Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: S :: security
Display: short descriptions | full descriptions
  • Fear... what do you know about fear? Paranoia, delusions of persecution are the them of the game Slender. You think you know the full story. Slender, proximity awareness breeds insecurity - all which will make you run, looking for clues to determine the real situation. But is it already too late? Everything depends on you.
  • File system monitor filter can monitor the file system activities on the fly. With file system monitor filter you can monitor the file activities on file system level,capture file open,create, overwrite, read, write,query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.
  • File system control filter can control the file activities, which you can intercept the file system call, modify its content before or after the request goes down to the file system, allow/deny/cancel its execution based on the filter rule. You can fully control file open/create/overwrite, read/write, query/set file attribute/size/time security information, rename/delete, directory browsing these Io requests.
  • Need to protect your important and valuable pdf data with password in non-editable mode? Try pdf encryption software which uses strong 128 bit protection key to encrypt pdf data. Tool adds pdf user password as well as pdf owner restrictions password. User password stands for pdf open restriction and prompts to type when an unauthorized user tries to open it. Only valid and authenticated person who know the password can open and view pdf. Owner password stands for pdf permission password which restricts user to edit document, blocks all types of modification like pdf page split merge extract etc, disable pdf printing and content copying, deny form filling, signing and commenting etc. Software uses 128 bit, 256 bit strong security key and supports both RC4 and AES encryption level protection. Batch pdf security software is very easy to use even by novice user. Download free evaluation copy to lock pdf document with hard security settings. Trial shows watermark on output documents however registered copy works w ...
  • Any hack consists of a sequence of several steps. It's the prequel of Tower Bombarde - the first steps in hacking servers and security systems. In this case the player should crack Cyber Brain which represents a labyrinth stuffed with security systems and various puzzles.
  • SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It can protect any TCP traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for developing applications using various IDEs as RAD Studio, Delphi, C++Builder, Lazarus (FPC) on Windows, Mac OS X, iOS, Linux, FreeBSD.
  • The Nero BackItUp backup combo offers local automatic backup (to hard disks, external storage, CD/DVD/Blu-ray ) and your very own personal online hard disk for that extra bit of data security! Our zero-hassle backup plans cover your PC, laptop, tablet and even Android smartphone and protect you from data loss in just three easy steps.
  • RegRun Suite is a complete computer security software. RegRun Platinum includes 24 system utilities for computer protection against Rootkits/Trojans/Adware/Spyware components. It increases the speed of Windows boot-up process, making the computer management easier. RegRun Suite is compatible with all known antiviral software and may be used to improve computer security.
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • SMTP Server Pro is a powerful easy-to-use SMTP POP3 mail server program designed for satisfying the requirements of huge organization in high-volume messaging. It is simple, light-weight and reliable; it has security features to prevent DDoS attacks and block SPAM. As a personal solution, it is ideal for laptop PC users who travel a lot and have to use different ISP on the run.
  • Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
  • Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
  • Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. Free SMTP Server supports all email programs like Outlook Express and Eudora
  • Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents, and also clean all the temporary files left by your system. Evidence Exterminator is a complex security system that ensures your privacy by destroying all hidden information connected with your activities on demand, according to a user-defined schedule or on each boot/shutdown.
  • Did you know that when you send your email messages, they do not go directly to the recipient mailboxes? Did you know that first of all, your Internet Service Provider gets all your email messages, stores them somewhere on its mail servers and then delivers the messages to your recipients leaving copies of your messages in its database? Do you know that someday all the information kept on the servers can be easily used against you?
  • Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
  • Professional Video Surveillance Software With Support For Multiple IP and USB Cameras. Security Monitor Pro is the perfect solution for complex security problems. It can monitor and record from multiple cameras simultaneously, create continuous video recordings, and view multiple cameras in a single window. Each camera can be configured individually. When motion is detected, it can send email and/or record audio / video.
  • All-in-one analysis, unprotection and data recovery for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). With Access Forensics you can recover database password, user-level security records (to recreate lost mdw), edit database properties and access rights, remove VBA protection and more. It shows database structure, objects properties, VBA source code, Table content, etc. Recovers deleted tables, records (rows) and columns.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Ultra fast Professional SMTP/POP3 server. Can be used as a corporate or personal server. Use with any SMTP compliant mail client. Accept mail on behalf of your users. Simple, powerful and bullet-proof. Lots of security features to protect the server from DDoS attacks and block SPAM. Multiple SMTP gateways in case you cannot deliver your email directly to the destination. Use parameterized mailing to send customized messages to many recipients.
  • 1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
  • Organize thousands of Web Sites by Categories, Priorities, Search Words, and Users in a Secure Database. Collect Web Sites while browsing the internet, while simultaneously using any number of Browser Windows. Add the results of an internet search or the accessible links on a web page to the organizer database. You can view all your collected web sites by category, priority, web site name, and any of three search key words. Select a web site on the table and automatically go to that web site. You can create any number of Web Site Lists, and quickly browse the internet using your list with the click of your mouse. You can send and receive messages with web site list attachments or Zip File attachments by email. Internet Explorer Favorites can be selectively imported to the Net Viewer database showing the list of Internet Explorer Favorites. Any Web Site Page address can be exported back to Internet Explorer Favorites. You can save Web Sites with passwords in a separate table and associate with another Web Site ...
  • Organize thousands of Web Sites by Categories, Priorities, Search Words, and Users in a Secure Database. Collect Web Sites while browsing the internet, while simultaneously using any number of Browser Windows. Add the results of an internet search or the accessible links on a web page to the organizer database. You can view all your collected web sites by category, priority, web site name, and any of three search key words. Select a web site on the table and automatically go to that web site. You can create any number of Web Site Lists, and quickly browse the internet using your list with the click of your mouse. You can send and receive messages with web site list attachments or Zip File attachments by email. Internet Explorer Favorites can be selectively imported to the Net Viewer database showing the list of Internet Explorer Favorites. Any Web Site Page address can be exported back to Internet Explorer Favorites. You can save Web Sites with passwords in a separate table and associate with another Web Site ...
  • SpyShelter Free is a free version of SpyShelter Premium. It is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. SpyShelter free is compatible with 32 bit systems only.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware