Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

GridinSoft Trojan Killer 2.0.9.7

GridinSoft Trojan Killer 2.0.9.7
GridinSoft Trojan Killer 2.0.9.7 Incl Patch | 18,4MB

Trojan Killer is a malicious computer software (malware) removal application.

Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners.

Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware.

Trojan Killer works in the field of system security to ensure safety for computer systems. We propose products to help you get rid of annoying adware, malware and other rough tools. It is very important to restore control on your computer as soon as possible and do not allow anyone to use your data.


Screen Shots

Free Image Hosting at www.ImageShack.us

Don't wait while malicious programs strike roots in your computer. Don't let them ever reach you PC!

Samples of malware include various types of adware (displays unwanted advertising); spyware (may keep and send logs of your keyboard and mouse activity, such as credit card or personal identity information); hidden dialers (may initiate unsolicited phone call which then shows on your bill), and more.

If you are an active internet user, you should take steps to protect your sensitive personal information from possible cyber exposure. Trojan Killer will help you to timely identify and safely remove dangerous applications before it is too late.

Platinum Hide IP 3.1.0.6

Platinum Hide IP 3.1.0.6
Platinum Hide IP 3.1.0.6 Incl Patch | 4,73Mb

Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more.

Get Platinum Online Privacy Protection. Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, etc, all with a single click of “Hide IP” button.

With Platinum Hide IP, you can surf anonymously, send anonymous emails through any web based mail system, access blocked websites or forums, get protected from any website that wants to monitor your reading interests and spy upon you through your unique IP address, etc. Your identity is secure, protected, and anonymized. With it, you decide the IP location such as United States, United Kingdom, France, etc. by selecting a country from the Choose IP Country window.


Screen Shots

Platinum Hide IP Platinum Hide IP 3.1.0.6 screenshot Platinum Hide IP 3.1 Platinum Hide IP 3 screenshot

Platinum Hide IP works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks and any other kind of Internet.

Key Features
  • Anonymize Your Web Surfing
    Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
  • Protect Your Identity
    Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
  • Choose IP Country and Check IP
    Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
  • Send Anonymous Emails
    Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
  • Get Unbanned from Forums and Blocked Websites
    Change your IP address and then you can get unbanned yourself from any forums or other blocked websites that have ever banned you from.

WinLock Professional 5.26

WinLock Professional 5.26
WinLock Professional 5.26 Incl Serial Key | 4,06Mb

WinLock Professional is a powerful security solution that lets you restrict access to various computer resources.

It offers all features of WinLock, plus several advanced features of interest to the power Windows users and computer administrators:

Apply different restrictions separately to each user account. Now you can create different protection schemes for each user account in a multiple-user environment. For each user, WinLock will activate only the selected restrictions. Moreover, it is possible to suspend all forms of WinLock protection for the specified user.

Internet-related restrictions. WinLock Professional provides you with a group of selected Internet Explorer policies and enhanced content filtration suited to control and protect Internet access.


Screen Shoots

WinLock Professional 5.26 Image Hosted by ImageTitan.com WinLock Pro WinLock Professional

Website content filtration. The Professional edition not only checks the address of the site, but also scans the entire page, including the hidden meta-tags for any prohibited words. For example, if you define "sex" as a keyword, any website contains this word will be prohibited. This makes possible to prohibit access to questionable websites - notably for public-access computers in schools and libraries.

Built-in file encryption. You are likely to have confidential documents on your computer, which you may want to encrypt. LockBox Wizard will help you to protect any information. It uses a very strong Blowfish crypto-algorithm. Protected files cannot be decrypted without the correct password.

Additionally, WinLock can be controlled and configured remotely by means of WinLock Remote Administrator. WinLock Remote Administrator, the network security solution for Windows networks. It helps quickly configure remote WinLock clients via network, lock remote workstations, and apply security profiles by means of easy-to-use interface.

Supported languages: English, German, French, Spanish, Russian, Portuguese-BR, Turkish.


GiliSoft File Lock Pro 4.4

GiliSoft File Lock Pro 4.4
GiliSoft File Lock Pro 4.4 Incl Patch | 5,79Mb

Gili File Lock is designed for protecting files,folder and drives on your local computer.

In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.


GiliSoft File Lock Pro


Hide Data
Gili File Lock can hide your private files folders and drives to make them completely invisible to users and programs.

Lock Data
The locked files/folders/drives are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders without password. Files and sub-folders in a locked folder are also protected.

Password Protected:
Gili File Lock is a password-locked software,that is to say,there's no other way to run or unstall it if you have not the password.

