Search Software:      

Free Intrusion Downloads

 

ActiveScreenLock

Computer security is one of the major concerns these days. Many of us have realized already that leaving our computers unprotected may result in data theft which in turn may affect privacy and business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as follows: first it disables Windows system key combinations, such as Alt+F4, Ctrl+Alt+Del, Alt+Tab and WinKey and then shows security screen over your desktop that would not let anyone except you in without the proper password. Once the system keys are disabled, it is not possible to switch to another application, run a program or try to kill Active Screen Lock window using Task Manager. The application is completely "bulletproof" as even if the Reset key is pressed on the computer chassis, the application will still be blocking access after computer reboots. All access attempts are logged in background, so that you can see whether there has been an intrusion attempt while you were away. The log file itself is encrypted ensuring the maximum possible security level for your computer. Besides being secure, Active Screen Lock is highly customizable allowing you to display clock and even custom image slideshow on the lock screen. Multilingual user interface and flexible licensing policy definitely make it an all-time winner! So go ahead, and try it today for FREE!

activescreenlock lock desktop pc lock system locking screenlock screen locking security locking access task manager block access control desktop

Keylogger Pro

Keylogger Pro is an advanced, low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every X hours. Keylogger Pro can run in total stealth mode for invisible monitoring or with an optional warning screen, making the user aware of the monitoring taking place. You can limit logging to selected users, set monitoring schedules and more. Additional features include an intrusion detection option that attempts to bypass spyware scanners. Keylogger Pro is perfect for monitoring spouses, children, employees, or even yourself to keep a safe backup of everything you type on your PC.

keylogger key logger spy software keylogger pro keystroke monitoring activity logging internet spy pc spy record keystrokes secretly record

McAfee Personal Firewall Plus

Protect yourself while online with the advanced security of McAfee® Personal Firewall Plus. Easy-to-use, yet highly configurable, McAfee Personal Firewall Plus secures your PCs connection to the Internet whether you connect via DSL, cable modem or dial-up. With intrusion prevention, color coded security alerts, customizable audible alerts, detailed logging, and an application scan for Internet enabled applications, McAfee Personal Firewall Plus gives you the power you need to control the communications into and out of your PC, ensuring that your online experience is as safe as it is enjoyable. Features: Identity Theft Prevention Places an easy-to-use, always on-guard barrier between hackers and your hard drive, blocking access to sensitive files, financial records and personal data. Enhanced Smart Recommendations Denies outbound Internet access to malicious applications (spyware, trojans and remote-control agents) that might surreptitiously transmit personal data to hackers, while "fingerprinting" trusted programs to connect without unnecessary or false alarm alerts. An improved application database now offers more details about connecting programs. Enhanced Intrusion Tracing Features easy-to-read graphical maps showing the source of hostile attacks and traffic worldwide, including detailed contact/owner information from originating IP addresses and all subsequent steps to your PC. Now includes improved Visual Trace geographical data, helping pin-point locations of intruders. Hackerwatch.org Integration Links to a dedicated anti-hacking database and Worldwide Hacker Activity Map, offering tips on responding to specific attacks, self-testing tools and channels to email online authorities of hacker events.

computer security pc protection security security software virus information web security service internet security online protection online security pc security personal computer security

Cookie Crusher

Many Web sites place electronic tags -- called cookies -- on your computer. Although cookies cannot damage your computer, they can assist site operators in profiling your surfing habits. Cookie Crusher® acts as a real-time cookie manager giving you complete control over cookies and your privacy. Cookie Crusher® transparently accepts or rejects cookies from Web sites, as well as classifies incoming cookies and labels their purpose. You can add sites or individual cookies from a Web site to filter lists for automated cookie handling. Cookie Crusher® permits wildcard use for added convenience. Cookies received from new Web sites can be accepted or rejected without any interaction based on classification or expiration date; the program can also prompt you for confirmation. Cookie Crusher® keeps a detailed list of cookies handled during the current session and allows you to analyze and delete saved cookies. In version 3.2 Cookie Crusher® can modify most cookies and make them session-only, allowing you to access Web sites that require cookies without having them stored on your computer. Version 3.2 also blocks referrer fields from being passed between Web sites, thus restricting a site from knowing how you arrived.

