Subscribe: Miscellaneous shareware freeware adware software downloads
http://www.brothersoft.com/rss/security_miscellaneous.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
access  computer  data  files  internet  local  lock  password recovery  password  protection  security  software  usb  windows 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Miscellaneous shareware freeware adware software downloads

Miscellaneous shareware freeware adware software downloads



Miscellaneous software download - Miscellaneous freeware shareware downloads.



Published: Mon, 14 Feb 2011 19:13:40 GMT

Last Build Date: Mon, 14 Feb 2011 19:13:40 GMT

Copyright: Copyright 2007, brothersoft.com
 



Folder Vault
(image) Folder Vault lock, hide, securely encrypt and protect files and folders in the blink of an eye. With one master password FolderVault will protect your files, folders and even entire drives from being viewed, deleted, renamed, removed or accessed. Encrypt and hide your folders, files, pictures, documents in a flash. Folder Vault has advanced features such as "Stealth-Mode", allowing the user to run the program completely hidden to prevent other snoopers from even knowing it exists. Folder Vault uses advance security features allowing you to hide your folders and files from Windows, Dos and even Safe Modes. Encrypt your files and folders in your "Vault" using 256 bit Advanced Encryption Standard (AES), also known as Rijndael, a block cipher adopted as an encryption standard by the U.S. government... Use Folder Vault's Log feature to view malicous login attempts. Other features of Folder Vault include: Auto Protect and close your vault, Auto-Shutdown your PC, Erase recent document history, Auto-Empty Recycle Bin, Clean Internet Explorer History, Clear Internet Explorer Address Bar History, Erase Internet Explorer Temporary Internet Files & Cookies, Can't be uninstalled without the owners permission, Hide from Add Remove Programs. Folder Vault can also be used to lock/ hide individual programs on your computer from being run, accessed or used. Block access to your email program such as Microsoft Outlook. Simply lock the Outlook program directory to secure it. Want to lock your Microsoft Internet Explorer favorites from being viewed or used? Simply lock the favorites folder and they will not show up in your browser application. Stealth mode features of FolderVault: -Hides from Add Remove Programs -Hides all shortcuts from Desktop, Startmenu -Hides the program folders -Hides from the taskbar -Hides from Alt > Tab Menu -Hides from Task Manager running process list -Assign a HotKey combination to bring it back up Tag:folder lock Folder Vault Hide Folders Files Lock Folders Files Privacy Software History Eraser Software



Nmap
(image) Nmap and Zenmap (the graphical front end) are available in several versions and formats. Recent source releases and binary packages are described below. Older version (and sometimes newer test releases) are available from the dist directory (and really old ones are in dist-old). For the more security-paranoid (smart) users, GPG detached signatures and SHA-1 hashes for each release are available in the sigs directory (verification instructions). Before downloading, be sure to read the relevant sections for your platform from the Nmap Install Guide. The most important changes (features, bugfixes, etc) in each Nmap version are described in the Changelog. Using Nmap is covered in the Reference Guide, and don't forget to read the other available documentation, particularly the new book Nmap Network Scanning! The Nmap executable Windows installer can handle WinPcap installation, registry performance tweaks, and decompressing the executables and data files into your preferred location. It also includes the Zenmap graphical frontend. Tag:windows installer e document nmap performance tweak platform from data f several versions graphical frontend graphical front binary packages network scan



