Freeware Listing: Tor Detection

For average PC users learning about the details of each hardware component used in the laptop or desktop may not be an easy task. It is something the geeks can find out easily. However, less tech savvy PC users can surely resort to specialized third party software for this. Utilities like PCFerret can be used to scan PC for system and software information. This tool is freeware but offers you great insight into the system.

PCFerret runs on PCs with Windows Vista and later versions. It also requires Microsoft .NET framework version 4.5 or later to be installed in the computer.

The app has a sleek and uncluttered UI that makes navigation easier.

  • Publisher: PCFerret
  • Date: 31-03-2015
  • Size: 9613 KB
  • Platform: Win7 x32, Win7 x64, Windows 8, WinVista, WinVista x64

Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections.

Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports.

  • Publisher: Ax3soft
  • Date: 25-02-2011
  • Size: 7051 KB
  • Platform: WinOther

The Drug detection screensaver from Trustests gives approximate detection periods for many substances of abuse by drug test type. Drug detection time chart screensaver help students and teachers see the detection times for many substances. The ranges depend on amount and frequency of use, metabolic rate, body mass, age, overall health, and urine pH. For ease of use, the detection times of metabolites have been incorporated into each parent drug..

  • Platform: WinOther

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

  • Platform: WinOther

This is a demo program of the paper L. Ma, J. Tian, and W. Yu, "Visual saliency detection in image using ant colony optimisation and local phase coherence," Electronics Letters, Vol. 46, Jul. 2010, pp. 1066-1068..

  • Publisher: Kanchi
  • Date: 22-04-2013
  • Size: 20 KB
  • Platform: Matlab, Scripts

It is a new block library simulink called Detection of Frequency of periodic signal..

  • Platform: Matlab, Scripts

Fire Smoke Detection is an additional module for CyeWeb that can easily detect smoke and fire on the video content and notify the user immediately. With this module, you can bring extra protection by increasing the response speed to such unwanted events.

Fire Smoke Detection can prove very useful mostly for crowded outdoor environments, such as airports, malls or railway stations. It is designed to analyze video content and recognize fire and smoke.

.

  • Platform: Windows 7, WinOther, WinVista

Mime Type Detection Utility is a lightweight Java component that you can integrate in your projects in order to add MIME type detection capabilities to your applications.

Mime Type Detection Utility provides support for byte arrays and can detect MIME types in java.io.InputStream, java.net.URL and java.io.File, based on content, file extensions and magic data.


.

  • Platform: WinOther

As its name suggests, Edge Detection is a simple application capable of automatically detecting the corners of an object in an image.

Edge Detection provides support for common picture formats. It detects the object in the input image and encases it in a rectangle.


.

  • Platform: Windows 7, Windows 8, WinOther, WinVista

Face Detection in Color Images is designed as a handy and easy-to-use instrument that is able to cover an algorithm for face detection in color images.

Face Detection in Color Images was developed with the help of the Java programming language.


.

  • Platform: WinOther

Cyberarms Intrusion Detection is a handy and reliable application designed to detect intrusion attempts and block them.

Cyberarms Intrusion Detection uses the Windows event log for security analysis and denies the access to hackers on a very low system level.

.

  • Platform: Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

Microsoft CLR Known Ngen Failures Detection Tool is a lightweight command-line utility that was created in order to provide you with a simple means of checking .winmd files in Windows 8 Release Preview.

With its help you can detect errors when native images are generated by the Windows App Certification Kit.

.

  • Platform: Win7 x64, Windows 7, Windows 8, WinServer

The Microsoft GDI+ Detection Tool helps detect the presence of non-Windows Microsoft products that contain the GDI+ component. Microsoft customers can run this tool to help determine if a GDI+ security update should be applied.

Get Microsoft GDI+ Detection Tool and give it a try to fully assess its capabilities!

NOTE:
This update applies to the following product: Picture It!, Picture It! Publishing, Greetings, Digital Image Pro, and Digital Image Suite, .NET Framework 1.0, .NET Framework 1.1, Visual Studio .NET 2002, Visual Studio .NET 2003.

.

  • Platform: WinOther

Windows Virtual PC requires processors capable of hardware-assisted virtualization with AMD-Vd-OC?D?, InteldlT* VT or VIAdlT* VT turned on in the BIOS.

The HAV detection tool helps you check if the computer processor supports hardware virtualization. The tool also checks if this feature is enabled on the processor..

  • Platform: Windows 7, WinServer, WinVista

Hough Circle Detection is an easy to use piece of software that is able to detect circles in images.

Here are some key features of "Hough Circle Detection":

* Detect Circles in Captures of Firewire Cameras
* Detect Circles in Image files
* Fully parameterizable
* Resulting Image can be exported
* Setup can be saved and loaded
* Example images and profiles included
* Result table with coordinates and radii.
* Faster detection with Intel Integrated Performance Primitives.

  • Platform: WinOther

VMM Basic have intern motion detection commands to make interactive games for your webcam, intern sprite commands based on DirectX to make any 2d game with blend, rotation, color key, animations, deformation, color layer effects, and more, network commands to make online games. Main features: Create stand-alone executables. Up to 5 types of variables. Arrays up to 4 types and 16 dimensions. If - Else - EndIf, Repeat - Until, While - Wend, For - Next flow control commands. Procedures with full recurrence, up to 16 parameters. Local and global variables. STDCALL and CDECL dynamic link libraries supported.