Integration with Windows Shell

File System Compatible
FAT/NTFS/exFAT

Hardware Compatible
Fully support Intel® Pentium D Dual-Core Processor and AMD Athlon™ 64X2 Dual-CoreProcessor;
System Requirements

System Compatible
Windows 2000/2003/XP/Vista/Windows 7

GiliSoft USB Lock 1.0

GiliSoft USB Lock 1.0
GiliSoft USB Lock 1.0 Incl Patch | 4,50Mb

This is an easy and powerfull Endpoint DLP Suite that helps you to lock usb port,make dvd/cd burner read-only, block some websites, forbid some programs and disable more devices.

USB Block :
Disable reading from USB disks or disable writing to USB disks.

CD Lock:
Disable reading from DVD/CD discs or making DVD/CD burner read-only.



GiliSoft USB Lock

Website Lock :
Block accessing some websites.

Programs Lock :
Block running some programs.

Devices Lock:
Disable printer,moderm,com lpt ports,infrared,bluetooth,1394 ports.

Alarm Notification :
If user enters wrong password more than 5 times,it will send alarm notifications to your e-mail .

Ease of Use:
A very easy to use program with user-friendly interface.

Hardware Compatible
Fully support Intel® Pentium D Dual-Core Processor and AMD Athlon™ 64X2 Dual-CoreProcessor;
System Requirements

System Compatible
Windows 2000/2003/XP/Vista/Windows 7 (32&64)

ID Disk Protector 3.5.0.0

ID Disk Protector 3.5.0.0
ID Disk Protector 3.5.0.0 Incl Crack | 1,74Mb

ID Disk Protector is a very useful program that protects your computer against unauthorized access.

It allows you to protect your disk and partitions and prevents applications from running without your consent.

ID Disk Protector protects your computer by working directly with the disk without depending on any operating systems, programs or other equipment.

Offers boot protection of your computer. Using ID Disk Protector, you will have to type your private password in order to get the system running and you will prevent others from accessing your PC.



Screen Shots

ID Disk Protector


Encrypts passwords and stores them in the protected areas of the disk. No one can have access to them, but you.

ID Disk Protector provides the option of having a password hint, in case you forget it. Without your password you can’t disable the protection upon your PC and there is no other way to restore a lost password.

Protects your disk and its partitions by keeping them invisible to the common user. The possibilities of handling the partitions will be limited, forbidding any action regarding their reading or writing.

Offers at your request a low-level protection against your disk and partitions. ID Disk Protector prevents your hardware from any read/write operations.

Secures any personal options you may have set using the ID Disk Protector. It provides a launch-operating password, filtering access to its features.

ID Disk Protector discretely keeps private any protective measure you may have taken against your operating system. It doesn’t show the fact that you may enabled/disabled the disk protection.

ID Disk Protector has a sleek, easy to use graphic interface which requires minimal space on your computer to operate efficiently. The step-by-step wizard provided by the program enables ease of use.

Main Features:
  • Protects your disk and its partitions
  • Offers boot protection
  • Provides a launching and operating password
  • Keeps private the enable/disable of your disk
  • Blocks any operations on the hardware level

TeamViewer Manager 6.0.940.0

TeamViewer Manager 6.0.940.0
TeamViewer Manager 6.0.940.0 Incl Patch | 17,6MB

TeamViewer Manager is a simple, network-capable and easy to operate database application that manages all of your TeamViewer partners and offers extensive functions for evaluating sessions.

TeamViewer Manager is an optional database tool that stores your partner details in a database that can also be shared over the network with other supporters. It also includes sophisticated logging and reporting functionality for your connections.

TeamViewer Manager can be installed locally on a single workstation as well as on multiple workstations on a network.

For the simultaneous use in a network, TeamViewer Manager must be installed locally on each workstation. Access to the database takes place over Microsoft SQL Server.


Screen Shots

en_win_manager TTVM-MW


You can use TeamViewer Manager for the following applications:
  • Directly establishing a connection with the partner of your choice.
  • Categorizing partners into different groups.
  • Synchronizing partners with the TeamViewer partner list
  • Adding notes and additional information to the respective partner and respective connection.
  • Detailed summary of connections with your partners.
  • Displaying session recordings for every connection
  • Calculations can be performed based on individually stored hourly rates
  • Additional possibility of accessing your partner via remote desktop
  • Exporting data to Microsoft Excel or as HTML file for printing purposes
The latest improvements at a glance:
  • Synchronization of TeamViewer Manager and TeamViewer partner list
  • Manual and automatic merging of connections
  • Partner-specific indication of data for calculating connection costs and possibility of inheriting these values (hourly rate, basic charge, etc.)

HomeGuard Activity Monitor 1.2.1.1

HomeGuard Activity Monitor 1.2.1.1
HomeGuard Activity Monitor 1.2.1.1 Incl Crack | 7,79MB

Porn Filter, Keylogger, Screenshots Based on User Actions, Program Blocker, Internet Time Restrictions and More...

