Full Site

Internet / Network Administration / Security

Internet / Network Administration / Security
MindSoft Evidence Eraser icon
MindSoft Evidence Eraser
Navigate on the Internet without leaving traces Many companies sack their staff for having access to adult webs at work, for downloading non authorized photos and videos, for recei
Outlook Express Protector icon
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases
Easy Disk Drive Safeguard icon
Easy Disk Drive Safeguard
Easy Disk Drive Safeguard is a password-protected security utility that you can use to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun featu
IIS Reinforcer icon
IIS Reinforcer
A default IIS (Internet Information Server) installation is like an open invitiation to hackers
1st Privacy Tool for Windows icon
1st Privacy Tool for Windows
1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources
Privacy Guardian icon
Privacy Guardian
Privacy Guardian is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program history information that is stored in your browser and o
SpIE icon
SpIE
SpIE (pronounced \"spy\") integrates with Internet Explorer to provide additional security and logging features to help prevent net abuse
Internet Security Tweak icon
Internet Security Tweak
Internet Security Tweak is an utility that customizes different features of the Internet Explorer Web browser
Private Cleaner icon
Private Cleaner
Why Private Cleaner?1. Private Cleaner can clear web access footprints, operating system footprints and 100s softwares' footprints.2
Transparent Screen Lock for Win2K/NT/XP icon
Transparent Screen Lock for Win2K/NT/XP
Password protect your workstation or server with Transparent Screen Lock while viewing programs that are running
BhoScanner icon
BhoScanner
It is known that the browser helper objects are loaded each time the browser is started up
Mil Free Internet Eraser icon
Mil Free Internet Eraser
Mil Free Internet Eraser is an application designed to protect your privacy
Network Security Administrator icon
Network Security Administrator
The Program is intended for checking the user's work in the network on the bases of the protocol TCP/IP (Internet, Intranet)
Internet Security Tweak Pro icon
Internet Security Tweak Pro
Internet Security Tweak is an utility that customizes different features of the Internet Explorer Web browser
Atelier Web Ports Traffic Analyzer icon
Atelier Web Ports Traffic Analyzer
* Real-time mapping of ports to processes (applications and services)! * History since boot-time of all TCP, UDP and RAW ports open through Winsock and respective mapping to proces
Harden-It icon
Harden-It
Harden-It 1.1 Windows Security Hardening Tool, harden your TCP/IP Stack and Local System. Harden-It is a Network and System hardening tool for Windows
RegAuditor icon
RegAuditor
Registry Auditor gives you a quick look at the Adware, malware and spyware installed on your computer including parasites and trojans
Cookie Cleaner HD safe GuardPrivacy icon
Cookie Cleaner HD safe GuardPrivacy
Guard Privacy Main Features Erase Internet Explorer Cache Files Erase Internet Explorer Cookies Erase Internet Explorer URL History Erase Internet Explorer Index
PC Activity Monitor Lite icon
PC Activity Monitor Lite
PC Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity.PC Acme Lite works under Windows 2000/XP operating systems
KFSensor icon
KFSensor
Worried about hackers, worms and trojans? Want to improve your Internet security? Want to detect intruders? KFSensor is a host based Intrusion Detection System (IDS)
Purge-it icon
Purge-it
Purge-it! allows the End-User to take a look inside his System, see what Programs are running, which Ports are open The User does choose what happens to his system, and can clean h
Folder Protect icon
Folder Protect
Folder Protect lets you password protect, hide, delete proof, write proof and block access your important files, folders, drives and programs.
Chat Little Black Address Book icon
Chat Little Black Address Book
Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners
IPTunnelManager icon
IPTunnelManager
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic
CleverCrypt Enhanced icon
CleverCrypt Enhanced
Put yourself back in control of your confidential data with CleverCrypt Enhanced, the outstanding security product for Windows
WebSafe Spyware Secure icon
WebSafe Spyware Secure
WebSafe Spyware Secure uses the latest technology to safely, successfully and securely remove traces of known spyware threats from your system
Computer Lock Up icon
Computer Lock Up
Make sure your data is secure! Computer Lock Up provides you with a powerful tool to lock your PC when leaving it and prevent any unauthorized access
CheckDialer icon
CheckDialer
100% solution for any kind of dialer! CheckDialer follows the calls, called by various dialer tools (such as Remoteaccess, dialers ...) and then prevents forbidden calls
AlertMobile Pro icon
AlertMobile Pro
AlertMobile is a special software for computer security incidents response
Security Map icon
Security Map
The network security map displays network security vulnerabilities associated with TCP/IP and LAN/WAN protocols
12
3
456