Advertisements
 
 
  You'll find a complete list of Security Tools software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
archive export asf memory

Security Tools

PREVIOUS     NEXT

R-Firewall  R-Firewall

 R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages. Automatic configuration during setup allows you securely surf the Internet right after the software installation. Mobile users can create multiple and easily switchable configurations for specific network environments (Internet surfing at home, office local networks, or public Wi-Fi spots)....

The Enigma Protector  The Enigma Protector

 The Enigma Protector is software protection tool. It has advanced scheme of registration keys generation: Comfortable interface for creating and verifying of registration keys; Special Enigma API; Hardware locking of registration keys; Time limited registration keys; Unique license manager and automatic mailer. Also it has wide range of features to limit time of module usage: Executions, days, date, time limitations; System clock control. The Enigma Protector has a lot of features to make your software module more safe to crack: Anti-debugger tricks; Control sum checking; Set startup password; Additional features; Hard modifications of import table of executable. The Enigma Protector has features to help programmer to add beautiful things into existing module without writing any additional sources strings: Ssplash screen. Adds splash screen to module startup. Choose your own picture to show it while module is starting....

WS Quick Keylogger  WS Quick Keylogger

 Monitor your PC activity easily with Quick Keylogger. This keylogger will capture absolutely all keystrokes, monitor your outgoing e-mails secretely logging all typed letters, instant messengers, passwords and more! Try it for Free! Monitoring your computer is a tough and responsible process, you can never tell for sure who and when used your PC without a special software installed. Most surveillance programs are very difficult to use, unlike Quick Keylogger! You can install Quick Keylogger within 2 minutes after your free demo download. Set your password for logs viewing and start monitoring. With Quick Keylogger you can easily capture keystrokes and monitor computer usage without any special technical knowledge. Detailed information about every keystroke includes date, time, PC name, username, application and path. It is enough to have a total control on your computer and be sure nobody uses it for illegal purposes or without permission! Not a single keystroke can be hidden from Quic...

Softlock.CD  Softlock.CD

 CD protection is a popular protection technique. Many software vendors use this technique to protect their software...

Swift Block Dialers Exploit System Monitor  Swift Block Dialers Exploit System Monitor

 Is someone stealing your information from your PC? Is your browser home page hijacked? Do you constantly get pop-ups? Are you in danger of identity theft? Are you being watched and tracked? Find out with Swift Block Dialers Exploit System Monitor. This spyware remover detects and removes more than 62,904 types (more than 159,000 items and variants) of intrusive devices such as spyware, adware, hijackers, key loggers, Trojans, tracking devices, hacker tools, and spy devices on your PC. Search for hidden packed files, services, and processes. Locate and delete all spywares and malwares such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb from your pc....

SMSecurity Pro  SMSecurity Pro

 With SMSecurity, any kind of big capacity file can be split into several small ones with appointed capacity. In this way, it is easy to communicate or share the big files on the Internet, or to copy them with small capacity discs. The person who receives the split files just merge the files, so communicating, sharing and copying of big capacity files can be achieved. During the split and merge, the split files can be encrypted (128 bits), decoded, and tested, making data in the files keep completed and safety....

Hope Remove Worm Spy Bot  Hope Remove Worm Spy Bot

 Hope Remove Worm Spy Bot supply the utility tools to configure your system immune with spyware and recover the damages caused by spywars. Anti-virus&Spyware does not conflict with other antivirus programs. Scan and remove spyware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb from your computer and monitor running programs....
 Advertisements

DUN Shield  DUN Shield

 Is your Dial-Up Network Insecure?? Who is misusing your Internet account on your computer?? Is your kids surfing and chating for hours or passwords stolen!! Do unauthorized users get your phone calls over billed! then DUN Shield is your right choice. You can control the way your Internet needs to be. Restrict access by Password Protecting your Internet, Dial-Up Connection, installation of new modems & new connections and much more......

Shield Firewall 2005  Shield Firewall 2005

 A firewall is a type of software that monitors all incoming network traffic while you're online and allows...

Remora USB Disk Guard Pro  Remora USB Disk Guard Pro

 Remora USB Disk Guard Pro is a project based file encryption/compression tool, or a strong file encryption/compression switch which can startup from your USB storage devices. With Remora USB Disk Guard Pro, you can secure all your files anytime and anywhere, and use them conveniently at the same time....

SourceGuardian PHP Encoder  SourceGuardian PHP Encoder

 SourceGuardian for PHP is the ultimate protection solution for your PHP scripts. Main feature list: + Full Bytecode Encryption - protect your files by removing the original PHP Source Code + Fully encode and deploy for PHP5 (and PHP4) + Choice of Windows/Linux/Mac OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and Advanced mode in GUI + Automatic backup of source files + Deployment options + Lock to domain names, IP addresses or LAN hardware + Timeout your scripts at specific dates or days in the future + Encoded files run under Linux, FreeBSD, Windows, Mac OS X, Solaris, HP-UX + Require no changes to the standard web server installation + Free minor updates + Technical support SourceGuardian for PHP is the most comprehesive and user-friendly protection solution on the market. A free 7-day trial is available...

