Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for sec TermiNET - Personal Firewall 2.8.11 in INFOTECS GmbH TermiNET is a Personal Firewall designed to keeps your personal data and privacy safe from Internet hackers and data thieves while connected to the Internet, browsing the web or accessing other internet.AES Pro 5.5 in Safe Soft Corporation AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages.AES Pro 5.5 in Safe Soft Corporation AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages.VIDEOREG 3.0 in SARBASH Lab. This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in manual mode and conduct searching in slide show mode (pseudo-video) with given speed of cam shot change.VIDEOREG 3.0 in SARBASH Lab. This product allows saving images from webcam or other video capture device starting on motion detection or constantly with given time interval (ranging from 1 to 30 seconds). It is possible to save the defined amount of shots after motion has been detected. The built-in viewer allows viewing cam shots in manual mode and conduct searching in slide show mode (pseudo-video) with given speed of cam shot change.ScreenLock Pro 2.0.41 in iJEN You can configure ScreenLock to prevent windows from starting without the proper answer, or quickly lock the screen if you must leave your PC running and unattended. Enjoy the peace of mind that your privacy is protected. Use ScreenLock as your default Windows Screen saver! This provides added protection when you leave your computer unattended and forget to lock your system.Password Safe and Repository 3.43 in MAFIS Systems GbR Password Safe is a professional and comfortable solution for managing your passwords and TAN-Block´s. Features: auto. password entry, macros, TAN administation, password generator, network and multiuser support, own categories, fields and dialogs, rights administration, usb key, client for Palm OS, form/dialog designer, and much more...Cookie Crusher 3.2 in The Limit Software, Inc. Many Web sites place electronic tags -- called cookies -- on your computer. Although cookies cannot damage your computer, they can assist site operators in profiling your surfing habits. Cookie Crusher® acts as a real-time cookie manager giving you complete control over cookies and your privacy. The program can selectively accept or reject cookies from Web sites, classify incoming cookies and label their purpose, delete stored cookies, and more.PalmTree 3.5 in Clickok.co.uk Password protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files. Prevent unauthorised access by other computer users, friends, family,co-workers. Full version has enhanced security features and multiple folder locking and free minor version updates. Steganography. File splitting and more...Web Bubba 1.0 in Whiz Kid Technomagic Whether you are a public library required by law to filter out the web, a regular web user who is sick and tired of annoying ads, a parent who wants to protect his child, or anyone who needs to filter the web, the first step you need to do is include the unwanted domains in your hosts file redirecting them to localhost. Then install Web Bubba, a tiny web server which will replace the unwanted contents with a tiny invisible image.wodBeep 1.0.0.0 in WeOnlyDo Software ActiveX component is a peer-to-peer connection convenient to label each peer to behave in context of Listener(Server) or Initiator(Client). Component comes with several profiles included such as: SINK/ECHO profiles for testing, ROT13 profile that will grab message data, ZIP Tuning profile that will compress contents of messages on the fly, SYSLOG Raw and Cooked profiles for transmitting(and recieving) syslog messages...The Secret Garden 1.0 in Southern Ocean Software The Secret Garden by Frances Hodgson Burnett. When Cholera takes the parents of Mary Lennox, she is shipped from India to England to live with her Uncle Craven. Archibald Craven's house is dark, drafty, with over 100 rooms built on the edge of the moors. Mary finds that her Uncle does not wish to see her, which is fine with Mary as she herself is rude and spoiled.Norton Internet Security 2004 in Symantec Corporation Symantec?s Norton Internet Security 2004 provides essential protection from viruses, hackers, and privacy threats. Powerful yet easy to use, this award-winning suite now includes advanced spam-fighting software to filter unwanted mail out of your inbox. Protect yourself, your family, and your PC online with Norton Internet Security 2004.Search Backups 1.2.2 in Andreas Breitschopp With Search Backups you can manage your copies for security or other CDs / DVDs. For that the folder and file structure is being read and saved completely. After that you can move through the whole folder and file structer of all indexed CDs / DVDs the same as the CDs / DVDs were in you drive. With additional search features!Diskeeper Server Standard Edition 8.0 in Executive Software No matter how fast your storage system is, it only takes a few hours for disk fragmentation to increase access times and drag down performance and reliability. If you haven’t installed Diskeeper 8.0 on your servers, your investment is being nullified. There’s only one automatic disk defragmenter specifically designed for Windows server operating systems: Diskeeper 8.0 Server.
|