Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for sec InJoy Firewall 3 in F/X Communications Forget about old-generation and run-off-the-mill commercial firewalls. This multilayered next-generation Firewall is the FEEL-GOOD multi-purpose product you have been looking for. It readies you for the future through cutting-edge Deep Packet Inspection, unique MULTI-PLATFORM support, and IPSec VPN support. Its unparalleled network monitoring turns you into an INSTANT SECURITY PROFESSIONAL with unique real-time insight into any network activity.MOVEit Freely 3.1 in Standard Networks Free command-line FTP client. All 3 SSL modes, X.509 client certificates, passive transfers and alternate ports supported. Uses same syntax as built-in "ftp.exe" client for easy drop-in replacement. http://www.standardnetworks.com/moveitfreelyParador File Protection PE 1.0.0.0 in Serial Scientific International, Inc. Using Parador will allow implementing a proactive security solution that will complement current technologies that rely on signature updates. It is the LAST BASTION OF DEFENSE between anti-virus signature updates. Parador brings a new and powerful layer of peak protection that will raise minimal false positive notifications and help reduce system downtime. For the utmost security, do not look any further Parador is what you always needed.CrossEyes 3.0.45 in Levit & James, Inc. New low price! Now only $49.99 to buy. CrossEyes is an add-in which 'REVEALS the CODES' in MS WORD. Save time and stop frustration when working with Word documents. Word shows you WHAT you will get when you print your document, CrossEyes shows you WHY. CrossEyes shows the complete formatting of a Word document as color-coded tags in-line with the text. Double-click on any code to edit. Read the great reviews on our website. 15 day trial.DCPP 2.8 in SecurStar GmbH DriveCrypt Plus Pack (DCPP) is a Full disk encryption software which partially or fully encrypts your hard disk including the operating system, allowing pre-boot authentication. The User enters a password on computer start up, before the operating system boots up. DCPP is the fastest and most feature-rich real-time encryption system available. Special care has been taken to render all cryptographic parts as invisible & transparent as possible.DriveCrypt 4.2 in SecurStar GmbH DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product.DriveCrypt 4.2 in SecurStar GmbH DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product.BioCert Biometric Authenticator Lite 1.0 in Biometrics Direct BioCert Biometric Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 usersVAIOSoft DriveEraser 1.00 in VaioSoft, Inc Secure Data Clean up: DriveEraser? permanently erases data from hard disks, removable media, partitions, files and folders. It is specifically designed to eliminate data that is no longer needed and should not be recovered by anyone else. Major Functions Secure Erase hard/removable Disk Drives Secure Erase any selected partition Secure Erase files/folders Secure Erase Methods Create virtually any Custom Secure Erase rulesHider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced compression, and password protection of files. You can secure any file type with Hider. uCertify - MCSE Practice Test for Exam 70-214 - 10 7.00.05 in uCertify Pass MCSE 70-214 in first attempt. 102 Questions with detailed explanation. 70-214 Study notes, Articles and Mock Test. 99% pass rate, 100% money back guarantee. Based on Latest Microsoft MCSE Certification Exam pattern Exam Simulation and Study Guide. Download 70-214 Now This Practice test can be used for following Microsoft's certificaitons exam: MCSE, MCSA, MCSE-SEC, and MCP...uCertify - MCSE Practice Test for Exam 70-220 - 16 6.09.05 in uCertify Pass MCSE 70-220 in first attempt. 160 Questions with detailed explanation. 70-220 Study notes, Articles and Mock Test. 99% pass rate, 100% money back guarantee. Based on Latest Microsoft MCSE Certification Exam pattern Exam Simulation and Study Guide. Download 70-220 Now This Practice test can be used for following Microsoft's certificaitons exam: MCSE, MCSE-SEC, and MCP...1st Email Anti-Virus 4.0 in ZZEE 1st Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message attack, and so on.1st Email Anti-Virus 4.0 in ZZEE 1st Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message attack, and so on.Link Logger - Linksys nonProtocol 2.1.0.19 in Binary Visions Inc LINK LOGGER allows you to monitor your firewall traffic in real time so you can track your network for both internal and external abuses. Affordable professional logging tool with all the features including remote notification, custom alarms, hostname and whois lookups, automatic data management, historical searches, description of port services, online updates, and much more in an easy to use and understand program.
|