HomeGuard is an advanced parental control and activity monitoring tool for family and child safety online and offline. Once installed HomeGuard will silently and automatically block all pornographic and inappropriate content online and record detailed website activity including time of visit and time spent on each website. Plus a built in keylogger, activity based screenshots, chat and email monitoring and filtering, program/games blocking and time restrictions, Internet and computer usage time restrictions, email notifications and more. HomeGuard is virtually impossible to tamper with, it cannot be bypassed using proxy servers and is unclosable and uninstallable unless the administrative password (provided during installation) is used.



Screen Shots

    


Porn filtering based on websites content not just names
Automatic content filtering of websites, Chat messages/instant messages and Email for pornographic or inappropariate content or for a list of words defined by you. Internet content filtering cannot be circumvented through the use of proxy servers, all Internet traffic is filtered regardless of ports or destination, all while keeping the use of CPU and memory to a minimum through the use of advanced search and identification algorithms, thus adding very little to no overhead to computer and Internet speed.

Websites blocking by name or URL, blacklists and whitelists
Block access to websites in a predefined 'black' list. Or allow access only to websites on a 'white' list, blocking all other websites. Recorded details include time spent on each website and which program was used to visit the website. As in content/porn filtering above, the use of proxy servers to defeat websites blocking won't work.

Time and event based screenshots capture
Take screenshots at predefined intervals and times of day and days of week. By default it will take screenshots every 10 minutes everyday but can be set to take screenshots as often as every 2 seconds. It can also take screenshots when a website is visited, a keyword is found, a chat message/instant message or Email is sent or received, a program is tarted, a file is printed or blocked events only.

Restrict programs/games usage times or completely block a program
Set the times at which each program can be used and for how long. Or completely block certain programs. This feature is designed with excessive/addictive gaming in mind. Blocked programs cannot be opened by renaming the program, once a program is added to a blocking list its signature is computed and saved and it will be recognized no matter where it is on the hard disk or what its name is.

Keylogger Tool
Quietly record all keystrokes typed, time of typing, program keystrokes were typed in and window title at the time of typing. HomeGuard keylogger includes full support for languages using non Latin scripts (Unicode).

Web search monitoring and blocking
View and/or block keywords searched for in search engines. Currently supports Google search, Yahoo and Bing (MSN).

Email and chat monitoring and blocking
Record full text of chat messages (Currently supported are Yahoo and MSN/Windows Live messengers) and Email (pop3/smtp). Or (optionally) block all Chat and Email traffic. And filter chat messages and Email for harmful/inappropriate words.

Restrict Internet and computer usage times
Set the time of day and/or days of week at which the computer and internet can be used. Time restrictions cannot be manipulated by changing system time, by default HomeGuard blocks system time changing for all users and you can define a list of users to allow to change time.

Detailed program usage statistics
Record total running time of programs and actual time spent on each program, how many words and characters typed and how many times the mouse was clicked in each program, total bytes sent and received by each program and more.

Web files content type blocking
This feature is rather radical but can prove useful...Blocks internet content by its type, for example you can bock all online video and flash (e.g. PornTube and the like but also YouTube, Metacafe, Vimeo...etc) other web page elements will still show (unless they were of blocked types too) but all videos will be blank. Use the built in list of types (includes: exe downloads, scripts, videos..) or add a custom (MIME) type.

Network monitoring and blocking
Allows monitoring and blocking of individual internet connections by port and IP addresses. Can be used to block certain Internet protocols (e.g. Peer to peer file sharing.) HomeGuard also attempts to detect protocol type of the connection and will show detailed statistics of the connection's duration and bandwidth used.

USB storage media monitoring and blocking
Monitor and optionally block removable devices like USB thumb drives, external hard disks...etc useful for preventing sharing of pornographic files or protecting your computer against viruses and spyware transmitted on thumb drives.

File monitoring and blocking
Monitor and block copying, deleting and moving of files.

Printer monitor
Monitor printed files and/or block printing altogether.

User and time specific monitoring
Choose which users to monitor and at what times.

Automatic clean up of old records
By default records older than 30 days will be deleted auto. You can change this as needed or start a clean up at anytime.

Panda Internet Security Netbooks 2011

Panda Internet Security Netbooks 2011

Maximum protection against all kinds of threats

Panda Internet Security for Netbooks allows you to get the most of your Netbook for any offline or online activity, like shopping and banking online, with total peace of mind and without any interruption. It protects you from viruses, hackers, online fraud, identity theft and all the other known and unknown threats.

In addition, it keeps your inbox spam-free, and allows you to browse the web privately and securely with the entirely new Panda Safe Browser. With the Parental Control, your children can browse the Internet safely.

Maximum protection against all kinds of Internet threats with Panda Internet Security for Netbooks.





