk desktop terminals that are intended to work without supervision. Completely disable access to the local files and give the full access to the necessary applications only. Create a PC workstation to be used safely under an uncontrolled public environment and prevent your workstations from damaging and cluttering. Control access to the applications installed on your PC workstations; allow using Internet Explorer, for instance, and disable all other software. Bulletproof Public PC is good for public libraries, Internet cafes, online terminals and in-store kiosks. Bulletproof Public PC has a lot of custom features you can use to fine-tune access to a locked desktop. User profiles and time-locked codes are also supported to allow selected users to access workstation for a given period of time only. This software has a very easy-to-use user interface. Tag:workstation Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003



DVD Device Lock
(image) Hide or restrict access to removable media devices such as CD, DVD, floppy, flash and USB drives, and deny access to partitions of your hard disk drives with the program. Stop copying data between removable media and hard disk drives, deny access to removable media, protect your PC against unauthorized software installations and prevent data leaks through removable media. Tag:drives data access media program device software removable password system restrict devices



Encrypt My Information
(image) Encrypt My Information allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into these specified folders and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you finish, lock the secure folder, which will store the files securely and also hide the entire folder from view. Tag:encrypted encrypt information folder Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003



File Access Scheduler
(image) Protect your files from being executed, viewed, changed and deleted with File Access Scheduler. This software will automatically enable a chosen protection based on currently logged-in user, current time and the schedule you specify. By using this software it is quite easy to disable Internet access, certain games and other software applications during certain periods of time (working hours, for example). You can allow using different sets of applications in different time windows for different users to ensure that only business applications are used by employees or kids during working hours and the games are played only at leisure. It means that you can easily limit gaming and chatting activities to a certain extent set and enforced by you. Tag:games Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003



File and Folder Privacy
(image) File and Folder Privacy is a system security utility you can use to password-protect or hide your files and folders with a click of mouse. The program will always prompt to enter your access password when protection is enabled and a user is trying to access a protected file or folder. The protected file or folder will become accessible only is a valid password is entered. The program supports Windows Explorer integration and upon installation creates easily accessible menu items in the context menu of Windows Explorer. User interface of the program is very easy-to-use and a very nice documentation is available. Tag:password folder windows Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003 system security Windows Explorer



Outlook Express Privacy
(image) Outlook Express Privacy lets you control access to Outlook Express and its email message database. When you enable protection, the program disables access to the message database and address book files. As a result, when you open Outlook Express or Windows Address Book, a password will be asked for authentication. Outlook Express and Windows Address Book will become accessible only if a correct password is entered. This software can be used to prevent your email data from being stolen or damaged by unauthorized users. Tag:outlook outlook express address password message email database access Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003 Windows Address Book



PC Security Tweaker
(image) PC Security Tweaker is a security tweaking utility you can use to tweak Windows-based computers. It is compatible with all Windows versions and lets you control which users are allowed to access your PC and the level of access each user may have. You can choose to tweak access to lots of Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can enforce users to use separate system profile folders and provide them with their own custom shell folders such as Desktop, Start Menu, Favorites, My Documents. Additionally, by tweaking, you can: disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, interruption boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can password-protect Windows and restrict users to running specific applications only. Security tweaks can be applied universally or just to specific users. This software also lets you tweak Internet Explorer to secure web browsing. Tag:access windows tweak security network desktop Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003 DOS mode Registry editing taskbar task manager



Lock My Computer
(image) Lock My Computer is a powerful desktop security solution for personal or publicly accessible computers running the Windows 2000/XP/Server 2003 Operating Systems. It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings, and many more others. It can disable access to local hard disks, Floppy, CDROM, and removable drives or make them read-only. By locking and hiding or making read-only of programs, files, and folders, Lock My Computer can prevent them from being launched, modified or deleted. Lock My Computer supports creating unlimited number of user accounts with each one has his own password and protection list. Tag:lock computer windows settings desktop Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003 Windows Server 2003 Control Panel Outlook Express hard disks Floppy CDROM



