Software Downloads for "Downloads Windows Security"

Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives.

Secure Windows Auditor (SWA) A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing tools, all come as a package with this computer security software. Secure Windows Auditor (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators & IT security auditors to conduct in-depth security assessments of network based windows systems.

Secure Windows Auditor - A Windows security software solution & windows security auditing & assessment tools - information security auditing & assessment software, Secure Windows Auditor™ (SWA) is a windows security software solution which provides windows security auditing and assessment software which empower network administrators & IT security auditors to conduct in-depth security assessments of network based windows systems. This security software can run from a centralized location on the network during security assessments.

  • Platform: Windows
  • Publisher: Secure Bytes
  • Date: 17-02-2011
  • Size: 83839 KB

Windows Security Tweaker is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives.

Designed for everyone using or planning to use Windows Vista operating system, this Windows Vista security quick guide covers all daily used Windows Vista security features and options, provides quick solutions when crisis happens, and gives tips for users to better manage his/her system to achieve security goals. A comprehensive yet portable Windows Vista security reference for everyone and everyday to harnese the power of Windows Vista security features Security risks and Windows Vista solutions in the categories of data protection, system update, user management, anti-malware, Interne threats and wireless securities.

  • Platform: Not Applicable
  • Publisher: Javvin Company
  • Date: 01-07-2008
  • Size: 33 KB

Secure-It is a local Windows security hardening tool, proactively secure your PC by either disabling the intrusion and propagation vectors proactively or simply reduce the attack surface by disabling unimportant functions. It secures Windows desktop PCs and Internet servers against new dangers by blocking the root cause of the vulnerabilities exploited by malware, worms and spy ware . In some cases Secure-it is even able to protect your PC against threats prior to a patch release of the vendor.

  • Platform: Windows
  • Publisher: YASC LTD
  • Date: 18-02-2005
  • Size: 712 KB

Harden-It 1.1 Windows Security Hardening Tool, harden your TCP/IP Stack and Local System. Harden-It is a Network and System hardening tool for Windows. By hardening the IP stack your Network can sustain or completely twarth various sophisticated network attacks. By hardening your Local System lots of current malware, spyware, worm infection are completely blocked, proactively harden your system even against future uknown attacks. Network Hardening : · Harden your server's TCP and IP stack (Netbios, ICMP, SYN, SYN-ACK.

  • Platform: Windows
  • Publisher: YASC LTD
  • Date: 18-01-2005
  • Size: 433 KB

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is such a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware. Cerberus Security Guard is another highly demanded software offered by bestsecuritytips.com which guarantees a system well taken care of in terms of professional Internet protection.

WinCustomizer allows you to manipulate an enormous amount of windows settings. These settings are normally not available to the user except through the registry, which requires registry knowledge. However, with WinCustomizer, you can edit all of the these settings easily, without knowing anything about them or the registry. This edition from WinCustomizer is all about windows security and user privileges. It lets you control a lot of per-user settings, for example, you can let user A access the hard disk, prevent user B from changing some specific windows setting, prevent user C from running a certain application and so on.

To extend data protection beyond the limited scope of standard Microsoft Windows security services R-Guard allows users to set access rights not only for users but for applications and system processes as well. R-Guard Host based Intrusion Detection System shields users' files from viruses, spyware, Trojan horses, and other unwanted and potentially disastrous intruders. Most common applications presets protect your PC right away after the software installation. Improved interface provides you with easy and quick settings control.

Increase your Windows security level. Get rid of the weak Windows password system. Replace it with a strong, highly secure, 2-Factor (or even more) login system, using your existing removable storage device. Protect & Lock your PC & your files by turning your existing removable device (USB drive, MP3 player...) into a secure key. At last a highly secure login software for Windows designed for human beings. When you plug your storage device into your PC you are identified and logged in. When you unplug it, the PC is locked.

The utility for any serious Windows tweaker! Change hundreds of registry settings from Windows XP, improving appearance, performance and functionality. Prevent others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options, even choose which applications can or can't be run on the computer. You can change Windows XP system performance, by selecting to keep the Windows XP core system in memory, and not paged to disk (advisable only if you have 512MB RAM or more).

