Sort Listings By
By Customer Review
Anti-Spam Email Obfuscator
Stop email addresses on your site from being harvested by spammers. Simply enter the URL of your contact page, and our automated email obfuscator will encode all email links it contains and email it back to you.
Using phishing doctor You can archiving log files, viewing log entries, or Setting the alert event level.It responds to two types of alerts: Spam Mail Alerts and Spam Site Alerts. The Spam Mail Alert is a popup window that is displayed when you recieve an e-mail that is suspected to be a phishing e-mail. The Spam Site Alert is a popup window that is displayed when you try to navigate on a site that is suspected to be a phishing one.
TrustPort Archive Encryption
This software is designated for Windows operating system. It allows on-demand encryption and decryption of files and folders into PDA compatible CPH format or to create encrypted archives. There is also a possibility to create self-extracting EXE archives that can be unpacked independently on TrustPort Encryption. These archives can be also packed into ZIP envelope to be able to send them as e-mail attachments.
Antivirus Program, Personal Firewall, Encryption Application TrustPort Phoenix Rebel Workstation is a security platform consisting of an antivirus program, personal firewall, encryption application, digital signature and on-line encryption tools. It is designed for the protection of individual workstations in the network as well as those of separate users.
TrustPort Servers can help to solve your problems with the viruses that are contained in files and documents, which are stored at and copied to Windows file servers in company's local network area. Components: - TrustPort Antivirus intended for permanent protection of data being stored on file-servers. - TrustPort Firewall is a basic component of server's protection from outer intrusion.
TrustPort Disc Shredder
The Disc Shredder utility removes all the data from your disc. The software runs directly from the boot diskette or CD. The application uses DOS operating system so there is no need to remove the disc for deletion from the computer and connect it to another one with functional operating system Windows. By using Disc Shredder you can easily and safely remove all data on the hard disc located in your PC.
Secure Storage Pro
Want to be absolutely sure your data is always protected? Want to have your files encrypted but don't want to hinder access to them? Get Secure Storage Pro, a virtual disk utility that encrypts data on the fly. Place all your confidential data (files, documents, pictures, e-mails, etc) onto a virtual disk and set the password. Only the password bearer will be able to access data, the others won't even know it's there! 100% FREE Trial.
IM Lock Home Edition Single User
IM Lock controls and blocks access to Instant Messaging and peer to peer services that put your family at risk from internet hazards. Free trial version available - sets up in less than a minute. Blocks all popular services: MSN Messenger, Yahoo Messenger, ICQ, AIM, Skype, eMule, iTunes, and many more. Also controls web browsing. IM Lock is continually updated to detect and block new programs as they are released. Easy setup and administration.
Public Access Desktop
Make a foolproof public access workstation, protect the critical files, and manage applications to be run. You can create an Internet Kiosk for cybercafe, library information terminal, in-store terminal or restrict children activities on home PC, etc. Set the proper type of access to a locked desktop such as user-name and password authentication, time-locked code (that allows users to access PC for a given period only) or a combination of both.
Max Spyware Detector
You can get infected with spywares,malwares & other malicious programs just by visiting a website or by installing a software which seems genuine.If you are infected with even one of this malicious programs they will install and download more spywares, intrude your Privacy, utilize your resources.Spyware Detector actively monitors the programs running on your PC & if it detrects any spyware programs trying to start it will stop it instantly
System Optimizer And Tweaker
With System Optimizer And Tweaker you can control your Windows system ,it includes many powerful tweaks and hidden Registry settings. The simple user interface enables fast access to settings that affect the speed, security, efficiency, and convenience of your computer, System Tweaker And Optimizer also includes tweaks for many known software applications,Win Tweak Manager is the best utility for modifying system settings.
Mom Knows Best
Mom Knows Best is an easy way to restrict and monitor usage of your computer. Our logging features, keyword triggers and our manual white/black lists make Mom Knows Best a great solution for home or small business use. See whats being typed into any program, when its typed and by the user that typed it. Use keyword triggers to restrict a broad range of web sites quickly. Or restrict by domain and file rules.
Max Secure Content Audit Enterprise
Content Audit is a powerful tool that allows administrators to scan all the Internet content enters into their network. It comes with maximum protection and pre-set monitoring functions, which can easily be customized to meet department (group) or user needs. Administrators in the organization decide what type of content is appropriate for each department (group) and user. It is based on the client server architecture and uses push deployment
Elite Spy Software
Elite Spy Software is the professional monitoring tool. Fast and Powerfull! Elite Spy Software helps people keep tabs on what is going on on their computers while they are away or while they are operated by other users. Elite Spy Software works in low-kernel 100% stealth mode and gurantees that all keystrokes on the local PC are recorded and stored into encrypted user-friendly report, which can be secretly e-mailed to your mailbox.
HTML Password Lock
Internet Secure Tunneling
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road.
DiskLogon is one of the most powerful and securest logon software. Like smart card logon software, it enables you to log on to your computer with a portable disk. It can save you the trouble of typing your user name and password every time you log on. All you have to do is to plug your portable disk in your computer, and you can log on to your computer quickly and safely.
Pivo SSH Component
Pivo SSH was developed for commercial organization for securing remote shell access. The protocol supports compression and tunneling multiple TCP connections over one secured connection. SSH supports various authentication schemes such as password-based, keyboard-interactive, allowing the client authorize itself using several schemes at the same time. Some SSH implementations also support PKI infrastructure for server and client authentication.
Pivo Security Component
Modern software must be more than secure, it must be unbreakable. No home-made solutions, nothing like that. The proven way is complete power of standard-based software components which offer you unprecendented level of security of your information! Think about S/MIME, PKI, PGP, SSL/TLS, SSH, SFTP, PDF ... Too much TLAs? Each abbreviation absorbs knowledge and experience of avowed security specialists. And you've got this all with Pivo.
Simple for beginners. You can use SpyDefense's Express mode to quickly and easily remove spyware from your computer. Using settings designed by our experts, SpyDefense checks for spyware in all known locations. Complex for advanced users. Advanced and Custom scan modes allow you to customize SpyDefense to provide the exact level of protection you need. Intuitive for everybody. SpyDefenses unique user interface has an user-friendly design.