Password Genie
(image) Password Genie is a password manager that works across multiple computers, users, and browsers and is designed for both security and convenience. You can easily save all of your usernames and passwords in one location which is securely protected and can only be accessed by you. Password Genie features include: Smart Logins - No complex learning required. Password Genie saves your usernames and passwords and provides auto-fill, auto-submit, and keystroke options. Multiple Users / Multiple PC's - Password Genie can be installed on up to five (5) computers with unlimited users. Best of all, your saved logins, usernames, passwords, and preferences are synchronized across all your installations so they are available wherever you are. Safe and Secure - All your personal data and preferences are stored with 256-bit AES encryption and transferred with 128-bit SSL, the same technology used by secure sites and banks today. In addition, your data is further protected by requiring access to your computer with a password only you know. Advanced Custom Options - Password Genie comes with multiple preference options that will make your experience unique and browsing hassle-free. Automated Backups - Password Genie ensures that all your saved website usernames and password are securely backed up and available in case you need to do a reinstall or transfer to a new computer at any time. 24/7 Support - Phone, Chat, and E-mail support is included 24 hours a day, 7 days a week, at no extra cost. Tag:Password Manager Usernames Password Security Forgot Passwords Password Passwords Remember Passwords User Identity Manager Online Profiles Saved Logins Login Manager Internet Passwords Website Usernames



Celerity
Celerity is a powerful application for analyzing C/C++ projects. It can process millions of source code lines. It supports standard C/C++ (and K&R style of sources as well). For each analyzed project, it produces a multifaceted cross-referenced database and shows the source files, include files, source and include files, indexes of lexical elements, includes, include-by's, all macros, macros in a translation unit, all definitions, expandable definitions in a file, expandable definitions in a translation unit, references (function declarations and invocations), reference-by's, contents of per-directory definitions, construct hierarchy, diagnosis outputs, symbol searches, favorites, etc. Definitions and invocations could be expanded conveniently by just a single click. All these combined help a C/C++ developer to quickly read, review, understand, study and maintain a critical or large code base. It has a user-friendly interface with features like tabs, docking, auto-hiding, floating, drag and drop, etc. It allows the user to quickly locate each functional window and rearrange these windows in different layouts. It includes a versatile editor for text/hexadecimal files. Facilitative features include syntax styling, auto-indenting of new lines, auto-completion of words, and auto-formatting of the entire content for better readability. It also dynamically shows cascaded tags in a file. File formats could be defined to specify how to handle directives, colors, styles, etc. FTP files are handled as local files. It includes a studio for multiple projects with commands dealing with each project or all projects. Strong multiple-file find & replace functions enable the user to do quick searches within the background. It has a differencing module which can perform multiple file-to-file or directory-to-directory comparisons in a background manner. Tag:C C++ CXX CPP ISO/IEC 9899 ISO/IEC 14882 analyzer analyser analyze analyse understand software development developer develop compiler million source code line[...]



oXygen XML Editor and XSLT Debugger
Oxygen is an XML Editor, XSLT/XQuery Debugger and Profiler with full Unicode support. It supports visual XML editing driven by CSS stylesheets. Introduces XML Author specially tuned for content authors providing a well designed interface for XML editing by keeping only the relevant authoring features. It offers a powerful code insight that can follow a DTD, Relax NG or an XML Schema or even can learn the structure from a partial edited document. XML and XSL documents can be easily associated one with the other and the transformation results can be viewed as text or HTML. Oxygen provides a visual schema editor for W3C XML Schema and Relax NG schema designed to simplify the development and understanding of the schema files. Oxygen validates XML, XSL, XQUERY, FO, XSD, RNG, RNC, DTD, Schematron, WSDL and CSS content, reporting errors with description and line number information and marking them in the document when validate as you type is enabled. It comes with the latest Docbook DTD and stylesheets. Includes the Apache FO Processor, being able to generate PDF and PostScript. Other FO processors can be configured as plugins. Oxygen provides a special layout when entering in debugging mode to show the source and the stylesheet documents side by side and to show also the results and special debugging views. Debugging and profiling can be done using the latest versions of Xalan, Saxon 6 or Saxon 9 transformation engines. A complete diff and merge solution is also available in Oxygen. It offers both directory and file comparison, 6 file diff algorithms. Oxygen makes easier the document sharing between content authors by including a Subversion Client. The SVN Client allows you to browse repositories, check for changes, commit changes, update your working copy and examine the revision history. Oxygen provides support for importing database content, MS Excel sheets and legacy text data files into XML documents and also for generating XML Schema from database tables. Tag:Xml editor xml editors xml developer xml developers xml development xml developments xml software xml tool xml tools xml program xml programs XSLT Debugger XML Schema Schema development XML document dtd document XSLT document creating xml create xml[...]



