Search Software:      

 
aa defense

Relevant Keywords 

  

Free Defense Downloads

 

Anti Tracks

Anti Tracks is a complete solution to protect your privacy and enhance your PC performance. With a simple click Anti Tracks securely erase your internet tracks, computer activities and programs history information stored in many hidden files on your computer. Anti Tracks support Internet Explorer, AOL, Netscape/Mozilla and Opera browsers. It also include more than 100 free plug-ins to extend erasing features to support popular programs such as ACDSee, Acrobat Reader, KaZaA, PowerDVD, WinZip, iMesh, Winamp and much more. Also you can easily schedule erasing tasks at specific time intervals or at Windows stat-up/ shutdown. To ensure maximum privacy protection Anti Tracks implements the US Department of Defense DOD 5220.22-M, Gutmann and NSA secure erasing methods, making any erased files unrecoverable even when using advanced recovery tools.

anti tracks privacy disk cleanup privacy software secure erase internet internet privacy history tracks history cleaner tracks eraser online privacy disk cleanup tool

Storm Angel

The year is 2456 A.D. and Alien elite forces have invaded our space colonies. In a bold offensive move, the intergalactic military defense fleet tried to defeat them but was completely wiped out. Now the alien threat is about to strike planet Earth itself! Is all mankind lost? No! As the STORM ANGEL, the most powerful ship ever designed, is ready to be unleashed on our enemies! But a great ship requires a great pilot and it's up to YOU to save the human race! Full game features: - Old school arcade gameplay with astonishing 3D visual effects! - 13 full-action packed levels! - Fight the fiercest bosses ever seen in a game! - A choice between 10 different weapons! - Upgrade your weaponry system up to 7 levels of power or buy highly destructive positronic charges according to your tactical and strategic preferences! - Top movie-style soundtrack and apocalyptic sound effects! - Several difficulty settings to satisfy beginners and expert shooter players. - Hidden game modes that only a high-skilled player can unlock!

shootem up action game old school shootem game astonishing 3d visual effects

Visual Log

To us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to find out who or what made it happened. Besides critical servers, for those public accessible computers such as school lab PCs, library computers, etc., A good log solution is really a strong defense to trouble-makers. We know there are so many KeyLoggers, Spyware, Keyboard hooks etc. on the the earth, however our goal is not to hack someone else (visual log don't send out silent emails) but rather to give windows administrators a easy but powerful Log Tool. Visual Log is an advanced Windows logger. It's not just a perfect key logger it logs all of running programs, associated files, and of couse screenshots. Much more, With the help of the build-in powerful Log Viewer, it's very convenient to browse through the executive-grouped tree-structures instead of reading the boring flat text-image log files. Note: After downloaded the small setup file, please keep online and download the rest 3.9M file

visual log key logger keylogger system log computer monitor spy software logger visual log advanced windows logger

Asmw Eraser Pro

Remove Internet tracks and past computer activities. It can quickly erase your cache, cookies, history, visited URLs, typed URLs, index.dat, Clean Forms Passwords data, temp folders and more. The cookie-cleaning and typed URLs feature allows you to specify which item to keep, so that you don't erase your important login cookies or URLs. It supports free plug-ins to extend cleaning features to support popular programs such as ACDSee, Acrobat, Kazaa, ICQ2003 and many others. Additional features include a secure file-shredder, scheduled cleanups, Boss Key, and support for Netscape and Opera. Asmw Eraser Pro completely implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standards, You can then completely overwrite files with random characters making them unrecoverable by undelete or un-erase utilities giving you confidence that once deleted with Asmw Eraser Pro, your file data is gone forever and cannot be recovered, It Supports Multi language interface.

cover internet tracks security internet remove internet history clear cookies clean speed tracks eraser eraser boss key protect privacy erasing tracks activities

Spamologist

Spamologist is a spam filtering program unlike any other. It utilizes several fully customizable defense mechanisms; dictionary filtering, advanced dictionary filtering, advanced header filtering, allow and block lists, online block lists and a state-of-the-art verification system. Spamologist is the only program of its kind that guarantees a reduction in spam of 100%, or your money back.