cookie privacy security intrusion profiles selectively controls web cookies real-time based

PC DoorGuard

A very extensive and thorough intrusion scanner that scans any media on your PC for backdoors and trojan horses. PDG easily removes any found trojan with a click of a button, together with any elements it may have left in registry/system files/memory. PDG also constantly monitors your system to prevent further infection, using weekly updated trojan database consisting of more than 7500 entries. Active e-mail Scan, full drive scan on demand, monitoring ports,- all this provides secure environment for your PC. Features: incoming e-mail scanning, on-demand fulls can,any running hidden processes and windows can be seen and terminated, update over the Internet with a click of a button, on the fly checking all the files you download, get via email or execute. PC Door Guard does not intercept system resources, thus allowing you to use it with any other anti-virus application for maximum protection.

trojan anti-trojan virus anti-virus full-featured professional anti-trojan fighter

Amiasoft Password

Tired of all those little scraps of paper with passwords scattered around your desktop? Tired of all those password confirmation emails you're afraid to delete? Amiasoft Password is the tool for you! Not spyware - not adware! Just a great tool for a reasonable price! A short list of features include: Multiple user account capability, Drag and drop operation for insertion of user name and password, Printing function for hard copy of passwords, Password protected database functionality, Internal security features to help maintain privacy from "over the shoulder" intrusion using our -Hide/Show password function, Descriptive titles allowing the same username to be used repeatedly, Configurable random password generation, Memo section for noting important info about password, like inception date, expiration date or special site instructions, Method of storing and launching relative URL information for quick access to the web site the particular password might pertain, Ability to disable Splash screen after registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files. Download your trial copy and discover how it can make your life easier today!

password storage database security privacy full featured password program drag drop

VisNetic Firewall

VisNetic Firewall is a stateful packet level firewall solution built to protect Windows-based Servers, telecommuters / mobile users, and LAN workstations not currently protected by a firewall. VisNetic Firewall is more secure than application-based personal firewalls, yet less expensive than high-end firewalls, providing peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced outside of the small to medium business market.

firewall firewall software network security high-level firewall deerfield com security conscious professionals

WebCam Monitor

WebCam Monitor turns your PC into a video surveillance system, that allows you to monitor your home/office from a remote location.
WebCam Monitor lets you simultaneously monitor four cameras and microphones. With support for both motion detection and sound detection, the software lets you keep an eye on your property from a remote location. Whenever WebCam Monitor detects an intrusion or other unusual activity, the program can perform any number of activities to protect your property.
WebCam Monitor can be configured to manually or automatically capture snapshot images, or record video and audio images. When an alarm condition is detected, the program can flash your computer screen, sound an audible alarm, or send you an email.
The application can be easily programmed to begin and complete recording on a predefined schedule. It's easy to upload your files to any FTP location periodically, or after an alarm condition is detected. In addition to capturing and transmitting video images and audio files, the software also maintains a detailed event log.
Up to four camera/microphone units can be easily connected to the PC's USB ports. It's easy to choose the appropriate activities that will be performed when motion or sound are detected. All of the settings can be customized, including the sensitivity of the motion and sound detection, the interval between snapshots, and the way that images are captured and transmitted.

webcam webcam software video surveillance surveillance video security turn pc video surveillance system monitor

RegistryProt

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

registry trojan virus registryprot tds anti-trojan subseven netbus back orifice bionet mosucker

KFSensor

Worried about hackers, worms and trojans? Want to improve your Internet security? Want to detect intruders? KFSensor is a host based Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers by simulating vulnerable system services and trojans. The system is highly configurable and features detailed logging, analysis of attacks and security alerts. This approach complements other forms of security and adds another defense against the growing security threat faced by all organizations.

honey pot ids intrusion detection system kfsensor detect hackers host based ids kfsensor honeypot based intrusion detection

 
Audio Software
Office & Business
Games Software
Graphics Software
Internet Software
Home Software
Developers Tools
System Utilities
 
 
 
 

Page 1 out of 2    1 2

 

Copyright © 2004-2010 FilesWeb.com