Key features:
  • Antivirus
  • Firewall & Identity Protect
  • Anti-Spam & Parental Control
  • Multimedia/Gaming Mode
  • Home Network Manager
  • Safe Browser (Sandboxing)

iPhone Backup Extractor 2.5.6.0

iPhone Backup Extractor 2.5.6.0

Lost or broken your iPhone? Deleted something important? Failed update?

iPhone Backup Extractor can extract files from the backups iTunes automatically makes of your iPhone, iPad, iPod Touch, iPhone 3G or iPhone 3Gs.

It is useful for restoring SMS histories, contact lists, call histories, photographs, app hiscores, debug info and other data that might otherwise be inaccessible.

The registered version can automatically convert the extracted SQLite databases into CSV format, so they can be easily imported into Excel, Outlook, or Webmail.

CyberLink PowerBackup 2.50.5529

CyberLink PowerBackup 2.50.5529

The Safest Way to Protect Your Valuable Data
  • Archive files, folders and application data
  • Include or exclude files with advanced filtering
  • Schedule automatic backups of important data
  • Protect archives with password protection
  • Blu-ray disc support provides users with up to 50GB of storage space on a single disc




3 Convenient Backup Modes
The most robust data backup software, PowerBackup 2.5, offers 3 backup methods: full, differential, and incremental is available to perfectly suit all your needs. Full is a complete backup of all files. Differential mode archives changed or new files. Incremental mode archives new files created since the last backup.

Important Windows Application Data Archiving
Select vital Windows application data to archive:

Windows Internet Explorer versions 5, 5.5, 6
  • Favorites
  • Cookies
Microsoft Outlook Express versions 5, 5.5, 6
  • Mail Folders
  • Settings
  • Address Book
Microsoft Outlook versions 2000, 2002 (XP), 2003
  • Mail Folders
  • Setting
Fast Stream-to-Disc Archiving
PowerBackup 2.5 provides streaming burning technology that lets you compress data and streams directly to disc, saving precious data archiving time and hard disc buffer space throughout the process.

Flexible File Filters for Quick Data Archiving
Back up more efficiently by creating a list of files that you specifically want in or out of your archive.

Easy Archive Scheduling
Data backup software, PowerBackup 2.5, automates the archiving of data so that you don't have to remember to archive. You can change the scheduled backup anytime, allowing you to override an existing schedule and backup immediately. Backups can be scheduled to occur every day, week, month, or once only. You can also postpone data backup indefinitely, add, or remove scheduled jobs.

Sturdy Password Protection
Enhances security for archiving and restoring files, preventing unauthorized access to your data archives.

Fit Any Location by Splitting Volumes
Split archives across two or more destinations in order to fit the available destination space. Options include Auto, DVD, CD, and a user-defined storage size.

Vast Storage Media Support
Delivers incredible flexibility in archiving to major storage media, including Jazz and Zip drives, flash memory cards, hard drives, CDs, and software DVD, including 8.5 GB double-layer discs as well as new support for Blu-ray software discs..

Blu-ray Software Ready
PowerBackup is Blu-ray software ready. This gives you access to 25GB of storage space on single-layer and 50GB on dual-layer Blu-ray software discs.

Data Compression Maximizes Storage
PowerBackup ensures maximum use of storage media and burning time by providing a choice of archiving huge volumes of files into the smallest possible space. Three flexible options are: no compression (fastest), quick compression, and maximum compression (slowest).

Data Restoration
PowerBackup gives you a choice of locations - My Catalog, a backup file, or disc - when restoring data. You may either restore them to a new location or back to the files' original location.

Restorer Utility
Enables you to restore data without the original PowerBackup data backup software program that created the archive - a single executable file for launching the archive is created during the backup process. Restored data also retains the language settings of the original OS used to create the archive.

Rohos Logon Key 2.8

Rohos Logon Key 2.8
Rohos Logon Key 2.8 Preactivated | 2,74MB

Two-factor authentication solution that converts any USB drive into a security token for your computer and allows to access Windows in a secure way by USB token, replacing the Windows login.

Secure Access to:
  • Personal computer with Windows 2000/ XP/ Vista + Windows Seven
  • Windows 2000/ 2003/ 2008 Active Directory
  • Novell e-Directory
  • Windows 2003/2008 Remote Desktop

