Search our site:

Security Software

FreePortScanner  FreePortScanner 2.3
Free Port Scanner is a small, fast, easy-to-use and robust port scanner for the Win32 platform.You can scan ports on fast machines in a few seconds and can perform scan on predefined port ranges. This tool uses TCP packets to determine available hosts and open ports, service associated with port and other important characteristics. The tool is designed with a user-friendly interface and is easy to use.

IpDnsResolver  IpDnsResolver 1.2
IpDnsResolver is a very simple and fast program that easily lets you find your own IP address, resolve hostnames to IP addresses and IP addresses to hostnames using the DNS. The tool is designed with a user-friendly interface and is easy to use.

McAfee Personal Firewall Plus  McAfee Personal Firewall Plus 2004
Protect yourself while online with the advanced security of McAfee® Personal Firewall Plus. Easy-to-use, yet highly secure, McAfee Personal Firewall Plus safeguards your PC's connection to the Internet whether you connect via DSL, cable modem, satellite, or dial-up. McAfee Personal Firewall Plus gives you the powerful tools to both control and monitor communication in and out of your PC.

NetShareWatcher  NetShareWatcher 1.1.9
NetShareWatcher is network security improvement software. It allows network administrators to monitor network shares and identify shares which are violating data access policy in their organization. You can configure it once and forget about network sharing problems. You need select restricted groups or users and every time when it will find network share with access list containing that restricted groups and will perform an configured action.
shared folders, network monitoring, system monitor, monitoring, monitor, network monitor, free monitor, free network monitor, network security, intrusion detection,

NetSendFaker  NetSendFaker 1.2
NetSendFaker allows you to send anonymous net send messages to anyone that is connected to the network. You can also emulate messages as if they were sent from other computer. The tool is designed with a user-friendly interface and is easy to use.
network tool, net send, network software, net tools, network monitoring, hacking, port scan, network utils, network security, port scanner,

ShareAlarm  ShareAlarm 2.2
Share alarm is a tool that allows you to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder, connection time will available via this tool .The tool is designed with a user-friendly interface and is easy to use.The program have firewall system that allows to block any unwanted connection to your shared resources.
network tool, network software, net tools, network monitoring, hacking, port scan, network utils, network security, port scanner, intrusion detection,

IE Asterisk Password Uncover  IE Asterisk Password Uncover 1.0
IE Asterisk Password Uncover allows you to view passwords hidden with asterisks in password fields in web pages and ActiveX controls. Comes in handy when you have forgotten your passwords. When you login into a web site with user name and password, you sometimes have the option to store the password in your computer. This freeware utility reveals the passwords stored behind the asterisks (****) in the web pages of Internet Explorer.
password, asterisk, recovery, reveal, asterics, utils, network security, computer security, enterprise security, information security,

FreeNetEnumerator  FreeNetEnumerator 1.2
FreeNetEnumerator is a tool to enumerate computers in a domain. Depending on enumeration parameters the tool can work in different ways. It can enumerate all computers ( if All Computers is selected ), all SQL servers only (if Microsoft SQL Servers is selected ), all primary domain controllers only ( if Primary domain controllers is selected ) , backup domain controllers only, primary domains only,etc.
enumerate network computers, network tool, network software, net tools, network utilities, network security, computer security, enterprise security, information security, internet security,

Tiger Privacy  Tiger Privacy 0.7.6
With Tiger Envelopes you can stop snoops from reading your email, for free. Forever. You don't need to change your mail client. There are no extra steps. Tiger even puts your message in the envelope for you. One click to install on Windows, Mac, and Linux. Automatically configures Outlook, Outlook Express, Thunderbird, Mac Mail and KMail for you. Open source, of course.
encryption, encrypt email, decrypt mail, encryption software, privacy, stop snoops, mail proxy, gpg, pgp, openpgp,

RegAuditor  RegAuditor 2.1
Registry Auditor gives you a quick look at the Adware, malware and spyware installed on your computer including parasites and trojans. Registry Auditor tells you by colored icons ( green icon - safe, yellow icon - unknown, red icon - harmful ) whether specific Objects are known to be safe or harmful, also the program searches the registry for entries including filenames that aren't present on and allows you to delete unwanted registry entries.
adware, trojan, spyware, malware, network software, net tools, network monitoring, hacking, port scan, network utils,

NADetector  NADetector 1.0
NADetector monitors and analyzes the network traffic and displays statistical information pertaining to each IP address pair and protocol, helping network administrators and users troubleshoot network problems. The main purpose of NADetector is to allow you to collect statistical information about your network traffic that passes through network adapters and display incoming, outgoing and summary traffic statistics.
network monitoring, network tool, network software, net tools, network monitoring, hacking, traffic, network utils, network security, intrusion detection,

Internet Access Scheduler  Internet Access Scheduler 2.0
Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week.
internet access, internet security, internet control, internet software, network access, network security, network control, network software, security software, protection software,

NetHotfixScanner  NetHotfixScanner 1.2
Network Hotfix Scanner is a free advanced hotfix check utility that scans network computers for missing hotfixes and patches, and helps you download and install them. NetHotfixScanner gives you a quick look at the hotfixes and patches installed or missed on any remote computer in your corporate network, it tells you by colored icons specific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL.
hotfix, patch, bulletin, network, hacking, port scan, network utils, network security, port scanner, computer security,

Callio Toolkit 17799  Callio Toolkit 17799 1.02
Acquaint yourself with the ISO 17799 / BS7799 standard and address key information security issues using Callio Toolkit 17799. This toolkit is comprised of a series of documents (both parts of the BS 7799 / ISO 17799) , tools, risk treatment module, policies generator, implamentation templates, audit kit, and other items brought together with the sole purpose of helping you understand the standard and enabling you to meet its requirements.
bs7799, iso 17799, bs 7799, callio technologies, iso17799, security software, security policies, isms, iso17799, risk analysis,

Deskman Pro  Deskman Pro 5.5
Desktop security management for home users and system administrators alike. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. System administrators require an effective tool to stop users from messing up the desktop, or apply tight security measures on a per-user or system-wide basis. Deskman is the tool of choice for its simplicity and effectivity.
easy security, desktop security, desktop restrictions, access control, security software, user control, desktop manager, security manager, system protection, access point,

Browse Pages: 1 [2] [3] [4]