Software Listing: Hacker

Protect, secure, create rules and profiles, control, monitor your connections, view the history, select a security level. Protect your computer against unauthorized intrusions and hacker attacks. Secure your PC's registry against any suspicious attempts to change the registry contents. Select among several security levels to secure your computer from malware. Block online ads. Enable parent control and make a whitelist of sites to speed up your work with the Internet. Create your own rules for each application and specify exactly which connections will be used. Control your external and internal traffic.

  • Platform: WinOther

Anti-Hacker Expert - Protect personal computers decline hackers, trojans and baleful script Anti-Hacker Expert Trojan will scan and kill trojans and hacker programs. Actually Anti-Hacker Expert includes more than 12000 hacker program and trojan signatures. Use manifold scan,fast and reliable detects your computer.Use the portscan to find open ports for hacker and trojan on your PC, and delete hacker program and trojan. The registry-scan is highspeed scan for autorun-entries. It scans the system registry by using known trojan filenames. If a trojan is identified by the registry-scan, it will be removed from disk.

  • Publisher: qwerks.com
  • Date: 24-9-2009
  • Size: 2795 KB
  • Platform: WinOther

soapUI makes hacker prevention easy! With the release of soapUI 4.0, you can now Security Test your Services and Web Sites. With our new Security Testing functionality you can run a group of common Security Scans making sure your systems are safe..

  • Publisher: Soapui
  • Date:
  • Size: 107417 KB
  • Platform: WinOther

Nsauditor Network Security Auditor is a network security and vulnerability scanner thatallows auditing and monitoring network computers for possible vulnerabilities, checkingnetwork for all potential methods that a hacker might use to attack it and create a reportof potential problems that were found. Nsauditor is a complete network security softwarethat includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more..

  • Platform: Win2000, Windows 7, Windows 8, WinOther, WinServer, WinVista

StarCraft Hacker Chequer, Antihack for StarCraft & BroodWar. SCHC ~ The AreS Clan hack detector

Features:

Scan StarCraft replays
Check players before start the game to find hackers
All time on-line with SCHC hacker database
.

  • Publisher: EnGe3D
  • Date:
  • Size: 7147 KB
  • Platform: Win2000, Win7 x64, Windows 7, Windows 8, WinOther, WinVista

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets 4 features: strong encryption algorithms; a password management solution that stores all your passwords securely and helps you create secure passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain...

  • Platform: Win2000, WinOther

Is your credit card really safe after you have placed an order online, or is your information only a password guess away from a hacker? You may be surprised how many online stores leave critical backdoors open on their computers. These are the same computers which store your credit card information just after placing an order online! SafeShopper allows you to verify an online store's security before you place an order online by clicking the SafeShopper button in your Internet Explorer toolbar. SafeShopper provides you with an instant report as to if the online store is safe to shop at. SafeShopper also provides you with the location, owner, and contact information of the web site.

  • Publisher: ksoft
  • Date: 02-02-2004
  • Size: 575 KB
  • Platform: Win2000, WinOther

SafenSec is a software for protection user's data from threats and vulnerabilities. SafenSec is new generation of protection systems: - against spyware, Trojans etc., - against hacker attacks, breaking in, information theft, - against user unqualified actions. Safe'n'Sec Personal advantages Innovation technologies of proactive protection Safe'n'Sec proactive protection system is based on the technology of intercepting and intellectual analysis of the system calls at the operating system level. All running applications constant analysis Malicious code real-time blocking Total protection against any intrusion into your PC Compatible with leading antivirus software and firewalls Known malware searching and deleting (in extensive set) Efficiency doesn't depend on updates Efficiently uses system resources...