  • Platform: WinOther
  • Publisher: WinShareSoft
  • Date: 24-07-2006
  • Size: 1202 KB

Ashampoo Security Pack 2 is the control, installation and launch centre for all your Windows security needs. On installation it checks your computer for existing Ashampoo security tools and automatically integrates them in its launch pad interface. If you want, you can then download and install any of the other tools you would like to have in a simple, one-click process. You can also use it to try out the Ashampoo security tools – you get the normal free trial options for every tool. Just click once on the tool that interests you to download, install and run.

  • Platform: Misc Scripts
  • Publisher: Ashampoo
  • Date: 24-05-2011

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

FPG can lock the specified folder, user who want to open the folder must input the admin password. FPG can hide specified folder too. User must provide admin password to unhide it. An example of FPG wide application is that you can lock or hide the personal folders by FPG when this computer is shared to other persons. Any body who used your computer can't browse your locked folder unless you give them your password.. Windows security software and useful Windows utilities at WinAbility.Biz. WinAbility.

  • Platform: Windows
  • Publisher: ISecSoft Inc.
  • Date: 16-08-2009
  • Size: 778 KB

Kerio Personal Firewall (KPF) protects PCs from Internet threats. KPF inspects both incoming and outgoing connections ensuring that only legitimate traffic is allowed. MD5 signatures are assigned to all applications to prevent Trojan horses from posing as a trusted application. Kernel monitoring prohibits installation of potentially dangerous kernel drivers that may bypass the firewall inspection. KPF offers a remote administration, logging of suspicious activities, open connections overview and automated update checker.

LanHound is a useful program that will help you to hunt down broadcast storms, analyze protocols,monitor and secure your network What separates this puppy from the pack is that it is a super affordable tool that helps you troubleshoot NT/2000/2003 LAN, WAN or Internet segments.LanHound has practically all the features of products twice as expensive, and it supports switched networks! LanHound is a useful program that will help you to hunt down broadcast storms, analyze protocols, monitor and secure your network.

This utility allows an IT professional to install several programs with a single click. It is designed to launch from a network share and suppress any Windows security questions about launching programs..

Many of us keep personal/work information in our PC’s, information that is meant strictly for our eyes only. However, being online also allows a possibility that a malicious software can cross over to some deep corner of your PC and can start sending confidential information to someone, without you even knowing. This is where SterJo NetStalker comes to the rescue. SterJo NetStalker works on both 32-bit and 64-bit editions of Windows XP, Windows Vista, Windows 7 and Windows 8. It provides you internet protection as well as network security, windows security and computer protection.

  • Platform: Windows
  • Publisher: SterJo Software
  • Date: 10-11-2013
  • Size: 989 KB
New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

RationalPlan Single Project
for Mac

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

Network Shares Recycle Bin

The Network Shared Recycle Bin
allows you to backup and
recover deleted files on the
server side. Once you have
this tool ...

Debut Pro Edition for Mac

Debut Pro Edition Video
Capture Software for Mac
allows you to easily capture
video and store the data on
your Mac\'s ...

WinTools.net Premium

A suite of tools for
increasing MS Windows
operating system performance.
WinTools.net Premium contains
tools: Clean ...

RationalPlan Single Project
for Linux

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

Easy Card Creator Express

The ideal choice for small to
medium sized organizations and
individuals looking for an
affordable photo ID card ...

SoftPerfect WiFi Guard

A specialised network scanner
that helps to protect and keep
your WiFi network secure. It
scans your wireless network at
...

Devart ODBC Driver for
SQLite

Devart ODBC Driver for SQLite
is a high-performance
connectivity solution with
enterprise-level features for
accessing ...

Express Scribe Pro Edition

Express Scribe Pro Edition
helps typists by installing on
the user\'s computer and
connecting to a transcription
foot ...

Net Monitor for Employees
Professional

The Net Monitor for Employees
is employee monitoring
software that allows you to
see screens of remote
computers or show ...