Spamologist runs in the background to make sure that you never receive spam email again. It works with all of the leading email programs (including Outlook, Outlook Express, Eudora, Mozilla Mail, Mozilla Thunderbird, Netscape Mail and Opera) and takes merely seconds to setup and configure.

The confirmation feature requests all messages be verified by the original sender using the revolutionary confirmation system before they are delivered. Effectively preventing messages sent by advertising campaigns and fake email accounts from ever making it to your inbox. Making sure you only receive the messages that were sent by people with legitimate email addresses.

Using a series of pattern recognition techniques to decipher words, Spamologist is able to compare words in messages with those that are commonly used by email marketing campaigns. Even capturing spam that contains misspelt words or words that have letters that are replaced with numbers (or even symbols) - a sneaky technique that is often used in an attempt to trick some spam filtering software.

Additionally, Spamologist prevents emails with potential malicious attachments from making their way to your inbox. Which means it also protects your email inbox from viruses, security breaches and hacker attempts. As well as filtering false virus and undeliverable warnings which are an undirect result of viruses and worms and can often fill up your inbox.

spam junk email mail message confirmation confirm authorize authorise challenge response lyttlesoft studios spamologist filter block filtering blocking blocks filters allow list white black whitelist

JoSyrux

16 planets are being attacked by the aliens. The higher the game level, the more merciless their attack becomes. Only your skillful and intelligent defense tactics will prevent them from conquering all of the planets. To do so, you need to figure out the aliens' attack strategy: indiscriminate firing will only lead to you being destroyed. JoSyrux has two game modes: first, game play with the object of freeing a planet and second, game play with the object of reaching a high score.

shareware games online games shockwave games action arcade aliens invaders space 16 planets being attacked aliens try repel their attack

Caloona

In Caloona you fight a dozen unique AI-personalities in a turn based strategy game. There are more than twenty pre-built, optimized maps and with the easy-to-use editor you can create new galaxies in no time. Get up and running in five minutes or explore the more advanced options: Customize your player, select some thirty special abilities including attack and defense bonuses, omniscience, and an espionage bonus, and battle your favourite selection of AIs. As you get better, so do up to seven computer opponents in five levels of difficulty.

space strategy game turn-based caloona turn based space strategy game

Horizon X

Alien Invaders are attacking your planet! Your only defense is to use your flying platforms to neutralize the bombs before they hit the ground. It will take quick actions and a steady hand to bring order and peace to this chaotic world. Take a deep breath because the aliens never stop and the bombs keep coming faster, and faster, and faster....

game action arcade action gaming its finest featuring intense gameplay tons missions

Eraser

Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.

erase wipe shred overwrite destroy remove file folder directory disk data security secure erase data permanently free

East-Tec Eraser 2004

Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2004. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages, temporary files, the Windows swap file, the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, etc. East-Tec Eraser 2004 offers full support for popular browsers (Internet Explorer, Netscape Navigator, America Online, MSN Explorer, Opera), for Peer2Peer applications (Kazaa, Kazaa Lite, iMesh, Napster, Morpheus, Direct Connect, Limewire, Shareaza, etc.), and for other popular programs such as Windows Media Player, RealPlayer, Yahoo Messenger, ICQ, etc. Eraser has an intuitive interface and wizards that guide you through all the necessary steps needed to protect your privacy and sensitive information. Other features include support for custom privacy needs, user-defined erasure methods, command-line parameters, integration with Windows Explorer, and password protection. The Scheduler functionality added in the latest version allows users a better management of the system resources while keeping the computer secure and cleaned out of sensitive information. Now, you can also protect the Restore Points from being deleted and choose the level of password protection that best suits your needs.

privacy private internet privacy online security evidence traces web peer2peer kazaa safe secure surfing history cookies pages search sites pictures mail email chat news adult internet explorer

 
Audio Software
Office & Business
Games Software
Graphics Software
Internet Software
Home Software
Developers Tools
System Utilities
 
 
 
 

Page 1 out of 5    1 2 3 4 5

 

Copyright 2004-2010 FilesWeb.com | Submit Software | Contact Us