Security

Security Software Tools and Utilities. Find the software tools and utilities your looking for from Hot Scripts.com

Results 261 - 280 of 558

« 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18...27 28 »
More Options
  • ServerMask removes, randomizes, or modifies the HTTP server resonse header to help hide IIS servers from bots and worms looking to find servers to exploit. It is implemented as a super-fast ISAPI filter and is easy to install and configure. Improve IIS

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • This utility creates password protected Web pages. It takes any HTML file and creates new "secure" HTML file that is encrypted and asks for a password when you try to open it. The program is also able to restore the original file.

    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • ABC CHAOS allows you to easily encrypt files into your personal data archive. The additional special protection feature completely elimites the ability to selection the password to the encrypted information that was used in generating the passwords and

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • With CHAOS+PK you can protect the privacy of your e-mail messages and files by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Simply drag-and-drop files and folders to protect sensitive documents, and then enter an encryption key to encode, and decode the files. It uses the stream cipher algorithm. Chaos (Chaos Cryptosystem) security application. High speed, variable-length

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • BitNinja is a server defense network. As an integrated solution it combines the most powerful defense mechanism, and this way it can provide a broad level of protection. Most of the cloud-based security solutions require your traffic to be redirected

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It can protect any TCP traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Network Password Manager provides convenient and easy centralized solution for enterprise password management for organizations of any size. In addition to providing all of the standard functions, it also presents many advanced features supported by a

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Kiosk software locks down your public computer or kiosk, helping you securely display your website or application. It prevents hacking and downtime by restricting access to the system, desktop, drives, folders and programs. The software blocks the system

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • With iNet Protector you can restrict Internet access at specified times or on demand. You can disable connection completely or limit Internet to work with allowed programs and services only. In order to fully enable Internet access, user defined password

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • This module allows you to clean your data of injections. Although it's not mandatory, it's advised that you also buy the nominally-priced SQL Injection Scanner as well - SQL Injection Scanner (scanning only module) - SQI127. The scanner (SQI127) will

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Has your data been injected-into by a hacker? Download and run this nominally priced tool to find out safely and reliably. Works for SQLServer, MySQL, and Access databases. If your data has been injected-into, then you can either clean your data

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Chili Antivirus is the indispensable anti-virus software that protects against virus attacks. It is based on an award-winning technology as rewarded by AV-TEST with the accolades of having both the "Best Protection" for three consecutive years, and also

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • This tool scans website and try to detect any possible harmful factor and tells whether website is safe or contain any threats. This tool also check whether the website is blacklisted or not. This tool uses Google Safe Browsing, Norton Safe Web, McAfee

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Chili Antivirus is the indispensable anti-virus software that protects against virus attacks. It is based on an award-winning technology as rewarded by AV-TEST with the accolades of having both the ''Best Protection'' for three consecutive years, and

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Chili Internet Security is an award-winning security software. It is based on an award-winning technology as rewarded by AV-TEST (The Independent IT-Security Institute), whom for three consecutive years have named Chili Internet Security as having the

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Control employees and monitor activities of advanced computer users with REFOG Personal Monitor. The PC monitoring tool monitors and logs keystrokes, clipboard, records started software and Web pages opened by your employees or room mates. Immediate

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Refog Keylogger for Mac removes the secrecy from family computer activities. Users worried about the safety of their children from Internet predators or of the sanctity of their marriage from cheating spouses can use this keylogger for Mac to monitor a

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • Mil Shield protects your privacy by removing all tracks from your online or offline PC activities. Mil Shield cleans the following tracks: AutoComplete forms and passwords, all WebCacheV01.dat and Index.dat files, temporary Internet files, cookies, all

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose
  • LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories

    ... (show more)
    Thanks for your rating. Consider leaving a review and let others know more about your experience. Add ReviewClose

Results 261 - 280 of 558

« 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18...27 28 »