Deskman
(image) Deskman is an advanced desktop security tool for administrators and power users. The New Deskman includes new profiles for fast deployment, Windows Vista support, new restrictions, new options and much more. Advanced Security Full control over keys, mouse and critical system options: Taskbar, Control Panel... Secure, Lock Desktops Deskman allows you to lock down PCs and restrict access the way you want. Simple Yet Powerful One button configuration. Advanced, yet accessible, desktop security. Deskman Features: * Computer Usage Restrictions -Desktop restrictions -Start Menu restrictions, configuration -Internet Explorer restrictions -Control Panel restriction -Taskbar restrictions -Windows Explorer restrictions * Advanced Desktop Security - Drive access protection -Disable USB drives -Disable Ctrl-Alt-Del (WinXP only) - Disable Alt-F4 -Disable all Winkeys - Disable Task Manager hotkey -Disable any key combination -Disable any mouse button -Build a new, secure Start Menu (WinXP only) -Kiosk Mode * Autorun Options -Add new entries -Block new entries -Enforce programs: make sure a critical program will be always running. * Desktop Lockdown -One-button desktop protection - Password protection -Leave notes on the desktop -Lock workstation * Security Profiles -Defaulft profile: Basic Protection -Defaulft profile: Limited Access -Defaulft profile: Advanced Protection - Defaulft profile: Internet Explorer Protection - Defaulft profile: Kiosk Mode -Add your own profiles * Advanced Setup - User exceptions - Autologon -Silent installation available - User profiles for fast deployment - Tight hotkey + password security system - No network connection required Tag:security windows microsoft windows ms windows security program secret secretly record secretly data program keystroke record keystroke network administrator answer questions make it easy web site computer usage warning message hidden usage informatio



DeviceLock
(image) Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity via Group Policy. Using endpoint data leak prevention (DLP) solution called DeviceLock®, network administrators can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, serial and parallel ports, PDAs and smartphones, local and network printers and many other plug-and-play devices. Once DeviceLock® is installed, administrators can control access to any device, depending on the time of day and day of the week. With DeviceLock® you can: Control which users or groups can access USB, FireWire, Infrared, COM and LPT ports; WiFi and Bluetooth adapters; any type of printer, including local, network and virtual printers; Windows Mobile and Palm OS-based PDAs and smartphones; aswell as DVD/CD-ROMs, floppy drives, and other removable and Plug-and-Play devices Selectively grant or deny access to certain true file types for removable media Control access to devices depending on the time of day and day of the week Define which types of data (files, calendars, emails, tasks, notes, etc.) are allowed to synchronize between corporate PCs and personal mobile devices Define different online vs. offline security policies for the same user or set of users Detect encrypted PGP® and TrueCrypt disks (USB Flash Drives and other removable media) as well as Lexar® SAFE PSD encrypted flash drives and apply special "encrypted" permissions to them Authorize only specific USB devices that will not be locked regardless of any other settings Tag:generate report generate report plug and play PnP USB FireWire Fire Wire PCMCIA Multi Document Interface MDI structure task audit result microsoft excel excel analysis review snapshot LDAP



KeyFreeze
(image) KeyFreeze is a small, simple application designed to block your keyboard and mouse without "locking" the screen. So your kids can safely watch a cartoon or have a videochat with their grandparents and bang the keyboard as much as they want. Tag:the key chat with application design simple application k y small tool



Exterminate It!
(image) Computer security is no jada, jada, jada. The Internet threats are not gone. Whenever you are using your computer and the Internet, you are taking part in a war, whether you want it or not. The days when viruses or malware were made just to show off technical superiority are history. Viruses and malware have become a serious business. So have the threats from them. Now they range from showing unwanted advertisement to stealing your credit card information to turning your computer into an accomplice in attacking web sites and spreading viruses further. Our new SAFETY LINE products are designed to deliver powerful antivirus protection so you can enjoy a safe computer experience. Whenever you are under attack, we ensure that you get the best service on time with our SAFETY LINE! Exterminate It! Features Exterminate It! includes the Submit State functionality, by using which you can provide us with detailed info on the state of your PC with a single click and receive a remedy for your malware problem from us in the next database update within 24 hours. Exterminate It! will help your PC stay clean, ­- the computer security is of utmost importance in todays' business world! You can run the software when you need to, - don't waste the resources of your system. Easy-to-use, intuitively user-friendly GUI Low consumption of system resources 24 hours customer support Free user-tailored updates To completely purge Popuper from your computer, you need to delete the files, folders, and Windows registry keys, and registry values associated with Popuper. These files, folders, and registry keys are respectively listed in the Files, Folders, Registry Keys, and Registry Values sections. Tag:credit card Registry key powerful antivirus exterminate it reviews virus protection web sit virus protect exterminate antivirus protection exterminate mice credit c stealing your windows registry keys e update powerful anti s pro to exterminate



