Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for sec Heidi R. Stealthy (TM) 2.0 in Owen Digital Corporation Protect your Privacy. Instantly conceal your current PC or laptop activities with a single mouse-click. Your open, visible application windows can be hidden from your desktop, taskbar, and the ALT+TAB keystroke combination. Disable CTRL+ALT+DEL! Hide desktop shortcuts. Launch a decoy app (i.e. MP3, WAV, Word, Excel, etc.). Hidden apps continue to function, more! Fun, inexpensive, FREE to try! Who's that looking over your shoulder now?Total Text Security 1.0 in SoftSphere Technologies You can keep your company or private data confidential while transmitting via the Internet. Total Text Security encrypts your data with RSA keys (as used by PGP) or passwords, so nobody unauthorized can read it. Encrypted data can be saved to the file and be held on the disk, as well as sent in an email or an instant message via the Internet. This application is usable with any program. You?ll be impressed by how easy security can be.SynchroPass 1.00 in Sergey Merzlikin Network Passwords Synchronizer for Windows NT 4.0/2000/XP/2003. It allows to synchronously change passwords for current user account on local computer, in one or several domains, and on one or multiple peer-to-peer servers. The program also can inform user about passwords expiration and invalidity. Using SynchroPass, it is possible to build secure peer-to-peer network.ws0002d1 1.0 in WildSavers.com A screensaver with 24 various bugs (demo only has 3 photos). Latest release, purchase information, and more detailed information is located at http://www.wildsavers.comPrivate Pix 2.93 in Tropical Software Private Pix utilizes new technologies to keep your pictures and movies safe while keeping them password protected and encrypted. Advanced security features include name scrambling and variable key length. Private Pix has an easy to use interface that makes organizing and viewing of your pictures easier than ever before. Try Private Pix worry free as it does not change any system settings.ICUII Video Chat 6.02 in Cybration, INC. A full-color IP-based videoconferencing system. ICUII includes a Quick Message function that can send audio, text, and/or a video image to any user on the directory, or to your Pal list. Other features include visual caller ID, a 'do not disturb' option, a buddy list, picture e-mail, user profiles with pictures, a 320x240-pixel viewing screen, content filters, and global listings, Instant Message forwarding of new and saved Instant messages.RoboNanny 1.2 in Pingram Marketing RoboNanny is a computer home security and baby monitor software. It monitors sound level in your room via your computer microphone, broadcasts audio from the microphone over the network, and records surrounding audio, and fires sound alarms. While connected to the Internet (even a 28.8 modem will do, but DSL or Cable is certainly better), RoboNanny can continuously broadcast your room's sounds. Use Windows Media Player to listen to your home.F-Secure Anti-Virus 2004 2004 in F-Secure Corporation F-Secure Anti-Virus 2004 offers an easy to use protection against viruses for your PC. With F-Secure Anti-Virus 2004 you can surf on the Internet, open e-mail attachments and use your computer without any fear of virus infections. You can also be sure that you are not sending viruses to others. Especially for home users and small offices without dedicated IT-staff, this software provides easy and maintenance-free protection.LockItNow! 1.2 in Bluetooth Shareware Let your mobile phone lock and unlock your PC. When LockItNow! detects that you are no longer by your PC it locks it, keeping others from accessing it. When you return your PC is automatically unlocked, ready to be used. No user interaction required! No Bluetooth phone? No problem, LockItNow! works without Bluetooth as well. Locking your computer is just a click away.Akala EXE Lock 3.20 in Zero2000 Software Akala EXE Lock can protect any executable file from non-authorized execution. It asks each time the program is loaded the password you have set.Undelete Server and Professional 4.0 in Executive Software How valuable is the data on your servers and PCs? What if you or your users lost a critical accounting file, a major report, or even digital snapshots of the family? The Windows Recycle Bin doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously deleted, it could be gone forever! Without Undelete 4.0, restoring these files mean time-consuming restoration from back up. If it works.U-Wipe 2.8 in Network Research Lab, Ltd. U-Wipe is an easy-to-use privacy tool that allows you to clean all your IE, MS Windows, MS Office tracks, block pop up ads. With an additonal "Boss key" feature hide sites that you are visiting from prying eyes and remove spy proxy ad-ware that installs onto your PC while your surf. It allows you restore you normal system's defaults with one click. No need to worry about former internet surfing inconveniences !CSSS Video 2.1 in SARBASH Lab. Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save What is CSSS? CSSS – Computer Security System with motion detection by WEB - camera. The principle of action bases on WEB-camera real time survey and if it is necessary do many operation (play sound file (siren) ,record sound, video or snapshot, call by telephone). In case of voicCSSS Video 2.1 in SARBASH Lab. Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save What is CSSS? CSSS – Computer Security System with motion detection by WEB - camera. The principle of action bases on WEB-camera real time survey and if it is necessary do many operation (play sound file (siren) ,record sound, video or snapshot, call by telephone). In case of voicGFI LANguard Security Event Log Monitor 5 in GFI Software LANguard S.E.L.M. performs intrusion detection by network-wide monitoring of the security event logs of all NT/2000 servers and workstations. Extensive reporting identifies machines being targeted as well as local users trying to hack. Unlike network-based IDS, LANguard is not impaired by switches, encryption or high-speed data transfer.
|