Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type

Security

Results 21-40 of 550
Live Blacklist Spam Bot/Crawlers IP Addresses for Web Servers 2014 year (50,000+ IP in blacklist)
posted bymyip.msinSecurity
We have created Live blacklist of IP addresses based on statistics from our big websites which we operate. To our sites each day come tens of thousands of visitors many of them identifiable but also come various non-identifiable crawlers, spam bots. Our unique protection system allow easy identification of the real visitors ip with any bots/crawlers ip addresses and other threats include unknown spam bots. The operating principle of our protection system is simple: We allow any user to browse 10 pages on any of our websites, and after system start to display free registration form on the website and to block all pages on website. Crawlers/bots ignore such instructions. If user agent line has no any identification of that bot and is masking itself as a normal user we will automatically add this IP address to our blacklist (i.e. our Blacklist has no search crawlers like Google Bot IP addresses, Yahoo Bot, Bing Bot, Baidu, etc) More info - http://myip.ms/info/about .
(6 ratings)
Reviews0
PriceFree
Views1254
Sticky Password
Sticky Password gives you strong password protection. With automatic login and form-filling, your online transactions will be faster and more secure. Synchronization via our cloud servers or local Wi-Fi ensures that your passwords are always available on all your devices. AES-256 - the world's leading encryption standard, and our password database auto-lock - on your computer, tablet and smartphone, provide a bulletproof vest for your passwords.
(0 ratings)
Reviews0
PriceFree
Views297
Event Track Event Management Software
Event Track makes it easy for you to register, badge and track your attendees. Register attendees online or on-site at reception desks and self-registration kiosks. Design and print plastic ID cards or paper badges using the included industry-leading ID Flow badge design software. Check in and record attendance using networked check in stations or handheld scanners. Secure network data-sharing and reporting allows for centralized management.
(0 ratings)
Reviews0
PriceUSD 1,499.00
Views375
Member Track Member Management Software
Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
(0 ratings)
Reviews0
PriceUSD 1,499.00
Views317
Manage Active Directory
Expanding over a list of outstanding features, Lepide Active Directory Manager is an impeccably designed tool for AD Administrators for managing AD and its objects. Its intuitive interface offers the Admin a central location for managing multiple domains, servers & workstations, local or domain users, groups, tasks, network shares etc comprising of AD management and generating AD reports.
(0 ratings)
Reviews0
PriceUSD 229.00
Views234
Lobby Track Visitor Management Software
Visitor management software for visitor registration, tracking, and reporting. Pre-register visitors online or register onsite. Issue visitor badges. Maintain visit logs. Check against watch lists (FBI's most wanted, etc.).
(0 ratings)
Reviews0
PriceUSD 999.00
Views261
Aobo Internet Filter for Mac
Aobo Internet Filter for Mac is an Internet filter and web filter specially designed for Mac OS X users. The Mac Internet filtering features ensure that all the Mac users are protected from unwanted websites. Aobo Mac Internet Filter records the websites visited even in private browsing mode of the browser. It also provides feature to block programs on Mac OS X, which enables you to block games or any other applications from running on your Mac easily.
(0 ratings)
Reviews0
PriceUSD 49.95
Views233
Amac Keylogger for Mac OS X
Amac Keylogger for Mac OS X is a Mac spy application that allows users who want to spy on a Mac machine to secretly record everything on the Mac including Passwords, Keystrokes, Chat conversations, Websites visited and capture screenshots. The logs recorded by Amac Keylogger for Mac can be sent to your Email or an FTP server so that you can check the logs everywhere and take better control of what's happening to him/her. Powerful, reliable and stealthy Amac Keylogger for Mac OS X is your best Mac Keylogger program for Parental Control, Employee Monitoring and Mac Computer Monitoring. Keep instant activity information of your Mac with Amac Keylogger for Mac OS X from right Here and Now!
(0 ratings)
Reviews0
PriceUSD 79.97
Views253
BlazingTools Perfect Keylogger for Mac
posted bykourovinSecurity
Perfect Keylogger for Mac has the best quality on the market for the best price! With this Mac key logger you'll receive all keystrokes, IM chats, websites visited and screenshots from your Mac by email - or get everything uploaded to a website. Stealth surveillance software for Mac - as easy as never before! Watch your kids or employees, clear your doubts and even more! New version also records passwords.
(0 ratings)
Reviews0
PriceUSD 49.95
Views239
REFOG Mac Keylogger
posted byrefoginSecurity
Refog Keylogger for Mac removes the secrecy from family computer activities. Users worried about the safety of their children from Internet predators or of the sanctity of their marriage from cheating spouses can use this keylogger for Mac to monitor a comprehensive history of visited sites, opened applications, and typed messages without the user even knowing the software has been installed.
