Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for security Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save What is CSSS? The CSSS program - Computer Sound Security System. The principle of action bases on microphone (microphones) real time survey and highly intellectual analysis of coming signals on the basis of special algorithms, and if it is necessaryvcalling you by modem (phone).Windows Secret Explorer 2.0 in LastBit Software Find hidden data, such as IE form autofill data, passwords to protected websites, account and identity passwords, dial-up passwords, and much more with this new system inspection tool. Windows Secret Explorer is designed to reveal hidden data which is stored in undocumented MS Windows Protected Storage. The Protected Storage is present in every system where Windows is installed, and WSE may export your vital data to any Windows-based system, too.wodMailbox 2.0.9.0 in WeOnlyDo Software WeOnlyDo! Mailbox is a component that can be easily integrated into your applications to provide full management over mailboxes and message parsing. Using wodMailbox, you can easily access mailbox, count messages, look at messages, count parts, save attachments, look at headers, delete messages etc..wodPop3Server 1.3.3.0 in WeOnlyDo Software WeOnlyDo! COM Pop3Server ActiveX control is a component that can be easily integrated into your applications to provide full Pop3 protocol server implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients!wodSmtpServer 2.2.4.0 in WeOnlyDo Software WeOnlyDo! SmtpServer ActiveX control is a component that can be easily integrated into your applications to provide full non-relaying Smtp (Simple Mail Transfer Protocol) server implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC2821.ICQr Information 1.5 in Moritz Bartl ICQ .DAT (Database) files contain everything the user enters in his private details. ICQr Information is able to read and reveal personal information, such as nickname, address, birthday and much more. The only program that reads out ICQ passwords for all ICQ versions! You can export the gathered information into a multiplatform HTML file and save the contact list to a textfile.Password Security Vault 2.0 in Hirtle Software Password Security Vault stores your personal passwords as well as login names for Internet sites. Most Internet users have numerous web sites which they frequent that require memberships. Simply remember your password for this software and you can forget every other password since this program will keep track of them for you. Includes many handy features to make your web surfing a simple experience.Password Security Vault 2.0 in Hirtle Software Password Security Vault stores your personal passwords as well as login names for Internet sites. Most Internet users have numerous web sites which they frequent that require memberships. Simply remember your password for this software and you can forget every other password since this program will keep track of them for you. Includes many handy features to make your web surfing a simple experience.ScreenLock 9.0 in iJEN Software Customize your Windows Startup Options. You can configure ScreenLock to prevent windows from starting without the proper answer, or quickly lock the screen if you must leave your PC running and unattended. Enjoy the peace of mind that your privacy is protected. Use ScreenLock as your default Windows Screensaver! This provides added protection when you leave your computer unattended and forget to lock your system.ReportGen for GNATBox 1.1.3 in RnR Software RnR ReportGen for GNATBox creates reports based on users Internet activity. It takes the logs created by a GNATBox Firewall and displays a user selected report in a web browser. Logs are read from a tab delimited file that has been created by a syslog daemon like Kiwi Syslog Daemon.ReportGen for Netscreen 1.1.3 in RnR Software RnR ReportGen for Netscreen creates reports based on users Internet activity. It takes the logs created by a Netscreen Firewall and displays a user selected report in a web browser. Logs are read from a tab delimited file that has been created by a syslog daemon like Kiwi Syslog Daemon.ReportGen for SonicWALL 1.1.3 in RnR Software RnR ReportGen for SonicWALL creates reports based on users Internet activity. It takes the logs created by a SonicWALL Firewall and displays a user selected report in a web browser. Logs are read from a tab delimited file that has been created by a syslog daemon like Kiwi Syslog Daemon.ISequre for Windows 1.4 in BG Universal Software ISequre is a security software application that enables you and your friends or co-workers to exchange ICQ messages securely. ICQ is one of the most popular instant messengers today. Unfortunately, it stores and transmits all messages in non-encrypted form. ISequre will protect your chat session encoding all messages with the Blowfish encryption algorithm.Quicky Password Generator - Shareware 2.0 in Quicky Software The Quicky Password Generator is fast, efficient, and small. It maintains separate groups of 100,000 passwords at a time of 4 to 20 characters. The passwords are displayed and can be copied to your clipboard easily or exported to a file. You can specify random passwords to be generated from alphabetic, numeric, alphanumeric, uppercase only, lowercase only, mixed and more. Passwords can be variable length and may include special characters.Random Password Generator Expert 2.0 in SoftDemon Random Password Generator Expert is a full-featured and powerful, yet small and handy application able to generate passwords of any length and character content. The program may be used by network administrators, webmasters, internet service providers - all those who need to create and administer password protected systems, but can also be used by any person who want to protect his/her privacy by using strong passwords.
|