DVD Device Lock
(image) Hide or restrict access to removable media devices such as CD, DVD, floppy, flash and USB drives, and deny access to partitions of your hard disk drives with the program. Stop copying data between removable media and hard disk drives, deny access to removable media, protect your PC against unauthorized software installations and prevent data leaks through removable media. Tag:drives data access media program device software removable password system restrict devices



Lock My Computer
(image) Lock My Computer is a powerful desktop security solution for personal or publicly accessible computers running the Windows 2000/XP/Server 2003 Operating Systems. It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings, and many more others. It can disable access to local hard disks, Floppy, CDROM, and removable drives or make them read-only. By locking and hiding or making read-only of programs, files, and folders, Lock My Computer can prevent them from being launched, modified or deleted. Lock My Computer supports creating unlimited number of user accounts with each one has his own password and protection list. Tag:lock computer windows settings desktop Windows 98 Windows 2000 Windows XP Windows NT Windows Me Windows 2003 Windows Server 2003 Control Panel Outlook Express hard disks Floppy CDROM



Smart Keystroke Recorder
(image) Smart Keystroke Recorder is an excellent monitoring tool. It allows you to secretly investigate everything that happens on your PC. Features: keystroke recording, online chat logging, Internet activity monitoring, auto-run at startup, stealth mode. The program works on all Windows systems. Tag:keystroke recorder,monitoring tool monitor tool monitor software monitor pc monitor pc monitoring online chat internet monitoring auto0run stealth mode windows system internet activity monitoring



The Lock
(image) The Lock provides user audit and monitoring, access control, Internet and system security for any computer running Windows XP, Server 2003, Server 2008, Windows Vista, Windows 7. The Lock now supports 64 bit versions of Windows 7. Running on Windows 9x/ME may work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements. All user security is group based configurable by any members of the Administrators group. User security can define system policy, logon times, internet access times, web site restrictions, and access to local resources such as programs and files and folders, including removable media (USB, flash, etc.), that can be restricted as it is plugged into the system. Restrict printer access in any Windows application. Restrict access to screen capture via the Print Screen key. Logging features will record web sites visited, programs run, and any security violations occurring while the user is logged in, and now supports the Firefox browser. Passwords can be verified on the local Windows system, a Windows server, or a remote Lock Security Manager server. A Netware Server is supported for password verification on Windows XP. The Lock has a built in cloning feature designed to make network installations a simple one step process. When used in conjunction with the Lock Security Manager Server, all remote systems may be kept up to date when The Lock has been updated on the SMS system. Tools are included with the Security Manager that will allow remote monitoring of any systems running The Lock and connecting to the Security Manager. Active Password monitoring is used to combat modification of Windows user passwords (usually with a bootable hacking disk) outside of the Windows GUI. Tag:lock xp xp lock window lock Terminal Server Administrators group logon times system policy windows system netware server remote lock xp xp security security manage security manager remote system winwods gui



Temp File Cleaner
(image) This handy little utility quickly targets and eliminates temporary files accumulated by Windows on any drive. Scans all accessible user accounts, deletes temporary Internet files, cookies, browser history, recent files list, Windows temp folders, Windows prefetch, Windows update uninstall files, empties the Recycle Bin, and more. All removal options can be easily configured from the settings page. The process is not stopped by locked files, and will reset permissions if necessary. There is no need to install, there is a single executable that can be run from anywhere. A detailed help file describes all of the paths being cleaned, and how to configure various options. Tag:recycle bin vsd file viewer pub file viewer pdb file viewer wps file viewer file lock microsoft registry cleaner pc cleaner cc cleaner cleaner multiple file upload file hosting script cyberdefender registry cleaner dictionary file



Hide It 4 Me
(image) Hide It 4 Me is a small application that discretely hides a selected folder and its entire contents. Our software protects your data by making the selected folder (and all files/subfolders) invisible to 'Windows Explorer', 'My Computer' and any application 'File|Open' dialog boxes. To make the hidden folder viewable, you simply press a unique combination of keys which opens a pop-up window requesting a password. Once the password is supplied, the folder becomes viewable. The viewable folder can either be manually hidden at any time, automatically hidden upon a configurable inactivity time-out period, or hidden by simply shutting down or restarting the computer. Any files opened from within the hidden folder will not appear in the Windows MRU list nor is the application itself viewable from the 'Start Menu | Programs' or 'Control Panel | Add/Remove Programs' lists. You will be the only one who knows that Hide It 4 Me is protecting your files! Tag:



