Want to hire a development team?
Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type

Top Rated Scripts | Tools & Utilities | Security

Results 81-100 of 511
Access Password
posted bytanyalbinSecurity
Complete password recovery solution for MS Access. Access Password can recover both database and user passwords (most other tools do not recover user passwords). Access Password supports all MS Access versions from v2.0 through 2003.Using Access Password, you can recover passwords for any Jet databases, not only Access databases.
(1 ratings)
Reviews0
PriceUSD 45.00
Views975
ArtistScope Secure Image
posted bysupportinSecurity
Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Image encryption protects the image that can be retrieved from the Temporary Internet Folder and cache. Options include targeted hyperlink on the image, status bar and image messages with optional border frames. Registration keys can be obtained by registering online. Registration is free but a web site address must be given to enable the Domain Lock. Version 2 series supports all popular browsers from 4.1 and higher on PC (98.5% of net traffic). V2.2 is free for non-commercial use. Also included in the download is the commercial version of the 2 series with batch import and processing, and Secure Image Pro which is available for and supported on macs. Pro includes several more options for display effects, cross platform support and batch processing for the professionals.
(0 ratings)
Reviews0
PriceUSD 85.00
Views3777
Absolute CHAOS
posted byreplyinSecurity
Simply drag-and-drop files and folders to protect sensitive documents, and then enter an encryption key to encode, and decode the files. It uses the stream cipher algorithm. Chaos (Chaos Cryptosystem) security application. High speed, variable-length keys, high reliability, and user friendliness allow you to easily encrypt an entire harddisc.
(0 ratings)
Reviews0
PriceFree
Views2079
CHAOS Public Key
posted byreplyinSecurity
With CHAOS+PK you can protect the privacy of your e-mail messages and files by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you e-mail with their digital signature, CHAOS automatically use a copy of their public key to check the digital signature and to make sure that no one has tampered with the contents. After obtaining only one message from other of CHAOS user enciphered by your public key, the program independently shapes an one-time symmetric key for operation with this user and in further will use for operation with him only one-time symmetric key varying at each conversation. Length of these keys in each case will exceed a size of the ciphered data.
(0 ratings)
Reviews0
PriceFree
Views2012
Titan
posted bysupportinSecurity
Titan, the application firewall from Flicks Software protects your IIS server against procedures executed by entire classes of hack attacks, rather than looking for individual characteristics of known worms and viruses. By protecting your IIS server procedurally, Titan is able to protect against both worms and viruses before they are discovered. Unlike other antivirus applications, such as intrusion detection systems and network firewalls, Titan is not limited to just previously analyzed viruses. Titan stops brute force attacks, too !
(0 ratings)
Reviews0
PriceFree
Views1289
ServerMask for IIS
posted byinfoinSecurity
ServerMask removes, randomizes, or modifies the HTTP server resonse header to help hide IIS servers from bots and worms looking to find servers to exploit. It is implemented as a super-fast ISAPI filter and is easy to install and configure. Improve IIS security in under 2 minutes with ServerMask.
(0 ratings)
Reviews0
PriceFree
Views1043
IE-3PG
posted bynmrinSecurity
IE-3PG disables logging of your form data, usernames and password by autocomplete. It also has an advance guard mode where it can disable logging even if access to the PC's control panel or registry is locked by the system admin.
(0 ratings)
Reviews0
PriceFree
Views1506
ServerMask for IIS
Broadcasting clues about a Web server via its HTTP header makes it easy for a potential intruder to complete his/her first hacking task: identifying your operating system and Web server. ServerMask 2.2 from Port80 obscures a Windows Web server removing or modifying unnecessary HTTP and SMTP response data, the most obvious signs that you are running IIS. The tool installs easily, is stable and efficient, and is available for a free 30-day trial.
(0 ratings)
Reviews0
Price 99.95
Views1358
CryptoBlocker
posted bysalesinSecurity
You may have seen other file encrypting software that create additional partitions or mask the files as other kinds of common file types. This all sounds great and dandy, but even a basic hacker can locate hidden file areas on your hardrive and also recognize "fake" file types. The solution is to provide a file encryptor that works well at encoding your files. CryptoBlockerTM is a full-featured yet easy-to-use file security program.