Feed Writer Deskop RSS Editor
(image) Feed Writer is a professional RSS editor for easy and comfortable creation of RSS feeds. It supports all RSS formats such as RSS 0.91, RSS 0.92, RSS 2.0, Atom and even Podcasts. Feed Writer also offers full UTF-8 compatibility which allows creating feeds with non-Latin text such as Cyrillic, Polish or Chinese. Feed items can be edited either with the build-in source code editor or a comfortable WYSIWYG editor. The integrated preview and validation features help you to retain control of your projects. The build-in FTP client which automatically publishes your feeds online also supports the secure SFTP/SSH protocol. The powerful project management feature allows you to open and maintain multiple feeds from various sources (local, Web, FTP) and to exchange items between those feeds. The project management also covers the handling of enclosures such as audio, video or picture files that can be included in your feeds. Tag:RSS Editor RSS-Editor XML RDF Atom Feed Feeds Blog Newsfeeds Newsfeed RSS-Feed



RJ TextEd
(image) RJ TextEd is a full featured text and source editor with Unicode support, syntax highlighting and code folding. The functionality extends beyond text files and includes support for HTML editing with integrated preview, spell checking, auto completion, HTML validation, templates and more. The program also include a dual pane file Commander, as well as a SFTP/FTP Client to upload your files. Below is a small list of features available. For a full list check out the features section. RJ TextEd is released as FREEWARE. However, if you find the program useful I would appreciate a small donation. Features Below is a small list of features available in the program. * Auto completion. * Code folding. * Column mode. * Advanced sorting. * Multi select and multi editing * Handles both ASCII and binary files. * Html wizards. * CSS preview. * HTML preview. * FTP and SFTP client with synchronization. * File Explorer, text clips, code explorer, project manager... * Convert Between code pages, Unicode formats and text formats. * Unicode and ANSI code page detection. * Open/Save UTF-8 encoded files without a signature (BOM). * Unicode file paths and file names. * Html validation, format and repair. * Tools available like syntax editor, color picker, charmap... Tag:text editor syntax highlighting unicode html preview encryption



Database .NET
(image) Database .NET is a simple, uniform and intuitive database management tool for multiple databases, Making Local and Remote Database Administration Easier. With it you can Create databases, Design tables, Edit data, Export data, Generate scripts and run SQL queries. Features: Table/Data/Index Editor, Create/Shrink/Protect Database, Syntax Highlighting, AutoComplete, Service Manager, Code Manager, Multiple Query Tabs, Export to CSV/XML/TXT/XLS/SQL, Print Query Results... and much more. Supports: MS Access 97-2003/MS Access 2007-2010/MS Excel 97-2003/MS Excel 2007-2010/dBASE IV/Firebird/MySQL/SQL Server/SQL Azure/SQL Server CE/SQLite/PostgreSQL/Oracle/IBM DB2/OleDB/ODBC/OData. A standalone tool that does not require installation. Tag:SQL database



The Gridview to Excel Export Tool
(image) This tool enables any ASPX and WinForms developer to export data in tabular form to Excel in a matter of seconds. It consists mainly of an assembly (a dll) which is installed on your machine. After referencing the dll from your Visual Studio project you can export data to Excel 2003/2007 by writing, in most cases, two lines of codes. Neither Office or VSTO or other software installation is required. You simply need .Net Framework 3.5. By using this tool you can: 1) export data from Sqldatasource, Dataview and ObjectDataSource, Dataset to Excel 2003 xml and Excel 2007 xlsx formats 2) use always the same code to export data from different data sources 3) choose which columns to export 4) either infer Excel Column Headers from Gridview Column Headers or set them manually 5) obtain Multiple Sheets Excel 2003 and/or Excel 2007 Workbook by providing one Datasource for each Excel Sheet 6) add hyperlink columns to your export by specifying the href column and text column you want to display 7) make your sheets to have a Total line either at bottom or at the top of the sheets (with real Excel formulas) 8) add computed columns to your Excel Sheet by defining your own formulas in excel R1C1 mode. 9) display a Title line on each Excel Sheet 10) provide already "filter ready" Excel Sheets sparing the user this activity 11) provide "already frozen panes" Excel Sheet so that the user can scroll data without losing sight of column headers 12) either display the Excel Export immediately to the User or zip it and send it via email 13) provide format styles for headers' rows, columns, total row, bottom rows 14) obtain multisheet Excel Workbooks by defining one datasource for each sheet The capability to export data from Dataview virtually enables you to extract data from any datatable and, consequently, from any database or datasource which you can feed a datatable from. Read the "GEET readme.pdf" instructions on how to proceed. Tag:



