Software Downloads | Home | Submit | Latest News | Category | Contact us |
Security & Privacy::Other Secure SQL Auditor 3.0 in Secure Bytes Secure SQL Auditor (SQA) is State of the art software for risk assessment and management, it conducts security audit and security assessment for SQL database security within minutes, by using the most comprehensive SQL database security regulatory compliance tools.StealthSEEK 1.1 in STEALTHbits Technologies, Inc. StealthSEEK is the ideal solution for identifying where unsecured, sensitive data exists within an organization's unstructured, unruly file systems. Whether scanning a desktop or Big Data stack, StealthSEEK is built to scale and classify content with surgical accuracy.CCleaner 3.25.1873 in Piriform Ltd. CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)Paraben's Chat Examiner 3.1 in Paraben Corporation Chatting online is not just a passing phase. More and more people are communicating through chat. And that means loads of digital evidence. As an examiner, you need a specialized tool to perform a thorough analysis of chat logs. Paraben's Chat Examiner is another specialized component of Paraben's P2 Forensic Collection that adds one more powerful program to your toolkit. Supports ICQ, Yahoo, MSN, Trilliann, Hello, Skype, or Miranda.Shadow Defender (32 bit) 1.2.0.346 in shadowdefender.com Is your computer safe? New security vulnerabilities are found every day by which many malicious programs or people attack the Windows operating system. Your computer may HAVE been attacked. Please protect your system with Shadow Defender ASAP! Features * 1. Prevent any unknown and future virus. * 2. Protect your privacy effectly. * 3. Eliminate the system downtime and PC/laptop maintenance cost. * 4. Surf the internet safely.F30 SmartFuzz 2013 in free thirty Software Group Once your Phone has been stolen all you have to do is send a text to your stolen phone and it is automatically blocked1-abc.net Personal Diary 6.00 in 1-abc.net This fast and easy-to-use product allows you to write down your thoughts every day to a password-secured file that is saved with a special encryption engine so that definitely no-one but you can open and change it without the knowledge of your password and without your permission. Besides many useful functions it is a very nice feature that this program can be installed to USB sticks so that you can use the program on every computer in the world.Index.dat Viewer 3.0 in Pointstone Software, LLC Index.dat are files hidden on your computer that contain all of the Web sites that you have ever visited. Every URL, cookies and browsing history is listed there. The file names and locations depend on what version of Internet Explorer you have. If you are running IE version 4.0 or above, the file name is "index.dat". Microsoft has not supplied an adequate explanation as to what these files are for or why they have been hidden so well.KidKeyLock 2.2 in 100dof Kid-Key-Lock is a simple program to selectively lock specific keyboard and mouse functions. You can use kid-key-lock to lock any of the mouse buttons, double clicks and/or the mouse wheel. Regarding the keyboard, Kid-Key-Lock can be used to lock character keys, navigation keys, function keys and/or system shortcuts (such as Alt-F4, Alt-Tab, "Start" key, etc).Secure Random Password Generator 2.1 in Lock Software Secure Password Generator is a lightweight and very fast software program that will help you create strong passwords containing mixed-case characters and numbers. The utility allows creating passwords of any length. The general rule is: the longer, the stronger. Secure Password Generator runs on all versions of Windows including but not limited to Windows 7 and Windows Vista, both 32-bit and 64-bit.Keylogger Software Download 5.4.1.1 in Download spy software How to safe our system from unauthorized user? Keylogger software downloads from www.downloadspysoftware.biz. Keylogger program download is a powerful medium to records real time activity of a computer in absence of user. Keylogger utility download is designed for monitoring computers both locally and remotely in computer user absenceWANGUARD 5.0 in Andrisoft SRL A professional commercial software for IP traffic monitoring and accounting, traffic anomalies detection and DDoS mitigation. It contains a network traffic analyzer and collector that supports NetFlow, sFlow, IPFIX, IPv6 and Port Mirroring. It provides customizable Dashboards with real-time traffic graphs and tops, complex Reports with aggregated data for hosts, departments, interfaces, applications, etc.Spyrix Facebook Monitor 1.51 in Spyrix Spyrix Facebook Monitor allows you to control facebook activity. Protect your child from online predators, cyberbullying, and other dangers that can happen on Facebook without Being Their 'Friend'. The program allows to control user activity in all parts of Facebook: news, messages, groups, apps, settings, etc. You will also always know viewed profiles and search queries. Spyrix Facebook Monitor send all logs via email, ftp or local networkClean Disk Security 8.0 in Kevin Solway This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Clean up all your Internet surfing tracks. This program can also clean the Window's swap file. Also comes with a "Direct Disk Viewer". Now also with plugins and cookie management. Clean up after all types of programs.Keylogger Windows 5.4.1.1 in Mac keylogger Innovative activity tracker program is widely used to keep monitor your employee?s work status at fixed amount of timer interval in complete surveillance manner. Standard Keylogger Windows software provides advance technique to keep trace and record internet activities including visited websites, typed URL, chat conversations, online or offline messages, composed emails, downloaded data files, uploaded images etc performed behind your back.
|