Screen Shots

Rohos Logon Key Rohos Logon Key setup options setup_userlist usb-admin
Your Computer security benefits:
  • Replaces weak password based login with a hardware USB key (USB flash drive or memory card)
  • Uses big password, without the need for remembering it
  • Login with a USB Key is fully automatic and fast!
  • The system is password protected but you don’t need to enter it manually each time you log in or unlock Windows
  • Secure 2-factor login: Your USB Key + PIN code password
  • Use a single USB Key to log into your Home, laptop and office computer
  • Access restriction to computer based on USB Key/time factor
  • Windows is protected even in Safe Mode
  • Assigning a password to your user account allows to set a better protection for hibernated computer.
No risk because of::
  • 1. Emergency Logon that helps to access your system in case you lost USB drive or forgot PIN code
  • 2. PIN code to protect USB Key against unauthorized usage for login (with limited attempts to enter)
  • 3. Safe Mode guard - no chance for Bad Guy to bypass USB Key security by loading Windows in Safe Mode
  • 4. Rohos uses NIST approved data-security principles: password is not stored on the USB Key in open form. USB Key copy protection does not allow to create unauthorized Key duplicates. All data on the Key are encrypted with AES-256 bit key length.
  • 5. Rohos Logon Key is considered to be the most convenient, user-friendly and smart password replacement application on the market. Personal vs PRO license
Authentication tokens variety:
  • any USB flash drive
  • USB tokens/smart cards like Aladdin eToken PRO, Futako HiToken v22, Aktiv ruToken, uaToken, Crypto Identity 5,etc
  • YubiKey and Swekey - One Time-Password tokens
  • Fingerprint USB flash drive, e.g. Transcend, Apacer, LG, TakeMS, etc.
  • Wireless devices that are Bluetooth enabled, e.g. Pocket PC, Mobile.
  • RFID tags

Folder Protect 1.8.5

Folder Protect 1.8.5
Folder Protect 1.8.5 Incl Patch | 3,57

Folder Protect - A New Concept in File Security

Folder Protect offers 'Data in Use' security for your important files, folders, drive and programs. It lets you choose whether you want to write protect, delete protect, access protect or hide your data. The program also offers Safe Mode locking, stealth mode and hotkeys, auto-protection and password prompt on access of protected item. Folder Protect offers features that sets it apart from other password protection software.




Screen Shots

fp-novisible-files-selected

Features and Benefits:
  • Data in Use Protection: Folder Protect offers a new concept of ‘Data in Use’ protection. It does not only password protect your data but also let you choose security levels for your data, so that you can choose making your files inaccessible, invisible, delete-proof or write-protected.
  • Access Protected Items: Customize type of security to make your files and folders accessible but delete-proof and write-protected. You can also access hidden files by giving exact path of those files in RUN, Windows Explorer or by using DOS mode.
  • Hide Files and Folders: Folder Protect hides your data in such a way that it cannot be viewed, searched for or deleted without knowing the correct path or your password. Hidden data will remain invisible even if you restart your PC or select ‘Show Hidden Files’.
  • Maximum Protection: Folder Protect uses Windows Kernel level protection that works even in Safe mode ensuring maximum protection of your data.
  • Make your Data Loss-proof: Never worry about data loss, data theft or privacy breach. Protect your data with Folder Protect.
  • Make your Data Write-protected: Folder Protect lets you prevent redundant modification of your data by other users. Your data remain write-protected with Folder Protect!
  • Stealth Mode Feature: This feature helps you maintain your secrecy by hiding all the short cuts of the program from Desktop, Quick Launch, Start Menu, Add/Remove programs item and context menu in Explorer. Run the program with a hotkey of your choice.
  • Auto-Protection: Activate Auto-protection and set an idle time to get your files automatically protected after that time period.
  • Compatibility: Folder Protect works on Windows XP 32-bit, XP 64-bit, Vista 32-bit, Vista 64-bit, Windows 7, Windows 2000 and is compatible on all file systems like FAT, FAT32 and NTFS.

Fast Windows Hider 3.9

Fast Windows Hider 3.9
Fast Windows Hider 3.9 Incl Serial Key | 1,54 MB

Fast Windows Hider instantly hides any window you wish to keep private by one click or the pressing hotkey.

Have you ever been in situation when some person looks over your shoulder at your screen with sensitive information? May be it has been your boss, co-workers, strangers, spouse or children. Have you ever wanted to play a game, open a instant messenger, take some rest at your workplace but been afraid? Have you ever become annoyed because of a many useless windows on the desktop and taskbar?

But there is a very easy way to decides all this. We present you Fast Windows Hider.

Fast Windows Hider is a complete and easy in use security tool designed to hide windows, programs, files, folders, advertisement, browsers, games, all to background (from desktop and taskbar) without closing them instantly by one click or the hotkey. One more click or the hotkey and you will restore all hidden windows without any loss. Together with hide you can mute all sounds.

Hidetools Parental Control 5.6.8

Hidetools Parental Control 5.6.8
Hidetools Parental Control 5.6.8 Incl Patch | 2,43 MB

Parental Control is powerful computer monitoring software with web filter and applications blocker!

The program records all what your children are doing on the computer and brings you the reports via email. Tracking is absolutely invisible and includes programs, websites, keystrokes, screenshots and other computer activity.

This parental control software allows you to block specific applications, such us web browsers, instant messengers, games.