  • Platform: Win2000, WinOther

PC Digital Safe with Virtual Anti-Hacker Keyboard is designed to protect you by preventing Identity Thieves and Hackers from recording your keystrokes. Also by securely storing all your passwords, valuable information and by automatically filling in Web Forms for you. (Saving you time online). PC Digital Safe Highlighted Features: Securely store all your Data, Remember all your Passwords, Full Network Support Organize all your valable information and save you time, Defeats Keyloggers Supports 32 Bit & 64 Bit Platforms Prevent theft of your data, Creates accounts for other users, Store data for each family member in a seperate password protected safe, Strong Encryption - 256 Bit - Rijndael Algorithms approved by the U.

  • Platform: Win2000, Windows Server, WinOther

Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features: strong encryption algorithms; steganography and a library of favorite carriers locations; a password management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the...

  • Platform: Win2000, WinOther

Problem - Viruses and other malicious applications are created more frequently and can infect any computer connected to the internet or those that run applications that are infected at a rapid-fire rate, often before a software update is available from the antivirus vendor, and before the individual can distribute the update to relevant platform... Current antivirus approaches simply will not be enough to counter emerging malicious-code threats, such as those posed by the vectors of instant messaging and peer-to-peer (P2P) applications, active content, and Web applications for malicious-code infections.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Any information a hacker can obtain about your systems is too much information. Broadcasting your Web server's identity via HTTP header data makes it easy for potential intruders to complete their first hacking task: IDENTIFYING your OS and Web server. Hacker pre-attack reconnaissance accounts for 40% of all Internet attack traffic, so make sure that your Windows Web server isn't giving away unnecessary clues about its identity. ServerMask from Port80 Software modifies your Web server FINGERPRINT¬Ě by removing unnecessary HTTP response data, modifying cookie values, eliminating file extensions (.

  • Platform: Win2000, Windows Server, WinOther

Swift Rootkit Web Bug Zombie Hunter stops keylogger and hacker tools, and protects from unknown Trojans that stealthily add an autostart key. It eliminates the traces of your work on your computer and your Internet activity, for example cookies, the cache, the history, typed URLs, and temporary files. Locate and remove and other malware threats such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb.

  • Platform: Win2000, WinOther

Personal Firewall Pro delivers world-class security and protection to your PC. Firewall Pro scans your DSL, cable or dial-up Internet connection looking for hacker activity and other Internet threats. Firewall Pro detects threatening Internet activity and prevents unauthorized access to your PC. Firewall Pro even blocks pop-up ads and other unsolicited content!Detects and Blocks malicious Internet activity before it can reach your PCProtects your personal information from hacker attacksAlerts and Records threatening Internet trafficIdentifies attackers and type of attack by nameBlock Pop-up ads and other unsolicited content.

  • Platform: Win2000, WinOther

Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outsideas well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not.

  • Platform: Win2000, WinOther

Protect webpages and important files against hacker, defend trojan and virus InfoArmor is the ONLY software that can authorize a program to visit protected folders or files. Most file-protect software prevent unwanted user to access protected files, but InfoArmor prevents unwanted software or program to access them. This make InfoArmor very suitable for website-protecting: You may permit only webserver and ftp software to access your web pages,any other programs,event windows kernel process, can not be utilized by hackers to deface your webpages.InfoArmor is a program which protects webpages and important files against hackers.

  • Publisher: qwerks.com
  • Date: 21-10-2009
  • Size: 2037 KB
  • Platform: WinOther

Security Shield 2010 gives you the best protection available today. Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental controls, an integrated firewall, a new and improved interface and much, much more! Powered by Kaspersky Labs technology, Security Shield 2010 has defended against more than 80,000 malicious Internet attacks - more than 200 a day. The volume is unprecedented. To guard against these threats, Security Shield 2010 now offers Triple Threat Protection - unique technologies that protect against identity theft, confidential data leakage and all Internet threats.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Security Shield 2011 gives you the best protection available today. Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental controls, an integrated firewall, a new and improved interface and much, much more! Powered by Kaspersky Labs technology, Security Shield 2011 has defended against more than 80,000 malicious Internet attacks - more than 200 a day. The volume is unprecedented. To guard against these threats, Security Shield 2011 now offers Triple Threat Protection - unique technologies that protect against identity theft, confidential data leakage and all Internet threats.