(0 ratings)
Reviews0
PriceFree
Views901
IP Security Validator
posted byawtechinSecurity
IP Security Validator works both interactively as a command line tool and in a "quiet" mode. In interactive mode, the command line tool (ipsecvalidate) reports the results on the standard output in words (human-readable form). In quiet mode, IP Security Validator reports the result via a single return parameter without writing to standard output; this quality makes it suitable to be used as part of administration scripts that run regularly to validate VPN connectivity and encapsulation.
(0 ratings)
Reviews0
PriceFree
Views941
Encrypt HTML Source
posted byadmininSecurity
Encrypt HTML source is a solution for full web site protection. It will encrypt your HTML, ASP, JavaScript, VBScript,SHTML and CSS source code and will make impossible stealing and reusing it in other websites. Password protect web pages. Advanced web site images protection. Security options available:disable right-click, page printing, text selection/copying, clipboard, and offline usage of encrypted files.
(0 ratings)
Reviews0
PriceFree
Views1853
HTML Guardian
posted byadmininSecurity
Encrypt HTML, SHTML, JavaScript, VBScript, and ASP files. HTML Guardian is a solution for total Web site protection -it will make impossible stealing and re-using your source code in other websites. Image Guardian add-on is especially designed to protect images on your site. Additional protection options available:disable right-click, page printing, text selection/copying, clipboard, and offline usage of encrypted files, add password protection.
(0 ratings)
Reviews0
Price 39.95
Views1796
HTML Password Website Protector
posted byadmininSecurity
HTML password protect, encrypt HTML files with 384 bit keys. Protect web page or entire website with a password. Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once for all protected files. Customizable encrypted files layout. You can use one or more passwords. Many additional security options available.
(0 ratings)
Reviews0
Price 29.95
Views1969
U-Wipe
posted bys.ivanovinSecurity
Protect your privacy with U-Wipe! It is a very easy-to-use utility that allows to automatically clean traces of your activity at PC and on Internet. U-Wipe lets you free up the disk space from unwanted information and increase your computer's speed. With U-Wipe you can easily manage digital certificates, cookies and automatically, through 3 modes of safety cleans browser's cash, history, recent document list and temporary files, MRU lists, etc.
(0 ratings)
Reviews0
PriceFree
Views771
SafeSystem
posted byinfoinSecurity
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and the accidental (or even intentional) system files deletion or alteration, so your PC will be healthy and more stable.
(0 ratings)
Reviews0
PriceFree
Views803
SafeLogon
posted byinfoinSecurity
SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling the days of the week and the time of the day the user is allowed to log on and use the system. - Define temporary users who expire after a number of logins and/or when the system reaches a date limit. - Keep a log or track of all the users making use of the system, including the failed logon attempts.
(0 ratings)
Reviews0
PriceFree
Views996
PageXchanger for IIS
PageXchanger eliminates file extensions from URLs and source code for a more secure and user-friendly IIS Web site. Port80's powerful content negotiation tool separates content from underlying Web technology, allowing for short, easy-to-remember URLs. Underlying technology is less conspicuous to hackers and competitors, and developers can transition file formats without altering page addresses. Free 30-day trial and free technical support.
(0 ratings)
Reviews0
PriceUSD 49.95
Views1248
SafeCryptor
posted byinfoinSecurity
SafeCryptor is the encryption system where your own computer is your unique key. SafeCryptor provides you with safe, fast and reliable text encryption anywhere, anytime, and lets you securely and quickly send all of your sensitive and personal information via e-mail or chat session to your partners, customers, friends or family.
(0 ratings)
Reviews0
PriceFree
Views1165
Extensible Messaging Platform Anti-Spam Filter
Server based Anti-Spam Filter protects organizational mail servers (Exchange Server, Novell GroupWise, Lotus Domino, Sendmail, etc) from spam email-borne viruses and objectionable content using contextual pattern signatures (not simple keywords).
(0 ratings)
Reviews0
PriceFree
Views917
RC4 and Base 64 Coder
posted byscriptsinSecurity
This small utility allows the conversion from an encoded string to a decoded string and vise versa. It can do this for the Base 64 and RC4 algorthims. RC4 requires a key as it is a method of encryption, an input is provided for this with a default key. The key should be between 0 and 255 characters, as 255 is the maximium the code will deal with.
(0 ratings)
Reviews0
PriceFree
Views1167
Results 81-100 of 511