By surfing the Web you are exposed to hackers, bombarded by advertisements and subjected to spyware. Everything you do and download online can be watched. Hackers, Webmasters, other users of your computer and even your boss can see your surfing habits.
|
Другое
A useful tool for parents that allows you to lock your computer keyboard, CD drive doors and power-off button. When the keyboard is used it will display images and play sounds every time a key is pressed, thereby preventing access to the desktop and ap
AntiPharming uses active and passive protections for identifying and stopping Pharming attacks. AntiPharming will actively protect your windows server from pharming attacks by denying any user (even Administrator) to write to the hosts file. AntiPharmi
Colock is one of the most powerful software-based copy protection locks available today. This lock uses “Activation Codes” during the process of software registration. By adding just one line of code to the source code of your program (writte
One of the most common uses is to make sure that a file that you have downloaded is not corrupt. Some websites post the MD5 checksum of a file on their download page. Once you have downloaded the file, use winMd5Sum to get the MD5 checksum of the file
During autumn 2005, Sony included rootkit-style content-protection software on approximately 4.7 million CDs of over 50 artists worldwide exposing consumer PCs to security holes. The XCP rootkit, developed by First4Internet, was inadvertently placed on
Dial-a-fix is a collection of known fixes gleaned from Microsoft Knowledgebase articles, Microsoft MVPs, and other important support forums, that will assist you in repairing problems with your system. Although this tool is ordinarily meant for power u
Track, view, and save any changes done to your PC. Capture before and after snapshots of both your hard drive and registry, allowing you to monitor and keep track of all files and programs that were added or removed on your system. This provides a sure
F-Secure BlackLight Rootkit Elimination Technology detects objects that are hidden from users and security tools and offers the user an option to remove them. The main purpose is to fight rootkits and all kinds of malware that use rootkits. The F-Secur
Internet Tracks Washer (formerly called Windows Tracks Washer) protects your privacy by cleaning up the tracks of your activities on your PC and the Internet. With simply one click, Internet Tracks Washer allows you to erase Window's temp folder, searc
Shadow Professional is a complete suite of tools to keep web activity, files and documents strictly private. The program allows you to press Start and surf web without any evidence. You can make your secret bookmarks hidden, shred files, use disk wiper
Most Windows users discover it with time: right after Windows is installed, or when one gets a new PC, the machine is "clean". Startup and shutdown are fast, the system directories are not crowded with files that contain God knows what, no useless prog
Did you know that each time you turn on your PC, Windows runs a list of programs automatically in the background? This causes icons to be added to your system-tray, hidden programs to execute, a slower PC, and in many cases, spyware to run.Start
Steel Run-As helps you in executing audit commands or any kind of application which runs properly when run only with administrator privileges without having to give the user full rights to his machine. For example "Some CD writing" applications run pro
Microsoft Baseline Security Analyzer (MBSA) 2.0 is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your se
|