(0 ratings)
Reviews0
PriceUSD 49.95
Views372
Outlook Express Protector
posted bysoftheapinSecurity
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get access to them when the program is active. When you try to start Outlook Express or open Address Book, the program requests you to enter a password to grant access. If a user does not enter a valid password or cancels the authentication dialog box, Outlook Express or Address Book will not be opened and the data files will not be accessible for any third-party applications. This means that if Outlook Express Protector is active, nobody can steal or spoil your data you have in your Outlook Express.
(0 ratings)
Reviews0
PriceUSD 29.00
Views191
Easy Disk Drive Safeguard
posted bysoftheapinSecurity
Easy Disk Drive Safeguard is a password-protected security utility that you can use to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for them. When you hide or lock your drives, they become hidden or unavailable in all Windows software such as Windows Explorer, Outlook Express, Microsoft Office and so on. You can disable the AutoRun feature for specific drives or for certain drive types. If you disable the AutoRun feature for drive types, you can, for example, disable the AutoRun feature for all USB drives, for all CD/DVD drives, for all RAM disks or for all removable HDD drives. The design of the program is very simple. The main window contains the boxes with drive settings that represent individual drives and the toolbar used for applying changes.
(0 ratings)
Reviews0
PriceUSD 39.00
Views213
1st Network Admin
posted bysoftheapinSecurity
1st Network Admin offers a comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to almost every corner of Windows for all PC workstations you have in your network, apply executable patches to them remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. 1st Network Admin is very useful for Internet cafes, public-access terminals, libraries, large corporations, schools and for other applications where you have to deal with lots of stand-alone PC workstations to be secured and constantly maintained.
(0 ratings)
Reviews0
PriceUSD 59.00
Views197
Family Keylogger
posted byfkn0001inSecurity
Family keylogger is complete windows monitoring software allows parents to track all activities carried out on computer system by kids, spouse and children in their absence. Family keylogger is free parental control software records each voice chat conversations, sending and receiving mails, username, passwords, installed websites, visited sites and capture screenshots on every mouse click and stop taking screenshots during PC idle time.
(0 ratings)
Reviews0
PriceUSD 69.90
Views259
The Protector: Unified Threat Management
posted bysecpointinSecurity
The Protector is one of the industry leaders in unified threat management, offering a complete solution to protect large corporate networks of up to 1000 users with a single, centrally located appliance. If your business is feeling the damage done by hacking attempts, malicious software and a never-ending influx of spam, then administrators should certainly start looking for unified threat management solutions such as the Protector.
(0 ratings)
Reviews0
PriceUSD 195.00
Views235
The Best Keylogger
The Best Keylogger is a Invisible Keylogger surveillance, Keystrokes Recorder, Spy Software tool that registers every activity on your PC to logs. The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail. With this tool you will have TOTAL control of what is happening on your computer.
(0 ratings)
Reviews0
PriceUSD 49.00
Views631
Lock Folder Lock File!
This site is the place to go if you want to dramatically improve the level of security on your computer. Here you can find out more information about a powerful utility called Lock Folder Lock File!, which allows you to lock specific files, folders or even entire drives. You can find out all the information you need on this easily navigable site, complete with screenshots, detailed overviews and downloads for trial versions.
(0 ratings)
Reviews0
PriceUSD 34.95
Views284
Htpasswd Generator Tool
posted byrithikainSecurity
Protect the files, directory or folders within your site by encoding the password generated with the free Htpasswd generator tool.
(3 ratings)
Reviews0
PriceFree
Views422
SecureTower
SecureTower is your ultimate solution for data leak protection. An advanced and extremely effective system, it will help you to monitor how the Internet resources in your company are being used. You can stay in complete control by being constantly aware of any unauthorized attempts to transfer confidential information over the Internet. It keeps track of all user activities in the network and immediately notifies you if it detects leaking data
(0 ratings)
Reviews0
PriceUSD 3,995.00
Views209
VarySafe
posted bycheewooinSecurity
VarySafe is a document security program which makes data encapsulated stand alone executable viewer file. This viewer decrypts and view internal encrypted data only in the authenticated computer by using hardware fingerprint identification. It is also possible to set the expiration date and user's permission type (view or view + print). Any printing data can be used as a data input by using VarySafe printer.
(0 ratings)
Reviews0
PriceUSD 299.00
Views216
Results 21-40 of 550