|
|
| |
| Main ยป 2010 » April » 18
Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds. Locked files are undeletable, unrenamable, unmovable, hidden, and inaccessible. You can lock, scramble, or encrypt depending on speed and security. Folder Lock is fully portable, so you can protect your files on USB flash drives, disks, CD-RWs, notebooks, and hard disks, and it doesn't require installation on another PC. Folder Lock protects files in Windows, DOS, and Safe modes, even when you change your OS or boot from a disk. Folder Lock doesn't let you delete its own program folder, and it can't be uninstalled without the correct password. Additional options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption a
...
Read more »
|
Safety Lab Shadow Security Scanner is a Proactive Computer Network Security Vulnerability Assessment Scanner with over 5000 audits. This is a new generation of hi-tech software (network vulnerability assessment scanner) that perforShadow Security Scannermed greatly in the 20th century and remains on the front line in the new millennium! Shadow Security Scanner (network vulnerability assessment scanner) has earned the name of the fastest - and best performing - security scanner in its market sector, outperforming many famous brands. Shadow Security Scanner has been developed to provide a secure, prompt and reliable detection of a vast range of security system holes. After completing the system scan, Shadow Security Scanner analyses the data collected, locates vulnerabilities and possible errors in server tuning options, and suggests possible ways of problem solution. Shadow Secur
...
Read more »
|
Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership. Key Features - Seamlessly integrates essential technologies such as antivirus, antispyware, firewall, intrusion prevention, device control. - Requires only a single agent that is managed by a single management console. - Provides unmatched endpoint protection from the market leader in endpoint security. - Enables instant NAC upgrade without additional software deployment for each endpoint. Key Benefits - Stops malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. - Pr
...
Read more »
|
Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory.Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time before it starts. The ATE can detect more than 22000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time. Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all processes; The registry repair utility can
...
Read more »
|
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations. New releases of Stinger contain all families, and associated families, of threats that have achieved a Medium of higher Risk Asssessment. This Stinger is only updated upon the discovery of a new Medium or higher threat. This version of Stinger includes specific detection and repair for W32/Polip only. At this time, because of the nature of the infection algorithm, repair of files infected with W32/Polip may not return the files to their pristine, pre-infected state, and can cause problems with self-check
...
Read more »
|
You stole ICQ or broke open mail? Missing money from your electronic purse? So you and must! You simply do not know how to keep your passwords! Passwords are now the most popular, and often the only way to protect personal information. Sticky Password-a unique program that integrates the system remembers and automatically enters the user IDs and passwords in the fields of a site, any program on your computer! Sticky Password oppose keylogers and other spy program to try to capture your passwords. A password-protected powerful encryption algorithms, including AES / Rijndael with 256 to date, most reliable. With Sticky Password 4.0, you'll have: - the password manager and form filler for your favorite websites and applications - one-click autofill of on-line forms - the maximum level of security to keep your passwords and personal data safe - effective pro
...
Read more »
| |
|
|
|
| |
|
Statistics |
|
Total online: 8 Guests: 8 Users: 0 | |
|
|