ROBO Optimizer Search Engine Optimizatin
(image) Get top search engine rankings with ROBO Optimizer Search Engine Optimization. This software will take an existing webpage and copies it to make a highly optimized webpage optimized for specific keywords for dramatically improved search engine ranking through a 11 step wizard. Extremely easy to use, fast and no HTML knowledge required. Tag:



CoffeeCup VisualSite Designer
(image) CoffeeCup Visual Site Designer is a WYSIWYG Website creator and editor that helps you make Webpages with no experience or HTML knowledge. Just drag and drop images or text on the page until you like what you see, and then upload it to your Website. Visual Site Designer comes with 10 Webpage themes to start you off. Create Websites with multiple pages, text fields, graphics, animations, and more. Add your own images or use the built-in button and background creators to make every step a breeze. Visual Site Designer also has its own image creation tools so you don't need other graphics software. You can add effects like glow, shadow, and transparency to your text and images, and make custom mouseover buttons and effects in a snap... Visual Site Designer creates all the images and JavaScript for you. When you`re happy with your page, upload it to your server with the built-in FTP client. Visual Site Designer puts all your pages and images online for you, practically eliminating the hassle of broken links and missing images. Just try it, and you`ll agree — this is Web design the way it was meant to be. Tag:website design wysiwyg layout visual html editor html editor web page



Delphi2Cpp
(image) Delphi2Cpp converts Delphi source files to C++. The program is based on a complete parser for Delphi 4/5 and yields optimal translation results by use of the type information of the VCL and other included units. The include paths can be set in the options as well as defines for the conditional compilation. The CBuilder with its language expansions is most suitable as target, but other compilers are supported too, e.g. by elimination Delphi-properties. Some of the features of Delphi2Cpp listed briefly: - the case notations of identifiers are unified - source code is preprocessed with conditional compilation - comments remain unchanged at the translation - special VCL functions like "Length" or "High" are translated in dependence of the actual types - inserts return values in functions and treats or simulates much more Delphi language features: enumerated types, sets, ranges, static and dynamic arrays, arrays of const, in-operator, is-operator, default array properties and much more In the student version of Delphi2Cpp a manager for the translation of groups of files is deactivated. In the professional version this dialog is accessible. Tag:Delphi2Cpp converter translater translation Object-Pascal Delphi C++ CBuilder EBNF grammar parser syntax



VirusBuster Command-line Scanner
The VirusBuster Scanners are sometimes the only solution for a critical problem. Because of its size and the several supported platforms, the command line scanner is a truly effective tool for finding and removing virus infections. Their main task is to find virus infections on the data storage systems and other areas and if possible remove them. The programs can be loaded from the command line and its operation can be adjusted with aid of parameters. Incremental virus database update Using the incremental update mechanism the download time is reduced to a minimal level so we can release additional virus database packages several times a day to improve the defence. Users can obtain protection against new malware without spending long time and generating considerable network load for the update. Outstanding performance The program's simple and logical architecture and the VirusBuster scan engine guarantee the highest possible performance for every virus scan. Heuristics scanning levels Using the heuristics the software tries to detect codes and programs, which have virus-like characteristics but are not registered in the virus database. If such a suspicious file is found, the user is notified. Multi-thread scanning The multi-thread operation provides faster scanning using parallel processing. It results in better performance, shorter scanning time. Configuration file It is possible to store the general settings in a configuration file so there is no need to specify the scanning parameters to each scanning. Tag:epson scanner line rider 3 command prompt number line template line rider 2 line 98 line wire driver scanner barcode scanner remote scanner line graph generator sage line 50 usb2.0 scanner[...]



Trend Micro Virus Controlled Pattern File
(image) A Controlled Pattern File Release (CPR) is a manually loadable, pre-release version of a Trend Micro virus protection database, designed to provide users with additional antivirus protection in between official pattern file releases. Customers running products that support Trend Micro's new pattern file format (the multi-digit format) may obtain deployment instructions for the latest Controlled Pattern Release by clicking the link below. Tag:Trend Micro Inc. virus



