Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type

Security

Results 321-340 of 549
WS Handy Keylogger
posted bywsteaminSecurity
Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conversation while you are asleep? Are your kids taking secret chat conversations with an adult stranger? Are your employees emailing your business secret to your competitors? WideStep Handy Keylogger is just what you need!
(0 ratings)
Reviews0
PriceFree
Views823
PrimaSoft Encryption - Service Edition
Encryption Software Service Edition with Scheduling (Windows): easily and quickly run scheduled encryption, decryption sessions as a Service process. Use the latest industry standard strong encryption algorithms (AES known as Rijndael, Twofish, RSA,..). Software features: log files, email notification, encryption templates, flexible scheduler, automated compression, and more.
(0 ratings)
Reviews0
PriceFree
Views736
CommView
posted bytamosoftinSecurity
CommView is a program for monitoring Internet and LAN activity capable of capturing and analyzing network packets. It gathers information about data passing through your dial-up adapter, Ethernet or Token Ring card, or loopback interface and decodes the analyzed data. With CommView you can see the list of network connections and examine individual packets. Packets are decoded down to the lowest layer with analysis of most widespread protocols.
(0 ratings)
Reviews0
PriceUSD 99.00
Views918
Security Log Tools
Open Source VB Script for Wondows 2000, 2003, and XP so you can customize for your environment. The Security Log Alerter monitors for potentially hazardous actions to the local machine as well as to active directory. It then sends a detailed alert and/ or puts the data to the SecAlerts table in the database. *Some examples of what is collected and alerted on by default: -Addition to and removal from Domain Admins Group -Addition to and removal from Enterprise Admins Group -Addition to and removal from Schema Admins Group -OU Creation -OU Deletion -DC Creation/ deletion -Admin account password change -Domain policy modification -Trust relation modifications -Scheduler jobs created -System Time Changed -Event Logs cleared -And attempts to log into the DC local and remote -Kerberos policy changes
(0 ratings)
Reviews0
PriceFree
Views1177
FOX Password Safe
posted bysteveinSecurity
FOX Password Safe is a reliable, secure and essential tool that allows you to safely and easily store all your passwords, web site logins and other important information. It uses totally secure AES 256 bit encryption to keep your information safe. FOX Password Safe helps to make online banking and credit card transactions more secure. It can lock down Internet Explorer to prevent Spyware from loading when you load a web site from your list. You can load your web sites securely and easily from an icon in the Windows system tray. FOX Password Safe can generate secure passwords for you and expire them after your desired time period. It will then remind you to change your password and will automatically back up your old password incase you forget it. There are many configuration settings to allow you to use FOX Password Safe in the way you choose. It will pop up a small dialog when you load a web site if you desire allowing you easy access to your login information. It does NOT slow down your computer or browser or install any browser plug-ins, giving you a secure and clean password management tool.
(3 ratings)
Reviews0
PriceFree
Views942
MaxmillianSoft Password Saver
posted bysaundersinSecurity
Your active use of the Internet requires the memorization and tracking of a lot of passwords. Keeping this type of information on your computer in the form of text or spreadsheet files is an extremely high risk proposition. Are you really sure that nobody else can retrieve them? Now you can store all your passwords for easy access in one secure, encrypted location. Features: Saves all your user names, passwords and the locations they are used at. Password protected, now you only have to remember one password instead of hundreds! Sortable lists makes it easy to find what you're looking for. Saves all your user names, passwords and the URLS where used. Features: 1. Only one user assigned password to remember. 2. Copy your user name or password with the click of a button. 3. All information is encrypted and secure. 4. Quicklinks take you directly to the website or location where your password is used. 5. Compact, user friendly interface.
(0 ratings)
Reviews0
Price 19.95
Views558
Powered Keylogger
posted byinfoinSecurity
Powered Keylogger lets you invisibly monitor all computer activity, Internet usage, keystrokes, system keys, buttons pressed in DOS boxes, Java applications, passwords, sent/received emails and more. Runs at the lowest kernel level providing unique stealth functions. Undetectable by a file search, managing shells, in Tasks or Processes List, in registry etc. Uses a secret-word method to unhide the keylogger, delivers logs to any email and more.