The program includes powerful Internet filter which protects children from abusive websites and ensures Internet safety. The web filter is fully customizable.

Hidetools Parental Control helps you to make the internet and computer safety and useful for your children!

Websites Visited
Parental Control tracks all visited website addresses (URLs) along with website titles and time/date of a visit. The program is compatible with all versions of the following browsers: Internet Explorer, Firefox, Opera, Chome, and more.

Keystrokes Typed
Parental Control records every keystroke typed on your child's computer along with the application title and the time.

Programs Used
Parental Control track all programs used on your child’s computer. The log contains also the time when the application was started/stopped and how long it was actually used.

Screenshot Capturing
Parental Control captures screenshots of the computer screen at an interval defined by you. The screenshot capturing can be as often as once per minute.

Computer Activity
The program allows you to watch the time children spend on the computer (shutdowns and user logons).

Remote Monitoring
Parental Control automatically sends the log reports to your email. This allows you to see what your child are doing on the computer from any place where you could check your email. The option has fully customizable interface.

Block Websites
Parental Control includes powerful Internet filter which guaranties Internet safety for your child. You can select website categories you want to disable. Also, Parental Control allows you to block a specific website by URL. Just add a website address to Black List and our Internet filter will block every website which you want to restrict access to. For example, to block Facebook just enter facebook into Black List.

Block Programs
Parental Control can restrict access to a specific application. For example, you can disable a web browser, chat program, instant messenger, game.

Multiuser
Parental Control can monitor and restrict every computer user, and it does not depend on user rights and what user installed the program. You can set individual monitoring and controlling functions for every windows account.

Program Invisibility
The program works secretly and nobody can detect it. Only you will know that out parental control is installed!

Password Protection
Access to Parental Control can be password protected to prevent the program termination and options changes. Only the person who knows the special hotkey and the password can access the program.

Windows 7
The program was designed for Windows 7, Vista, XP, 2000, 98

Hidetools System Administrator 7.5.2

Hidetools System Administrator 7.5.2
Hidetools System Administrator 7.5.2 Incl Patch | 1,73 MB

System Administrator is a powerful tool designed to manage computer usage and internet access.

It helps to prevent wasting company time and avoid losses. The software assists you in increasing productivity by blocking activity that is not work related such as Myspace or Facebook, instant messengers, online games, etc.

Once activated, System Administrator can restrict access to games, instant messengers, internet browsers and other programs installed on the PC. As a powerful internet filter, System Administrator restricts internet usage by blocking specified websites and inappropriate content. The program protects the computer from negligent users by blocking installers and preventing negative computer changes. The detail reports allow you to see how System Administrator works and what websites and programs were blocked. System Administrator is the best way to restrict your employees' activity and internet usage.

Block Applications
System Administrator allows you to block any program from launching on the computer. It can be extremely useful for employers who want to prohibit applications that help waste time on the computer. One of the biggest problem applications for employers and parents are games. System Administrator can block games in a simple way and even the most computer-savvy users cannot revert the prohibition.

Block Browsers
Want to limit internet usage? Internet Explorer, Firefox, Opera, Google Chrome, and other browsers can be blocked by using System Administrator. It does not matter to System Administrator what kind of browser and version you want to block. The program has no limitation on browser blocking.

Block Instant Messengers
Instant messengers can take a lot of the employee's or the student's time. System Administrator can restrict access to instant messengers such as Windows Live Messenger, AIM, ICQ, Yahoo messenger and others.

Block MySpace or Facebook
Facebook and Myspace are popular social networking sites which can take up hours of your employee’s time. These sites are time wasters which can cost businesses millions of dollars. With just two clicks of the mouse, Myspace and Facebook and all associated pages can be locked on the computer prohibiting the user to access the websites. What can be done to easily avoid considerable company losses? The software is securely protected so even a very experienced computer user cannot get around System Administrator even by means of proxy services or anonimizers.

Internet Filter
System Administrator blocks websites according to the chosen filter. The program allows you to block websites by the categories as well as block specified websites . Each category contains hundreds of websites gathered by subjects such as adult content, social websites, etc., or you can specify certain URLs.

Block Installers
System Administrator protects a computer from installing new software which can sometimes crash a system or harm data by enabling an installer launch blocker. This feature blocks installation of new software for every user independently of his computer access.

Detail Statistics/Report
System Administrator monitors blocked PC activities so you can see how System Administrator works and what prohibited applications and websites the user tried to open.

Multi User
System Administrator allows you to limit every PC user account independent of its computer access level. It can be convenient for computer administrators to create a few user accounts with different levels of access and limit them with System Administrator in different ways.