WinLock 2000  WinLock 2000

 Cool security and administrative tool for Windows. Major features of WinLock 2000: Lock Windows at boot time, Lock Windows at suspend time, Lock, Suspend or Shutdown easily with once click, Autosave applications on Shutdown time, Autorun saved applications when system start, Autorun any applications when system start, Windows List with Show/Minimize/Maximize/Hide and info functions, Process list with Icon/ID/Type/Priority/Kill and info functions, Module list with Icon/ID/Type/Priority/Kill and info functions, Powerful restrictions tool, powerful process administrator tool, powerful module administrator tool, powerful windows administrator tool. Powerful administration tools. Ideal tool for schools and educational organisations....

nPassword  nPassword

 nPassword is light, standalone, portable and more secure than most of it's competitors. The keyword is convenience and that's the area where nPasswords goes ahead. You can use customizable systemwide keyboard shortcuts, create macros, access your passwords quickly from any program with the QuickPassword popup feature (Win+X by default) and you can drag your data fields off nPassword into any windows program. portability - it remembers your settings in whole into it's own settings files and not windows registry - it opens your last used databank automatically (optional) - it uses relative paths - it's not dependent on any other program. you can use QuickPassword feature and macros into any program. It is safe to use nPassword from your USB drive or memory card. If you know any other password manager complying with the above please notify me. I'd like to know. security - 256bit AES encription should be sufficient for anyone under normal circumstancens - macros and direct shortcut actions...

Merry Block Spies Trackware Adload  Merry Block Spies Trackware Adload

 Merry Block Spies Trackware Adload is an antispyware, antimalware, antispam software that quickly and securely removes spyware and other Internet infections, including spyware, adware, malware, home-page hijackers, remote administration tools, dialers, and keyloggers. Detect and stop Spoofing attacks and Internet Phishing from stealing your financial data. Detect and eliminate such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus....

Unlimited AntiSpy BHOs Adware Trojans  Unlimited AntiSpy BHOs Adware Trojans

 Unlimited AntiSpy BHOs Adware Trojans is a safe and easy-to-use tool that recovers your browser after it has been hijacked by spyware, adware, and browser hijacker. Unlimited AntiSpy BHOs Adware Trojans will scan your registry and fix IE homepage, IE default page, IE search page, BHOs, IE menu, Internet options, IE search hooks, IE toolbars, IE context menu, and Registry. Hundreds of known browser hijacker defines help you find out who had changed your browser. Protect your PC from spyware and malware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Keyloggers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie....

Hope Spy Dialers RAT Scanner  Hope Spy Dialers RAT Scanner

 Hope Spy Dialers RAT Scanner quickly and effectively provides maximum protection with minimal interaction. With an easy-to-use console and customizable options, Hope Spy Dialers RAT Scanner makes maximum protection a snap. You won't have to scan and restart your PC over and over with Spy Sweeper one sweep and your PC is clean. Version 5.5 includes inbound and outbound e-mail attachment scanning and enhanced real-time threat protection capabilities. Detect and stop Spoofing attacks and Internet Phishing from stealing your financial data. Detect and eliminate such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus....

DataSafePro  DataSafePro

 DataSafePro is the ideal application for securely managing all of your personal, business and financial information.DataSafePro offers easy to use interface, possibility to define your own forms, support for attaching files and images. All your data can be secured with unbreakable encryption - the AES standard....

Merry Anti-virus Time Bomb Viking Spies  Merry Anti-virus Time Bomb Viking Spies

 Merry Anti-virus Time Bomb Viking Spies - Unlike other anti-rootkit utilities which merely "reveal" hidden objects, Merry Anti-virus Time Bomb Viking Spies positively identifies known and unknown rootkits and gives the option of removing them, including their associated registry entries, processes and files. Detect and remove spyware, keyloggers, and other trackware components such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

Kids PC Time Administrator  Kids PC Time Administrator

 Do you know that computers can be a real pain for your kids ? Sitting for a long time in positions that aren't natural for their body can strain their hands, wrists, back, and eyes. If you are concerned your child may be spending too much time online or playing games this type of software will offer a solution. It allows you to set limits on how much time your child spends on the computer or online. You can share the same computer among your children by setting an individual time table for each child. Also you can prevent the PC usage until the specified date, after the specified date or between specified dates. The 'Kids PC Time Administrator' records all actions to a log file so you will know when and how much your child used the PC. The password control prevents unauthorized users to change settings and uninstall the product. Another security features: it prevents new software installation, disables the Task Manager, restricts access to Control Panel applets....

Internet Security Logger  Internet Security Logger

 - Do you want to know what kind of information programs send from your computer to their owners? - Are you a network or system administrator and need to save all incoming and outgoing Internet traffic on the hard disk in order to measure the security risks? In both cases Internet Security Logger can be a vital tool for you! The content for each Internet related program is saved in its individual log file. The content log files also are separated by date and by computer users....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>