(6 ratings)
Reviews0
Price 69.95
Views1291
Internet Kiosk Pro
Internet kiosk public access PC software to restrict access to system; allow only certain applications and features such as Internet Explorer. Limit access to the PC desktop using authentication by username and password, time-locked serial number to allow user to access PC for a given period of time only or by a combination of both. The best solution for Internet cafes public libraries, information terminals, home PCs to limit children activitie
(0 ratings)
Reviews0
PriceUSD 69.00
Views1033
Mask Your Web Server
Masking or anonymizing a Web server involves removing identifying details that intruders could use to detect your OS and Web server vendor and version. This information, while providing little or no utility to legitimate users, is often the starting place for crackers, blackhat hackers and "script kiddies". This article explores some ways you can minimize the risk of such detection. Most of the following examples focus on Microsoft's Internet Information Services (IIS) Web server, since it has been most widely lambasted for its vulnerabilities, but some Apache detection countermeasures are also covered. While IIS users probably have the most vested interest here, server anonymization is relevant to anyone responsible for administering a Web server.
(0 ratings)
Reviews0
PriceFree
Views561
SpiderArmor
posted byalentyevinSecurity
If you own a web site with imporant information, this software is the only product available today (to the best of our knowledge) that can secure your data from spidering programs. This software is made as plugin for IIS and can be used with any scripting language supported by Microsoft IIS server. SpiderArmor makes your pages visible to users but not available for spidering programs that will make your data safe from scrapping by others!
(0 ratings)
Reviews0
PriceUSD 99.00
Views621
Password Generator
posted byLaturnerinSecurity
Password Generator is a software program to generate random passwords containing a varied set of characters, including lowercase and uppercase letters as well as numerals. You will never have to think of another random password again. Save the password to a .txt file and you are good to go! Password Generator creates passwords that are very difficult to crack or guess due to an optional combination of lower and upper case letters and numbers.
(0 ratings)
Reviews0
PriceFree
Views689
Evidence Sweeper
posted byprivanyinSecurity
Evidence Sweeper is the best choice to safely and completely increase system performance and completely clear away your on and off line activities. It's an Internet cleaner, system cleaner, registry cleaner and privacy protector all in one! Evidence Sweeper can protect you from the dangers of the Internet! He clears sensitive areas of your hard disk also clear all records of the most recently accessed documents or all previously visited web-sites
(0 ratings)
Reviews0
PriceUSD 35.00
Views693
Easy File & Folder Protector
posted bysoftstacinSecurity
Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his own
(0 ratings)
Reviews0
PriceFree
Views729
Advanced Internet Kiosk
posted bysoftstacinSecurity
Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
(0 ratings)
Reviews0
PriceFree
Views881
Advanced Desktop Shield
posted bysoftstacinSecurity
Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layouts, which include desktop files and folders, placement of desktop icons, wallpaper and screen saver. If you choose to lock desktop layout, each time PC is rebooted, the program will return everything on the deskt
(0 ratings)
Reviews0
PriceFree
Views692
Access Manager for Windows
posted bysoftstacinSecurity
Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
(0 ratings)
Reviews0
PriceFree
Views759
1 Click & Lock
posted bysoftstacinSecurity
1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
(0 ratings)
Reviews0
PriceFree
Views752
1 Click & Go
posted bysoftstacinSecurity
1 Click & Go looks as a Windows toolbar designed for easy access, open and execute files and folders that you often use. Program similar well-known Microsoft Office Panel, but not lose configuration in case of a system crash. It supports the Drag&Drop and has a simple and comprehensible interface. There is a multi-user mode - some user can have its own set of program. This set is protected with a password and encrypted. To change a set you need o
(0 ratings)
Reviews0
PriceFree
Views739
Outlook Express Backup Restore
posted bysoftstacinSecurity
Outlook Express Backup Restore lets you create backup archives of all your Outlook Express data and restore the data when it is necessary. This utility lets you not only restore your Outlook Express data after a crash, but also transfer your data between different computers when you upgrade hardware. The program supports multiple user accounts and identities and allows you to put your data on virtually any storage media including CD and DVD.
(0 ratings)
Reviews0
PriceFree
Views772
Hide Files & Folders
posted bysoftstacinSecurity
Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
(3 ratings)
Reviews0
PriceFree
Views824
Results 321-340 of 549