Twister AntiVirus Virus Definition Update Pack
Twister AntiVirus is a powerful and easy-to-use anti-trojan, anti-virus, anti-rootkit, and anti-spyware software. It provides realtime protection against trojans, spyware, viruses, hackers, adware and other harmware threats. It supports the Windows Security center, and it integrates with Windows Explorer so you can scan files and folders simply by right-clicking on them and selecting 'Scan for viruses.' It supports scanning of zip, rar, ace, cab, chm and eml compressed files. Its Registry Protector will protect your Windows registry in realtime. The Registry Fix Tools will quickly fix a lot of frequently occurring problems with Windows and IE. The Spyware Removal Assistant utility will easily remove all stubborn trojans and spyware from your PC. The virus definition live update and automatic update will help you to detect and remove the most recent trojans, spyware, and viruses. Secure your PC now with Twister. Features # It can detect and remove Trojan horses, Spyware, Viruses, Hackers, Adware, Keyloggers and other harmware. # The advanced harmful-websites detection technology can block most web-viruses and script-viruses. # Realtime protection will automatically monitor every file access against the trojans, spyware and viruses threats. # Virus definition update and automatic update supported. # Windows Security Center supported. # Supports right-click scan from Windows Explorer context menu. # Supports compressed files scan. # Registry realtime protection will block and fix the harmware to vandalize your Windows registry. # Registry Fix Tools can quickly fix a lot of problems about Windows and Internet Explorer. # Spyware Removal Assistant can force clean the stubborn trojans and spyware that the other removal tools cannot. # The Behavior Analysis Technology can detect the unknown trojans and spyware better. # The Windows Trust Verification can raise the anti-rate and reduce the mis-rate. Tag:mobile antivirus nod32 update mobile phone antivirus quick heal update symantec antivirus avast antivirus nod32 antivirus crack update rollup[...]



SterJo Portable Firewall PRO
(image) SterJo Portable Firewall PRO is device designed to prevent outsiders from accessing your network even if it is run from a USB drive. The unit serves as the single entry point to your network and evaluate all TCP connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary. - Activity provides a real-time view of the open connections through the firewall. - The policy editor is used to define a security policy where connections requests from unauthorized ip addresses and ports are rejected. - Log provides data connection notes that can be used for prosecuting the potential attackers. - History tab gives you information about the traffic and blocked attempts. Tag:firewall security monitoring personal firewall portable firewall protect access block internet privacy hacker trojan policy log



McAfee AVERT Stinger
(image) Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations. This version of Stinger includes detection for all known variants: BackDoor-AQJ Bat/Mumu.worm Exploit-DcomRpc IPCScan IRC/Flood.ap IRC/Flood.bi IRC/Flood.cd NTServiceLoader PWS-Sincom W32/Bugbear@MM W32/Deborm.worm.gen W32/Elkern.cav W32/Fizzer.gen@MM W32/FunLove W32/Klez W32/Lirva W32/Lovgate W32/Lovsan.worm W32/Mimail@MM W32/MoFei.worm W32/Mumu.b.worm W32/Nimda W32/Sdbot.worm.gen W32/SirCam@MM W32/Sobig W32/SQLSlammer.worm W32/Yaha@MM W32/Nachi.worm W32/Lovsan.worm.d. Tag:mcafee antivirus free mcafee anti virus antivirus anti virus freeware antivirus freeware free antiviurs free anti virus antiviurs soulution antiviurs portection anti virus protection remove virus detect virus



Smart Keystroke Recorder
(image) Smart Keystroke Recorder is an excellent monitoring tool. It allows you to secretly investigate everything that happens on your PC. Features: keystroke recording, online chat logging, Internet activity monitoring, auto-run at startup, stealth mode. The program works on all Windows systems. Tag:keystroke recorder,monitoring tool monitor tool monitor software monitor pc monitor pc monitoring online chat internet monitoring auto0run stealth mode windows system internet activity monitoring



The Lock
The Lock provides user audit and monitoring, access control, Internet and system security for any computer running Windows XP, Server 2003, Server 2008, Windows Vista, Windows 7. The Lock now supports 64 bit versions of Windows 7. Running on Windows 9x/ME may work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements. All user security is group based configurable by any members of the Administrators group. User security can define system policy, logon times, internet access times, web site restrictions, and access to local resources such as programs and files and folders, including removable media (USB, flash, etc.), that can be restricted as it is plugged into the system. Restrict printer access in any Windows application. Restrict access to screen capture via the Print Screen key. Logging features will record web sites visited, programs run, and any security violations occurring while the user is logged in, and now supports the Firefox browser. Passwords can be verified on the local Windows system, a Windows server, or a remote Lock Security Manager server. A Netware Server is supported for password verification on Windows XP. The Lock has a built in cloning feature designed to make network installations a simple one step process. When used in conjunction with the Lock Security Manager Server, all remote systems may be kept up to date when The Lock has been updated on the SMS system. Tools are included with the Security Manager that will allow remote monitoring of any systems running The Lock and connecting to the Security Manager. Active Password monitoring is used to combat modification of Windows user passwords (usually with a bootable hacking disk) outside of the Windows GUI. Tag:lock xp xp lock window lock Terminal Server Administrators group logon times system policy windows system netware server remote lock xp xp security security manage security manager remote system winwods gui[...]



