Software Listing: Hacker

Protect, secure, create rules and profiles, control, monitor your connections, view the history, select a security level. Protect your computer against unauthorized intrusions and hacker attacks. Secure your PC's registry against any suspicious attempts to change the registry contents. Select among several security levels to secure your computer from malware. Block online ads. Enable parent control and make a whitelist of sites to speed up your work with the Internet. Create your own rules for each application and specify exactly which connections will be used. Control your external and internal traffic.

  • Platform: WinOther

Anti-Hacker Expert - Protect personal computers decline hackers, trojans and baleful script Anti-Hacker Expert Trojan will scan and kill trojans and hacker programs. Actually Anti-Hacker Expert includes more than 12000 hacker program and trojan signatures. Use manifold scan,fast and reliable detects your computer.Use the portscan to find open ports for hacker and trojan on your PC, and delete hacker program and trojan. The registry-scan is highspeed scan for autorun-entries. It scans the system registry by using known trojan filenames. If a trojan is identified by the registry-scan, it will be removed from disk.

  • Publisher: qwerks.com
  • Date: 24-9-2009
  • Size: 2795 KB
  • Platform: WinOther

soapUI makes hacker prevention easy! With the release of soapUI 4.0, you can now Security Test your Services and Web Sites. With our new Security Testing functionality you can run a group of common Security Scans making sure your systems are safe..

  • Publisher: Soapui
  • Date:
  • Size: 107417 KB
  • Platform: WinOther

Nsauditor Network Security Auditor is a network security and vulnerability scanner thatallows auditing and monitoring network computers for possible vulnerabilities, checkingnetwork for all potential methods that a hacker might use to attack it and create a reportof potential problems that were found. Nsauditor is a complete network security softwarethat includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more..

  • Platform: Win2000, Windows 7, Windows 8, WinOther, WinServer, WinVista

StarCraft Hacker Chequer, Antihack for StarCraft & BroodWar. SCHC ~ The AreS Clan hack detector

Features:

Scan StarCraft replays
Check players before start the game to find hackers
All time on-line with SCHC hacker database
.

  • Publisher: EnGe3D
  • Date:
  • Size: 7147 KB
  • Platform: Win2000, Win7 x64, Windows 7, Windows 8, WinOther, WinVista

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets 4 features: strong encryption algorithms; a password management solution that stores all your passwords securely and helps you create secure passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain...

  • Platform: Win2000, WinOther

Is your credit card really safe after you have placed an order online, or is your information only a password guess away from a hacker? You may be surprised how many online stores leave critical backdoors open on their computers. These are the same computers which store your credit card information just after placing an order online! SafeShopper allows you to verify an online store's security before you place an order online by clicking the SafeShopper button in your Internet Explorer toolbar. SafeShopper provides you with an instant report as to if the online store is safe to shop at. SafeShopper also provides you with the location, owner, and contact information of the web site.

  • Publisher: ksoft
  • Date: 02-02-2004
  • Size: 575 KB
  • Platform: Win2000, WinOther

SafenSec is a software for protection user's data from threats and vulnerabilities. SafenSec is new generation of protection systems: - against spyware, Trojans etc., - against hacker attacks, breaking in, information theft, - against user unqualified actions. Safe'n'Sec Personal advantages Innovation technologies of proactive protection Safe'n'Sec proactive protection system is based on the technology of intercepting and intellectual analysis of the system calls at the operating system level. All running applications constant analysis Malicious code real-time blocking Total protection against any intrusion into your PC Compatible with leading antivirus software and firewalls Known malware searching and deleting (in extensive set) Efficiency doesn't depend on updates Efficiently uses system resources...