Security protected
We understand that limiting the computer usage can lead to a user attempting to turn off the blocking software. That is why we made System Administrator highly protected. Password protection keeps unauthorized users from nosing around in the program

Easy Settings Export
Set up all of your PCs by one click. You can easily customize System Administrator on a hundred computers without wasting your time. It is not necessary to set up the program on each computer from scratch. Once customized the program settings can be easily imported to any other computer using the export/import feature.

Web Cache Illuminator 5.3.5

Web Cache Illuminator 5.3.5
Web Cache Illuminator 5.3.5 Incl Serial Key | 1,55MB

Easily investigate all the web pages and images that someone has viewed.

This program will succinctly show the web page title, date/time it was viewed, and thumbnails of all the images. As an added convenience, it can search the computer and locate all of the cache folders for you. Other features include ...

WORKS WITH ANY WEB BROWSER
The presentation is shown in a browser so that you can click on any title or images and then actually see first-hand what any of the pages look like. It also features the ability to filter images and/or other binary files.


Screen Shots

scrnshot.gif (33 KB)
RETRIEVE INFORMATION YOU'RE NOT SUPPOSED TO FIND
The Web Cache Illuminator will enhance any investigation of online activity because, in an attempt to hide their activity, people often delete their browser's history list -- but they will forget (or do not know how) to delete the browser's cached files. With the Web Cache Illuminator, you can look at those cached files and shed considerable light onto their contents.

A BUILT-IN VIEW/DELETE WIZARD
As you review the results, you can also use its convenient built-in View/Delete Wizard to delete an entire cache folder, or only selected files.

InternetSoft Urgent Backup 3.50

InternetSoft Urgent Backup 3.50
InternetSoft Urgent Backup 3.50 Retail | 2,10MB

Urgent Backup is a backup software program designed for MS Windows 98/ME/NT/2000/XP/2003/Vista

This software allows you to copy, upload, download data automatically on schedule from your PC to various storages – network disks, CD/DVD, USB Flash Drive, remote FTP servers, etc. The program can either mirror your data "as is" or create archived files or directories for copying. The user can customize the method of naming backup files adding, for example, the date of archiving to file names.

Urgent Backup uses the zip algorithm to archive data. It is fully gzip compatible (which is important for GNU utilities users and in cross-platform environments.) A built-in task scheduler helps you to build a queue of automated backups, ftp uploads, ftp downloads, or run third-party utilities to process the data before or after copying/archiving.

Screen Shots

InternetSoft Urgent Backup

Here are the problems you can solve with Urgent Backup
  • Avoid critical data loss with automated backups.
  • Ease the process of gathering files from various folders by using profiles
  • Backup to CD and DVD disks. Supports writing to CDR, CDRW, DVD-R, DVD+R, DVD-RW or DVD+RW compatible media
  • Make exact copies of documents or databases located on other computers in your LAN. For example, you may need to have local copies of some documents created by your colleagues on regular basis.
  • Synchronize data between your local PC and a database on your web site, between your main and remote offices or remote affiliates.
  • The ability to back up exclusively opened files like Outlook .PST files
  • Transfer data over the Internet, logging all the operations.
  • Schedule time-consuming tasks to effectively use your network bandwidth and processors time.
One of the best and most effective solutions is a backup copying and data recovery program. Of the wide array of similar products Urgent Backup for Windows is distinguished by its security.

Urgent Backup is very easy to set up and extremely easy to use. You do not have to have any special knowledge or particular skills, you just need to install the program, set up the time schedule for copying the information from your hard disk, and indicate which disk you are using for storing the backup copy. And that’s it! From that point on, you won’t have to be afraid of a computer crash or any other kind of problem. In the event of data loss you will not have any difficulty restoring the lost information, and this can save not only time, but a great deal of money as well!

Urgent Backup can be used to synchronize data between your work and home computers or between computers located in different offices. You always are able to continue any project you are working on remotely from your primary work site.

Secure and effective protection
The wealth of possibilities of Urgent Backup, the convenience of quick setup, the ease of operation and maximum security are what distinguish this program from many similar products.

Drag-Drop Form 7.2.12

Drag-Drop Form 7.2.12
Drag-Drop Form 7.2.12 Incl Serial Key | 3,02 Mb

Portable Password Manager and Form-Auto-Fill tool

Drag-Drop Form is a Portable, Password Manager and Auto-Fill tool encrypts your login URL, your username, password and other information such as credit-card number, E-Mail address, phone number and the words and sentences you use frequently.

Drag-Drop Form displays a docking window into which you can drag and drop your username, password and other information to the web form.

Drag-Drop Form can store multiple groups of text and you can drag and drop them to all other OLE-supported, drop-mode programs, so Drag-Drop Form can be used as a select-input tool.

Drag-Drop Form is portable software, there is no need to install it---just copy and paste the exe file to a computer's desktop or other place and it will run.

All data are saved in one-or-more data files, which are encrypted with AES (Advanced Encryption Standard). You can save the exe file and the data file to a USB device and use it to run Drag-Drop Form on any computer.

