|
||||||
|
||
|
Home > Information security software |
|
|
261. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
262. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features: strong encryption algorithms; | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
263. | Keylogger Hunter 2.1 (styopkin.com) | ||
on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed keys. Keylogger Hunter was created, which paralyzes accumulation of information by Hook-based keyloggers. This program is neither a detector, nor a disabler of keyloggers; it paralyzes the | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
264. | Keyring 1.0.1 (morello.co.uk) | ||
is the easy and secure way to manage all your passwords, PIN's and other account information. These days it is almost impossible to keep track of all the different passwords you use in your day to day life. It is easy to fall into bad habits - using easily guessable passwords, using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Duncan | Size: 178 kb | Demo Go to category: System Utilities > Other Similar programs | |||
265. | l0stat 1.1 d (dlcsistemas.com) | ||
in order to generate a set of statistics that provide a global security view of the NT password database. In a security assessment of password database quality based on L0phtcrack, how could you sumarize a 5000 account results information ? there's no way if you don't use an specific utility to do so. l0stat provides statistical info about all user or | |||
Updated: 9, 2005 | Rating: 2106 | Author: J. M. Jimenez | Size: 1340 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
266. | lock and go 1.0 (aidsoft.com) | ||
will enable you to feel completely confident about taking valuable information with you wherever you go. lockngo is the key to your peace of mind. Let lockngo ensure that your information will not fall into the wrong hands. lockngo (lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
267. | Lock Folder 5.0 (realclicks.com) | ||
Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
268. | Lock My PC 3.4 (fspro.net) | ||
each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private information on our hard drives. We install firewalls and anti-virus software to protect this data from outside | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
269. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
270. | Masking Password Generator Pro 3.0 (accusolve.biz) | ||
easy to memorize. Define a mask that incorporates your company security policy and generate passwords as often as you need without any more worry about password policy compliance. The program can reside in the Windows system tray, with a hot-key and default mask defined so that passwords can be generated and copied to the clipboard from within any application. Never before has a | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Peckham | Size: 3205 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|