  • Platform: Win2000, WinOther

GFI LANguard System Integrity Monitor (S.I.M.) is a utility that provides intrusion detection by checking whether files have been changed, added or deleted on a Windows 2000/XP system. If this happens, it alerts the administrator by email. Because hackers need to change certain system files to gain access, this freeware utility provides a great means to identify any servers that are open to attack..

  • Platform: Win2000, WinOther

FraudLabs Credit Card Fraud Detection Desktop is a free standalone Windows application that allows instant detection of fraudulent online credit card order transactions using Windows GUI. Users can perform 90 queries per month using Free account. Please visit http://www.fraudlabs.com for more information..

  • Platform: Win2000, Windows Server, WinOther

A free, small, fast and easy-to-use scanner that has detection and repair capabilities for JPEG files infected files On September 14 2004, Nick DeBaggis discovered a buffer overrun vulnerability in gdiplus.dll - a library used by many common applications (including most Microsoft applications) for viewing JPEG images. Subsequent analysis by the eEye team confirmed that the vulnerability could be exploited to execute arbitrary code, allowing an attacker to gain control of a remote system simply by enticing the victim to look at a specially-crafted JPEG image. MS04-028 is the tracking code assigned by Microsoft to this specific vulnerability.

  • Platform: WinOther

Finds unknown threats in your machine by positively identifying every executable. Unknown executables are immediately transmitted to our lab for free analysis. Boasts highest detection rate of any product. Checks registry, running processes, autostart locations, cookies, too. Smallest footprint of any AV product. Self-updating. Very, very fast. Compatible with all AV products. Free! Developed by pioneers in the anti-virus and anti-spyware industry, Wuzzup was developed to solve a growing problem: malware is now emerging at a rate of about 3,100 new named malware "products" and over 16,000 new malware files a day, and scanners are not keeping pace.

  • Publisher: BugBopper
  • Date: 14-07-2010
  • Size: 2858 KB
  • Platform: Win2000, Win7 x32, Win7 x64, Windows Server, Windows Vista, WinOther, WinVista, WinVista x64

Tor Detection: Freeware | All

New Reviews


Norton Internet Security Beta

Due to growing number of cyber-attacks, need of secure computers and networks has increased dramatically. Therefore, new protection technologies are being introduced every day and are incorporated into different products. This has led to evolution ...


Clear All History

Regardless of what you do online and who you share your computer with, its always has been and always will be a good idea to clear your traces and virtual footprints left behind on your system. Not only is this good practice to help protect your ...


Vehicles 2

Vehicles 2 is a great example of innovation in a game, from the very beginning cut scene (which explains the general back story to the game in a very light, humorous way) to the gameplay style, it has a lot of influence from other games in the ...


Secure Virtual Desktop

Secure Virtual Desktop is a piece of software that allows you to enter a temporary ‘Secure’ desktop state, where everything is filtered and anonymous - sounds interesting, doesn’t it? Secure Virtual Desktop is definitely something ...


SpeedUpMyPC

SpeedUpMyPC is a program which apparently has the capabilities to boost your system performance by resolving computer issues it finds after scanning though your system SpeedUpMyPC is most definitely not the only piece of software that claims to be ...


Trillian

If you are an avid internet user, you'll be having accounts and friends all over Google, Facebook, MySpace, MSN and other such networks. With multiple accounts and probably hundreds of friends distributed over these networks, it becomes ...


CloneCD

Despite huge growth in technology and tremendous increase in use of flash drives, use of CDs and DVDs hasn’t disappeared yet. Conventional 700MB CDs are still in use, largely due to the fact that they are extremely cheap. In addition of being ...


File Finder

File Finder is such a simple and easy program to use to track down and locate files and folders on your system. I think this has to be a fantastic selling point, but maybe also its downfall. It instantly took me back to the retro MS-DOS based ...


IE Internet Security

IE Internet Security isn't the program that I thought it’d be. After a bit of Googling, I discovered that IE Internet Security is in fact embedded into one larger application called 1st Security Agent, which is an all in one tweaking ...



New Downloads

FBackup

Configurable backup program
with an easy to use interface.
Performs mirror backups (exact
copies of your data), has file
...

Bytescout BarCode Generator

BarCode Generator is able to
generate and export barcode to
image (PNG, JPG, TIFF).
Types: Codabar, Code 39, GS1,
Code ...

DrawPad Graphic Editor Free
for Mac

DrawPad for Mac is an
easy-to-use image composition
and manipulation program, an
essential tool for all types
of graphic ...

Soft4Boost Device Uploader

Soft4Boost Device Uploader is
a compact full-featured
software which allows you to
easily upload your media
content, ...

isosize clothing size
widget

Should you sell new or second
hand clothes on ebay, etsy, or
any other selling webstore,
isosize helps you to provide
...

PTC Mathcad Express

PTC Mathcad Express is
free-for-life engineering math
software. You get unlimited
use of the most popular
capabilities in ...

Kat CD Ripper

Kat CD Ripper is a complex,
yet easy to use music software
which extracts Digital Audio
tracks from an Audio CD into
most ...

Kat Player

Kat Player is an advanced
music manager and audio player
which supports all popular
formats including MP3, MP4,
MPC, ...

eMule Super Booster

eMule Super Booster is a new
add-on for eMule file sharing
program. Latest technology
implemented will enable you to
...



Related Searches

Detection Cpu
Tor Annihilator
Tornado Tor Bit
Lite Tor Ares
Style Tor Base
Photo Face Detection
Torrent Tor Bit
Buddy Tor Bonzi
Detection M Car
Website Tor Ciw
Tor Conceptdraw
Bpm Music Detection