PDF Encryptor
(image) With this encryption tool, you can encrypt your pdf files into exe files that can only be opened when a Read Password is provided (PC-binding or No PC-binding), and users can only open the encrypted pdf files after obtaining the Read Password provided by you. You can choose encryption type : [ Non-binding ] -- All computer,One password. (Use "Create Read Password" function to create Read Password, Enter "00000-00000-00000" as Machine ID); [ PC-binding ] -- One computer,One password,you only need to encrypt files one time. (Use "Create Read Password" function to create Read Password); [ Protect only ] -- pdf2exe only. How do I know the machine ID of the user's computer? When a user wants to open an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Read Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Read Password based on the user's machine ID. After that the user can use this Read Password to open your file on his/her computer. Tag:PDF Encryption



CryptoExpert 2008 Professional
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is read by CryptoExpert from the volume file, decrypted, and presented to the application trying to read the data. Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase. Complete support for command line. Support for USB Flash Drives to mount containers without passwords. Works on Vista 32 and 64 bit. XP 32 and 64 bit as well as on 2000 and 2003. The latest version includes new feature: Disk Firewall to protect your virtual drive contents from malicious applications like viruses, trojajns and etc. Tag:encrypt fly password protect encryption blowfish disk virtual drive volume shred wipe des container vista[...]



USB Manager
(image) USB Manager is a small Windows utility that can quickly enable and disable USB devices. It has no interface and runs from the system tray. You can control the devices from the right-click context menu. It allows users to control USB devices such as, storage, printers, scanners, audio, and other devices. It can also be used to lock a device. Suppose you want to disable printing, scanning, or a storage device, first disable it and then go to options to password protect the settings. This can in fact be very useful. If you have a computer in office workspace and are worried that someone might copy a file then you can disable storage devices and password protect it. Once done, all USB inserted in your computer will fail to work. There is also an option to enable hotkey, start with windows, and hide it from the system tray. Tag:microsoft picture manager bluetooth usb driver adobe download manager office picture manager picture manager repair usb drive usb traffic sniffer



Temp File Cleaner
(image) This handy little utility quickly targets and eliminates temporary files accumulated by Windows on any drive. Scans all accessible user accounts, deletes temporary Internet files, cookies, browser history, recent files list, Windows temp folders, Windows prefetch, Windows update uninstall files, empties the Recycle Bin, and more. All removal options can be easily configured from the settings page. The process is not stopped by locked files, and will reset permissions if necessary. There is no need to install, there is a single executable that can be run from anywhere. A detailed help file describes all of the paths being cleaned, and how to configure various options. Tag:recycle bin vsd file viewer pub file viewer pdb file viewer wps file viewer file lock microsoft registry cleaner pc cleaner cc cleaner cleaner multiple file upload file hosting script cyberdefender registry cleaner dictionary file



Screenshot Keylogger
(image) Screenshot Keylogger is an excellent key logger software, it is a valuable for parents wanting to monitor their kids' PC use, it logs keystrokes, clipboard, screenshot, applications and web sites. Screenshot Keylogger runs hidden in the background and automatically logs all kinds of information.The interface can be password protected and only the person who knows the password can control the software. Screenshot Keylogger can block any web sites effectively and easily by 'Web Site Black List', and it can block any application by 'Application Black List'. If you want to filter some web site you can add them to 'Web Site Black List', it can work with all kinds of Web browsers like Internet Explorer, Firefox, chorme and others. Tag:Screenshot Keylogger Url Filter Application Fire Wall



Wireless Protector Enterprise
Wireless Protector is windows based management and security software that automatically disable WiFi adapters on computers that connected to the company network LAN and re-enable WiFi when the LAN cable is disconnected from the wireless computers. The Enterprise version supports unlimited wireless computers. Wireless Protector is acting as a server to all protected wireless computers and it needs to be installed only once on any active windows platform that connected by LAN cable to the company network. The software powerful engine can run as windows program or windows service and protect any number of wireless computers by installing a remote service on the wireless computers. It is also monitoring the protected wireless computers for active wireless auto switch protection. The software provides easy-to-use network administration interface, reports, exporting capabilities and database support. The software also collect activity logging on disabled WiFi adapters and protection status events for the wireless computers that helps network administrators to track and maintain the software activity. Wireless Protector key features: Provides wireless auto switch protection. Automatically disable WiFi when connected to LAN network. Automatically re-enable WiFi when LAN cable disconnect from network. Prevent WiFi network computers from using duplicate network resources. Secure un-trusted WiFi connections from being used as bridge connections. Enables automatic active protection re-scanning on WiFi network computers. Enables automatic exporting capabilities to text file or SQL/Access ODBC databases. Provides easy-to-use network administration interface. Provides enhanced statistics and reports. Provides activity logging tracking. Tag:network lan wireless computers protection monitor automatic disable wifi adapters windows[...]