  • Platform: Win2000, WinOther

PC Digital Safe with Virtual Anti-Hacker Keyboard is designed to protect you by preventing Identity Thieves and Hackers from recording your keystrokes. Also by securely storing all your passwords, valuable information and by automatically filling in Web Forms for you. (Saving you time online). PC Digital Safe Highlighted Features: Securely store all your Data, Remember all your Passwords, Full Network Support Organize all your valable information and save you time, Defeats Keyloggers Supports 32 Bit & 64 Bit Platforms Prevent theft of your data, Creates accounts for other users, Store data for each family member in a seperate password protected safe, Strong Encryption - 256 Bit - Rijndael Algorithms approved by the U.

  • Platform: Win2000, Windows Server, WinOther

Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features: strong encryption algorithms; steganography and a library of favorite carriers locations; a password management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the...

  • Platform: Win2000, WinOther

Problem - Viruses and other malicious applications are created more frequently and can infect any computer connected to the internet or those that run applications that are infected at a rapid-fire rate, often before a software update is available from the antivirus vendor, and before the individual can distribute the update to relevant platform... Current antivirus approaches simply will not be enough to counter emerging malicious-code threats, such as those posed by the vectors of instant messaging and peer-to-peer (P2P) applications, active content, and Web applications for malicious-code infections.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Any information a hacker can obtain about your systems is too much information. Broadcasting your Web server's identity via HTTP header data makes it easy for potential intruders to complete their first hacking task: IDENTIFYING your OS and Web server. Hacker pre-attack reconnaissance accounts for 40% of all Internet attack traffic, so make sure that your Windows Web server isn't giving away unnecessary clues about its identity. ServerMask from Port80 Software modifies your Web server FINGERPRINT¬Ě by removing unnecessary HTTP response data, modifying cookie values, eliminating file extensions (.

  • Platform: Win2000, Windows Server, WinOther

Swift Rootkit Web Bug Zombie Hunter stops keylogger and hacker tools, and protects from unknown Trojans that stealthily add an autostart key. It eliminates the traces of your work on your computer and your Internet activity, for example cookies, the cache, the history, typed URLs, and temporary files. Locate and remove and other malware threats such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb.

  • Platform: Win2000, WinOther

Personal Firewall Pro delivers world-class security and protection to your PC. Firewall Pro scans your DSL, cable or dial-up Internet connection looking for hacker activity and other Internet threats. Firewall Pro detects threatening Internet activity and prevents unauthorized access to your PC. Firewall Pro even blocks pop-up ads and other unsolicited content!Detects and Blocks malicious Internet activity before it can reach your PCProtects your personal information from hacker attacksAlerts and Records threatening Internet trafficIdentifies attackers and type of attack by nameBlock Pop-up ads and other unsolicited content.

  • Platform: Win2000, WinOther

Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outsideas well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not.

  • Platform: Win2000, WinOther

Protect webpages and important files against hacker, defend trojan and virus InfoArmor is the ONLY software that can authorize a program to visit protected folders or files. Most file-protect software prevent unwanted user to access protected files, but InfoArmor prevents unwanted software or program to access them. This make InfoArmor very suitable for website-protecting: You may permit only webserver and ftp software to access your web pages,any other programs,event windows kernel process, can not be utilized by hackers to deface your webpages.InfoArmor is a program which protects webpages and important files against hackers.

  • Publisher: qwerks.com
  • Date: 21-10-2009
  • Size: 2037 KB
  • Platform: WinOther

Security Shield 2010 gives you the best protection available today. Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental controls, an integrated firewall, a new and improved interface and much, much more! Powered by Kaspersky Labs technology, Security Shield 2010 has defended against more than 80,000 malicious Internet attacks - more than 200 a day. The volume is unprecedented. To guard against these threats, Security Shield 2010 now offers Triple Threat Protection - unique technologies that protect against identity theft, confidential data leakage and all Internet threats.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Security Shield 2011 gives you the best protection available today. Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental controls, an integrated firewall, a new and improved interface and much, much more! Powered by Kaspersky Labs technology, Security Shield 2011 has defended against more than 80,000 malicious Internet attacks - more than 200 a day. The volume is unprecedented. To guard against these threats, Security Shield 2011 now offers Triple Threat Protection - unique technologies that protect against identity theft, confidential data leakage and all Internet threats.