  • Platform: Win2000, Windows 7, Windows Server, Windows Vista, WinOther

Ax3soft Sax2 is a professional intrusion detection and prevention system that performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network's operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network whether there is a breach of security strategy and the signs of being attacked in the network of hazard, and then intercept and stop before their invasion. Network administrators can directly monitor http requests, email messages, ftp transfers, as well as real-time activities and message details for the two popular instant messengers: MSN and QQ.

  • Publisher: Ax3soft
  • Date: 24-06-2011
  • Size: 7052 KB
  • Platform: Win2000, Windows Server, WinOther

Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections.

Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports.

  • Publisher: Ax3soft
  • Date: 25-02-2011
  • Size: 7051 KB
  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Opera Mini

Opera mini is a free to download web browser designed for the android platform, and is one of the most popular mobile browsers in  the world, more successful than even the full on desktop version of opera. Opera mini's dominance in the ...


End Of Room

End of room is a free ware platformer game with a black and white retro feel to it, like the game shift, except where shift innovated on the concept of a puzzle platformer, end of room does the exact opposite. Firstly though, the premise. In end of ...


Smart Defrag 2

From right back in the early days of Windows, there has always been a disk defragmenter included as standard, called (funnily enough) Disk Defragmenter. Its changed a lot as times have moved on and Microsoft upgraded Windows. There are many ...


KinderGarten

Kindergarten is a free ware baby care game / attempt at a day care simulation. In kindergarten, you are a woman running a day care (or as the title seems to suggest, a kindergarten) as lots of children are dropped off at the day care by their ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Windows WinBest

Windows WinBest is an application, created to speed up your computer and remove junk files from your system. Right from the second I opened Windows WinBest, I become very skeptical about whether I’d like this application. Almost instantly, I ...


FILExtinguisher

FILExtinguisher is a simplistic looking data removal tool, that will assist you in totally and completely removing sensitive data from your computer hard drive. This means that you can securely remove your online surfing history, banking details, ...


uTorrent

There are numerous ways to download files from internet and everyone has his or her choice in deciding a method depending upon file size, file type, availability and credibility of source.Sharing small files are pretty easy as compared to files with ...


Access Controller

Access Controller is an application that helps secure your computer desktop whilst your away from it. When you're away from your computer, you can enable Access Controller so that a password is required to unlock your desktop and continue ...



New Downloads

Bytescout BarCode Generator
SDK

Generate barcodes from .NET
with Bytescout BarCode
Generator SDK which provides 4
types of controls to generate,
display, ...

CoolTweak

Resize, add watermaks and
share your pictures on social
networks with a single right
click. CoolTweak integrates
into the ...

Mgosoft PCL Converter SDK

Convert PCL files to PDF, XPS,
Text and dozens of image
formats, such as TIFF, JPEG,
PNG, BMP, PCX, GIF, WMF, EMF,
TGA ...

Hidden Disk

Within few seconds you can
create additional disk for
your secret folders and files,
and within few seconds you can
hide ...

PDF2CSV

Save Hours of Time With
PDF2CSV - Converts PDF to CSV
Excel. Tired of reentering all
those figures from bank PDF
...

Bank2QFX

Bank2QFX is an useful utility
to convert QIF,OFX,QFX,QBO,OFC
files to the QFX format. Open
your bank file in format you
...

RiDoc

RiDoc - RiDoc - scanner
software with OCR. This
program reduces the electronic
document or image files size
without ...

TwinkiePaste

TwinkiePaste is the utility to
quickly typing commonly used
text, dates, greetings,
standard dates, greetings,
standard ...

FoxEncoder

FoxEncoder is an all-in-one
audio tool created for CD
ripping, audio encoding and
converting into multiple
formats.