Acunetix Web Vulnerability Scanner 7.0

Acunetix Web Vulnerability Scanner 7.0
Acunetix Web Vulnerability Scanner 7.0 Incl Activator | 17,2 Mb

Audit your website security with Acunetix Web Vulnerability Scanner

As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.

Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities

using the attacked site. A victim’s website can be used to launch criminal activities such as hosting phishing sites or to transfer illicit content, while abusing the website’s bandwidth and making its owner liable for these unlawful acts.
Screen Shots

Acunetix Web Vulnerability Scanner Acunetix Web Vulnerability Scanner 7 Acunetix Web Vulnerability Scanner 7.0
Firewalls, SSL and locked-down servers are futile against web application hacking!
Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right into the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.

Find out if your web site is secure before hackers download sensitive data, commit a crime using your web site as a launch pad, and endanger your business. Acunetix Web Vulnerability Scanner crawls your web site, automatically analyzes your web applications and finds perilous SQL injection, Cross site scripting and other vulnerabilities that expose your on line business. Concise reports identify where web applications need to be fixed, thus enabling you to protect your business from impending hacker attacks!

Acunetix - a world-wide leader in web application security
Acunetix has pioneered the web application security scanning technology: Its engineers focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection.

Acunetix Web Vulnerability Scanner includes many innovative features:
  • An automatic Javascript analyzer allowing for security testing of Ajax and Web 2.0 applications
  • Industry’s most a dvanced and in-depth SQL injection and Cross site scripting testing
  • Visual macro recorder makes testing web forms and password protected areas easy
  • Extensive reporting facilities including VISA PCI compliance reports
  • Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
  • Automate File Upload Forms vulnerability testing
  • Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
  • Innovative AcuSensor Technology that allows accurate scanning for many vulnerabilities
  • Port scanning and network alerts against the web server for complex security checks
Acunetix WVS automatically checks for the following vulnerabilities among others:
  • Version Check
    • Vulnerable Web Servers
    • Vulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.
  • Web Server Configuration Checks
    • Checks for Web Servers Problems – Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
    • Verify Web Server Technologies
  • Parameter Manipulation
  • Cross-Site Scripting (XSS) – over 40 different XSS variations are tested.
  • SQL Injection
  • Code Execution
  • Directory Traversal
  • File Inclusion
  • Script Source Code Disclosure
  • CRLF Injection
  • Cross Frame Scripting (XFS)
  • PHP Code Injection
  • XPath Injection
  • Path Disclosure (Unix and Windows)
  • LDAP Injection
  • Cookie Manipulation
  • Arbitrary File creation (AcuSensor Technology)
  • Arbitrary File deletion (AcuSensor Technology)
  • Email Injection (AcuSensor Technology)
  • File Tampering (AcuSensor Technology)
  • URL redirection
  • Remote XSL inclusion

  • MultiRequest Parameter Manipulation



    • Blind SQL/XPath Injection


  • File Checks



    • Checks for Backup Files or Directories - Looks for common files (such as logs, application traces, CVS web repositories)
    • Cross Site Scripting in URI
    • Checks for Script Errors


  • File Uploads



    • Unrestricted File uploads Checks


  • Directory Checks



    • Looks for Common Files (such as logs, traces, CVS)
    • Discover Sensitive Files/Directories
    • Discovers Directories with Weak Permissions
    • Cross Site Scripting in Path and PHPSESSID Session Fixation.
    • Web Applications
    • HTTP Verb Tampering

  • Text Search


    • Directory Listings
    • Source Code Disclosure
    • Check for Common Files
    • Check for Email Addresses
    • Microsoft Office Possible Sensitive Information
    • Local Path Disclosure
    • Error Messages
    • Trojan shell scripts (such as popular PHP shell scripts like r57shell, c99shell etc)



  • Weak Passwords


    • Weak HTTP Passwords

  • GHDB Google Hacking Database


    • Over 1200 GHDB Search Entries in the Database

  • Port Scanner and Network Alerts


    • Port scans the web server and obtains a list of open ports with banners
    • Performs complex network level vulnerability checks on open ports such as:
      • DNS Server vulnerabilities (Open zone transfer, Open recursion, cache poisoning)
      • FTP server checks (list of writable FTP directories, weak FTP passwords, anonymous access allowed)
      • Security and configuration checks for badly configured proxy servers
      • Checks for weak SNMP community strings and weak SSL cyphers
      • and many other network level vulnerability checks!


  • Other vulnerability tests may also be preformed using the manual tools provided, including:


    • Input Validation
    • Authentication attacks
    • Buffer overflows
    • Blind SQL injection
    • Sub domain scanning

    Share

    Twitter Delicious Facebook Digg Stumbleupon Favorites More