PC Monitoring Software
The PC monitoring software comes integrated with two setup files; viewer setup and the agent setup. The employer’s computer has the viewer set up installed on his computer system whereas and the employee’s computer has the agent setup installed on it. You can install the agent setup file remotely or manually on the targeted computer. PC monitoring software is an eminent, professional, and comprehensive tool, which is devised to help the employers in monitoring their employee(s) computer desktop activities. These PC monitoring tools work in background i.e. they take snapshots of all the activities that are going on an employee computer desktop. One interesting thing is that the employee does not realize that the snapshots of his activities are being taken. Though the employee does not know when he is being monitored, the PC monitoring software can send notifications to his employees that they are being monitored. Apart from this, this software enables the employer to monitor his employee(s) computer desktop activities even when the employer is not available in the office i.e. the employer can set a time period for which he wants the employee to be monitored. This is known as the offline monitoring i.e. monitoring when the employer is not available. Employee Desktop Live Viewer is one such professional, efficient, and prudent third party PC monitoring tool that can monitor multiple employee(s) computer desktops simultaneously over a LAN. Tag:pc monitoring software pc monitoring tool pc monitoring desktop monitoring computer monitoring software computer monitoring tool desktop monitoring software[...]



WordPerfect Password
(image) WordPerfect Password allows you to recover passwords which WordPerfect files (.wpd, .wp) are protected with. WordPerfect Password recovers passwords regardless of password length and complexity. Recovers passwords for all protection modes: Ver 5.x, Origanal ver 6.0(a), Enhanced from 6.x to X5. All versions of WordPerfect (up to Office X5) are supported. Unicode passwords are fully supported. Tag:wordperfect password recovery wpd password wd file password corel office password wordperfect password



inDefend-Laptop Data Security/Monitoring
(image) inDefend is an application which will help you achieve full control on your laptop against theft of data without blocking you for your relevant access, at the same time blocking all kinds of unauthorized usb devices, websites related to porn, games and applications like chat and VoIP. Product Benefits : 1.Protect your data from unauthorized access, copy, share or transfer 2.Block all unwanted devices and unwanted websites on your laptop/desktop 3.Block all kinds of malicious activities like pornography, job search, social networks etc 4.Silently monitor users' internet activity and usb ports activity 5.Get detailed report on kinds of websites accessed, files copied on USB devices and unauthorized attempts 6.Password protected uninstall Tag:endpoint security data usb disk internet monitor employee spy access loss control business website email



SkypeLogView
(image) SkypeLogView reads the log files created by Skype application, and displays the details of incoming/outgoing calls, chat messages, and file transfers made by the specified Skype account. You can select one or more items from the logs list, and then copy them to the clipboard, or export them into text/html/csv/xml file. Tag:xml file file transfer outgoing calls log file skype account log files files created copy them outgoing call chat messages



Golden Shield Video Encryptor
Encrypt various types of video or audio files (e.g., wmv, avi, asf, mpg, rm, rmvb, mp4, flv, any other if you have corresponding decoder ) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password provided by you. When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer. Since the Playback Password is created based on the user's machine ID, the user will not be able to share the Playback Password with other users. The encrypted files can be used to achieve the following: Multiple encryption modes: Non-PC-Binding, All computer ,One password; PC-Binding, One computer,One password; Video2exe, Convert video to exe only; Only need to be authenticated once on the same computer(With same Key and Product ID). You can specify the number of playbacks allowed, the time of playback and expiry date. It can be configured to disconnect the network during playback, which disallows the users to share or record the media remotely; It can be configured to prevent other windows from opening during playback; Watermarks can be added to videos; It can be specified whether free trial watching or listening is provided; You can configure a user prompt so as to let users know how to contact you to obtain the Playback Password; Screen recording can be prevented. Tag:One Computer One Password avi2exe wmv2exe rmvb2exe mpg2exe video encryption[...]