McAfee Virus Definitions
(image) Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk. Tag:mcafee definitions mcafee free definitions mcafee definitions update mcafee update definitions free mcafee definitions virus definitions www.virus definitions.com www.virus-definitions.com symantec virus definitions



SpotAuditor
(image) SpotAuditoris is a comprehensive solution for recovering passwords and other critical business information saved in computers, it recovers more than 35 programs passwords! SpotAuditor recovers Internet Explorer, Firefox, Opera, Outlook Express, MSN messenger, Windows Live Messenger, Windows Messenger, Google Talk, Gmail Notifier, Google Desktop, ICQ, Trillian, Miranda IM, &RQ, Camfrog Video Chat, Easy Web Cam, RDP, VNC, Dial up, RAS, VPN, WinProxy, Total Commander (Windows Commander), SmartFTP, Far, WS_FTP, CuteFTP, File Zilla, FlashFXP, SecureFX, WebDrive, FTP Voyager, CoreFTP, CoffeeCup Direct FTP, AutoFTP, FTP Control, FTP Navigator, FFFTP, 32bit FTP passwords and reveals IE Auto Complete Fields saved passwords, recovers passwords stored behind the asterisks SpotAuditor Key Features IE7 ( Internet Explorer 7 ) web and autocomplete password recovery -IE6 ( Internet Explorer 6) and ActiveX password uncover and remover -Mozilla Firefox cached passwords recovery -Opera browser password recovery -MSN messenger 6.0 - 7.5 and Windows Live Messenger 8 password recovery -Windows messenger password retrieve -Dialup, RAS and VPN password recovery ( administrator privileges required ) -Outlook Express and Microsoft Office Outlook passwords recovery -Recovers Passwords behind Asterisks (*****) -RDP - Remote Desktop password decoder -ICQ password finder -Trillian password recovery -Miranda IM password recovery -Google Talk ( GTalk ) password recovery -Google Desktop password recovery -Camfrog Video Chat and Easy Web Cam password recovery -VNC 4.xxx password recovery -WinProxy Administrator password retriever -Total Commander ( Windows Commander ) password recovery -CoffeeCup Direct FTP password recovery -WS_FTP password recovery -SmartFTP 3.x password recovery -CuteFTP password reveal -FlashFXP ftp password unhider -FileZilla multiple FTP accounts and proxy server passport recovery from registry and FileZilla.xml Tag:password recover password finder Internet Explorer icq password Trillian FTP Navigator ftp password SecureFX WebDrive FTP Voyager FileZilla FTP Control msn password content advisor protected storage Firefox MSN messenger Miranda IM Camfrog Video Chat



CD-DVD Lock
(image) CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know. Your data on your media are not going to be encrypted or altered in any way, therefore if you forget your password, you'll never lose your data stored on the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media. Tag:CD DVD Hard drive password security administrator access control protect files privacy restrict lock screen free download



USB Disk Security
(image) USB Disk Security is a top-rated antivirus utility that protects your PC against threats from USB storage. We find and fix threats that your current security products missed... Best solution to protect offline computer Fastest and smallest antivirus software Compatible with other security software Compatible with all windows platforms Very easy to use Free upgrade Product Highlights 100% protection against any malicious programs via USB drive USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world's best software to block threats that can damage your PC or compromise your personal information from USB storage. It supports USB drive, flash disk, secure digital card, thumb drive, pen drive, removable storage, ipod, and more. The best solution to protect offline computer Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses. The world's fastest and smallest antivirus software With USB Disk Security, it’s not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the USB Disk Security installer is just 1 MB. Tag:USB Disk Security Secure USB Disk USB Security USB Security Software USB Security Tool Protect USB Disk USB Disk Protection USB Drive Protection Protect USB Drive Scan Virus Virus Scanner Antivirus