  • Platform: Win2000, Windows 7, Windows Server, Windows Vista, WinOther

Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network whether there is a breach of security strategy and the signs of being attacked in the network of hazard, and then intercept and stop before their invasion. Network administrators can directly monitor http requests, email messages, ftp transfers, as well as real-time activities and message details for the two popular instant messengers: MSN and QQ.

  • Publisher: Ax3soft
  • Date: 24-06-2011
  • Size: 7052 KB
  • Platform: Win2000, Windows Server, WinOther

Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections.

Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports.

  • Publisher: Ax3soft
  • Date: 25-02-2011
  • Size: 7051 KB
  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Bank Robber

Bank robber (the bank robber) is essentially a trial game or a demo for the full version of the bank robber, which costs $4.99, and is a third person stealth and strategy game. In the bank robber you play as a criminal having recently being released ...


Astronoid

Astanoid is a freeware arcade game which takes the core gameplay elements and ideas from the classic game breakout (also known as arcanoid) but instead of being a generic clone like every other game which takes the basic game mechanics from ...


Ocster 1-Click Backup

Nowadays, backing up is more of a necessity than ever before. Daily, people are experiencing hardware failures, computer crashes, and virus attacks that are damaging and destroying data, and in some cases just silly mistakes are causing people to ...


WinWAP Smartphone Browser Emulator

Win Wap is a freeware smart phone emulator, with the intended purpose of being installed on a desktop, to emulate “smart phone” browsers on a desktop computer, and allow you to see what your website (or indeed, any website or web page) ...


IE Internet Security

IE Internet Security isn't the program that I thought it’d be. After a bit of Googling, I discovered that IE Internet Security is in fact embedded into one larger application called 1st Security Agent, which is an all in one tweaking ...


LogMeIn Hamachi

Today, world is connected wirelessly with and without VPN. In coming time, VPN is going to be an absolute necessity for every organization. VPN stands for Virtual Private Network which is required to connect to the network of an organization without ...


Typing Invaders - Free Typing Game

Typing invaders is a free ware typing game, which (in short) essentially takes the concept from the game space invaders, and applies it to a fun typing improving game. It does this by taking all the core gameplay elements of space invaders, and then ...


Secure Virtual Desktop

Secure Virtual Desktop is a piece of software that allows you to enter a temporary ‘Secure’ desktop state, where everything is filtered and anonymous - sounds interesting, doesn’t it? Secure Virtual Desktop is definitely something ...


Coin World

Coin world is an interesting platforming demo game in which you play as “Colin the coin” as you take on the evil “bank note flash”. The premise alone is an interesting enough reason to play the game, and combined with the ...



New Downloads

Devart ODBC Driver for
Firebird

Devart ODBC Driver for
Firebird provides
high-performance and
feature-rich connectivity
solution for ODBC-based ...

Colibri Screensaver

Enjoy colibri flight in our
new nature screensaver. We
tried to make as realistic
animation as possible. Do you
want to ...

Aml Maple Portable Edition

Aml Maple is a new point of
view at keyboard layout
indicators: simple, modern,
flexible. It\'s easy to find:
just look ...

BWMeter

BWMeter is a powerful
bandwidth meter, monitor,
traffic controller and
firewall, which measures,
displays and controls ...

Advanced IP Scanner

Advanced IP Scanner is a free,
fast and easy-to-use
multithreaded network scanner.
Its many useful functions
include ...

Abyssmedia Audio Converter
Plus

Abyssmedia Audio Converter
Plus is a powerful,
professional solution designed
for converting the most
popular audio ...

Blog Module for Directy CMF

The Blog Module allows you to
manage a simple blog on your
site. It can be used to manage
your personal blog, company
...

Xplore Digital Catalog

Xplore is a windows based
Digital Catalog App that
enables you to easily create
an interactive product catalog
all by ...

RescuePRO for Windows PC

RescuePRO is an easy-to-use
application that recovers
images, movies, sound files
and more. This software is
compatible ...