Video Shield - Embed decoder and player
(image) Encrypt your video files with embedding decoder and player , User needn't install any decoder or player to play your video. you can encrypt various types of video or audio files (e.g., wmv, avi, asf, mpg, rm, rmvb, mp4, flv, Vob) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password provided by you. When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer. Since the Playback Password is created based on the user's machine ID, the user will not be able to share the Playback Password with other users. Since the Playback Password is bond to the user's computer, the user will not be able to re-distribute your files. Tag:avi2exe wmv2exe rmvb2exe mpg2exe rm2exe asf2exe mp3 to exe wma2exe



SWF Advanced Protector
1.Encrypt SWF files:Prevent decompiler,Prevent screen recording,Prevent cracking,Prevent copying. 2.Encrypt SWF files into exe format that can only be played after obtaining the Playback Password provided by you. 3.Add progress bar for your swf files,so that you can drag progress bar during playback. 4.Add Full-screen shortcuts 'Ctrl+F',you can Full-screen swf playback . 5. It can be configured to disconnect the network during playback, which disallows the users to share or record the media remotely; 6. You can configure a user prompt so as to let users know how to contact you to obtain the Playback Password; You can choose encryption mode : [ Non-binding ] -- All computer,One password. (Use "Create Playback Password" function to create Playback Password, Enter "No limit" as Machine ID); [ PC-binding ] -- One computer,One password,you only need to encrypt files one time. (Use "Create Playback Password" function to create Playback Password); [ Protect only ] -- Prevent decompiler, protect your swf action script. How do I know the machine ID of the user's computer? When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer. The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer. How to use this software? Please watch the encryption video demonstration, you can find the video demo in downloaded package. Tag:swf encryption swf protector swf encrypter[...]



Zero-Zero-Seven
View hidden information of your computer & Installed software information. Tag:FCorp Zero-Zero-Seven ZZS System Information System Information Security Secret



FBBlock
FBLock , software designed to block internet access to Facebook.com the number one employee productivity killer. FBLock is the only software on the market design to block Facebook at the most competitive price Block facebook access on your computer to anyone who uses it.FBBlock disable facebook access, and only with password can be enabled.Block Facebook - who will want to do that? * Parents who want to limit access to facebook to their children * Schools and educational institutions who want to limit access to facebook * Small companies that want to limit access to facebook to their employees * Individuals who want to block access Tag:block facebook facebook blocker disable facebook Limit Facebook facebook limiter stop facebook facebook stoper temporarily block facebook remove face remove facebook Disallow Facebook fblimiter



DiskPulse Server
(image) DiskPulse Server is a powerful and easy-to-use disk change monitoring server allowing one to monitor one or more disks or directories and detect file creations, modifications, name changes and delete operations in real-time. DiskPulse Server runs in the background as a service and may be controlled locally or remotely through the network using a client GUI application or a command line utility. Tag:Disk Change Monitor File System Monitor



Hide It 4 Me
(image) Hide It 4 Me is a small application that discretely hides a selected folder and its entire contents. Our software protects your data by making the selected folder (and all files/subfolders) invisible to 'Windows Explorer', 'My Computer' and any application 'File|Open' dialog boxes. To make the hidden folder viewable, you simply press a unique combination of keys which opens a pop-up window requesting a password. Once the password is supplied, the folder becomes viewable. The viewable folder can either be manually hidden at any time, automatically hidden upon a configurable inactivity time-out period, or hidden by simply shutting down or restarting the computer. Any files opened from within the hidden folder will not appear in the Windows MRU list nor is the application itself viewable from the 'Start Menu | Programs' or 'Control Panel | Add/Remove Programs' lists. You will be the only one who knows that Hide It 4 Me is protecting your files! Tag:



RedTex AntiVirus
RedTex AntiVirus is a program that helps you get rid of viruses and malware that trouble you, on your computer. Tag:



McAfee Virus Definitions
(image) Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk. Tag:mcafee definitions mcafee free definitions mcafee definitions update mcafee update definitions free mcafee definitions virus definitions www.virus definitions.com www.virus-definitions.com symantec virus definitions



Parental Control Weblock
(image) The new upgraded Weblock 3.0 allows you to: • Actively protect your children on the InternetControl your employees' Internet Access • Block certain websites (with sex, drugs and violence, etc.) • Protect your children on social networking sites • Manage Internet access time • Control access to instant messengers and video sites • Fre Education Panel Tag:social network parental control instant messenger firefox parental control avg parental control remove parental control internet access instant me social networking instant messenge