SysTools Securase
(image) SysTools Securase is a versatile Lotus Notes Local Security eraser tool to remove local security from NSF files. NSF Local Security Removal Tool support to remove local security from NSF files created using Lotus Notes Clients 8.0, 7.0, 6.5 & 5.0. Software quickly removes the local security setting from local NSF files showing errors such as 'You are not authorized to access that database'. SysTools Securase Lotus Notes Local Security Eraser Tool is easy and simple to use software that lets notes user to save time in finding correct username and password to open a local NSF file. Securase is not a NSF password recovery tool, software just removes local security settings to access NSF files of any other users. If you are trying to open NSF database showing message 'This database has local access protection and you're not authorized to access it locally'. In this case SysTools Securase will not help. Securase - Local NSF Security Remover Tool will not decrypt encrypted NSF files. Securase is fast and easy. No technical or skills are required to remove local security from local NSF database. Notes Local Security Eraser tool is compatible with Windows 98/ME/2000/2003/XP and Vista to open NSF Database of other users. Tag:



Norton 360
(image) 10% off - Top Norton Products (Code: 10NortonStore / Exp. 7/31) Click Here Norton 360 is a comprehensive consumer security solution that will offer a full circle of protection and eliminate the need of purchasing and managing multiple products. Defends your PC against a broad range of threats Safeguards against online identity theft Protects important files from loss Keeps your PC tuned up for peak performance Provides a hassle-free user experience Protects against the latest online threats Key Features: PC security defends you against a broad range of threats Transaction security safeguards you against online identity theft Automatic backup and restore protects your important files from loss PC tuneup keeps your PC running at peak performance Embedded support components diagnose problems and help you quickly resolve common issues Includes free support via email and live chat Includes 2GB of online storage for photos, music, contacts, & financial documents (option to purchase additional storage) Includes protection updates and new product features as available throughout the renewable service period On-going Protection keeps your computer protected from the latest Internet risks by automatically renewing your subscription at the regular subscription price (plus applicable tax), so you don't have to. For more information, click here. Tag:windows xp windows vista norton ghost 2003 norton commander norton disk doctor norton antivirus norton ghost 8 xport 360 pc security full 360 diagnose problem norton anti support windows xp test online online threats includes 2gb



Audio Watermarking Tools
(image) Audio Watermarking Tools 2 (AWT2) of www.audiowatermarking.info are shareware utilities for embedding (and extracting) short data payload within audio streams (wave files). The tools are distributed as a package of GUI and console utilities running on Microsoft Windows 7/Vista/XP/NT/2000/Server, Apple Mac OS X and Linux; x86 and x64 versions of the binaries are available. The watermark is highly robust. It survives almost all kinds of audio conversions such as transcoding using MP3, Ogg Vorbis and other lossy coders, acoustic coupling (transducing via air), effect processing from a simple EQ to an extreme dynamic range compression, reverberation, echo, and more. AWT2 package is free to try. Evaluation (demo) version of AWT2 with limited functionality is available and can be downloaded absolutely free. Despite its limited functionality, the demo package offers enough flexibility to perform a variety of performance tests so that you can decide whether AWT2 suits your needs before buying a fully functional version. Tag:audio watermarking wave command line digital watermarking watermark utilities



AVG LinkScanner
(image) Data Snatchers hide in even the most trusted websites, to steal your personal information: credit card details, private files & your identity. The Data Snatchers move fast - a page that was safe yesterday may not be safe today - and your antivirus and firewall won't help you. Antivirus? Firewall? LinkScanner®? Antivirus and firewall software is no longer enough. The threat has evolved. Only AVG LinkScanner® can protect you from the Data Snatchers and raise your internet security to the next level. Look before you click AVG LinkScanner® puts you one step ahead of the Data Snatchers by analyzing every website behind every link you click or type into your internet browser. LinkScanner® lets you know if the webpage you are visiting is safe before you even get there. Instant and Real-time LinkScanner® works in real-time - 24/7/365 - total protection that is one-step ahead of the Data Snatchers. Installation is simple, free, works with your existing antivirus software, and won't slow down your computer. The Data Snatchers don't hang around, why are you? Install LinkScanner® now for complete peace of mind. Tag:avg free update www.avg.com avg 7.5 avg avg free credit card slow down antivirus software private file r type credit c avg antispyware 2.1 nt and credit card details type into every web avg e linkscanner avg home edition