KGB Free Key Logger is a free keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of reco
|
Äðóãîå
Some security systems scan the files header for their so-called signature (usually called TrueType) - in addition to checking the file extension.This tool allows to change the TrueType of the file to:EXEZIPRARRemove TrueType
A user interface to create and manage keystores, private keys, secret keys, certificates.Also allows to archive, sign, verify, encrypt, decrypt files.Downloads for Linux and MacOS are available at the developerÒ‘s website.Requires Java RE 1.6+. Get
Autorun Eater was born due to increase of malwares using the ‘autorun.inf’ tactic to infect users unknowingly be it from flash drives, removable hard disks or any other removable storage device. When an infected device is infected with a malware and a
Protect your financial account from fraud email and web site: Unlike typical anti-phishing software using phishing report mechanism, Reasonable Anti-phishing proactively detect possible fake web sites to protect your bank account, credit card information
Security System Analyzer is a tool designed to check your system for the latest security updates.Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available secu
Shadow Keylogger Portable is the ultimate tool for recording and surveillance of the keyboard and screen. ItÒ‘s portability allows you to mount it onto a memory stick an run it straight from there onto any chosen computer, then remove the memory stick and
Self Signer Certificate (X.509) Generator for Windows. Requires: Microsoft .NET Framework 2.0.
BlueLock automatically locks your computer when you leave your office. BlueLock determines if you are present by testing connection with your Bluetooth enabled mobile phone.After installation you can assign your mobile or any other List of Mobiles or P
Good method for creating a password is using an acronym from a phrase and then substitute or adds additional characters. For example phrase "ItÒ‘s Good to be the King!" could be transformed to: 1G2betK!! (This would be a good password if it had not been u
KaKa ExeLock is a useful tool which allows you to password protect Windows executable programs.When protecting a program, KaKa ExeLock modifies the binary executable itself, so that it first asks for a password and runs the program only if a valid pass
EZDNSWatch will keep an eye on your DNS settings and let you know if something changes them. You can easily change them back if this happens. EZDNSWatch will even check your wired or wireless router for hacking vulnerabilities. We use the same techniqu
This DVD5 ISO image file contains the security updates for Windows released on Windows Update on June 10th, 2008. The image does not contain security updates for other Microsoft products. This DVD5 ISO image is intended for administrators that need to dow
WOT - ýòî íàäñòðîéêà äëÿ áðàóçåðà, êîòîðàÿ ìîæåò ïðåäóïðåäèòü âàñ î ïîòåíöèàëüíûõ ïðîáëåìàõ áåçîïàñíîñòè èëè êîíôèäåíöèàëüíîñòè, ñâÿçàííûõ ñ ïîñåùàåìûì âàìè ñàéòîì, à òàêæå î ñàéòàõ, êîòîðûå âîçâðàùàþòñÿ â ðåçóëüòàòàõ ïîèñêà (Google, Yahoo, AOL, MSN è äðóãèõ). Îí äîáàâëÿåò êíîïêó íà ïàíåëü èíñòðóìåíòîâ âàøåãî áðàóçåðà è ðÿäîì ñ ðåçóëüòàòàìè ïîèñêîâîé ñèñòåìû, êîòîðûå óêàçûâàþò íà óðîâåíü áåçîïàñíîñòè äëÿ ñàéòà, îñíîâàííûé íà íàäåæíîñòè è áåçîïàñíîñòè. Íàçíà÷åííûé óðîâåíü áåçîïàñíîñòè îñíîâàí íà ðåéòèíãàõ äðóãèõ ïîëüçîâàòåëåé WOT, à òàêæå áàçû äàííûõ âðåäîíîñíûõ ñàéòîâ, ïîääåðæèâàåìûõ WOT.
WOT äëÿ Firefox - ýòî íàäñòðîéêà äëÿ áðàóçåðà, êîòîðàÿ ìîæåò ïðåäóïðåäèòü âàñ î ïîòåíöèàëüíûõ ïðîáëåìàõ áåçîïàñíîñòè èëè êîíôèäåíöèàëüíîñòè, ñâÿçàííûõ ñ ïîñåùàåìûì âàìè ñàéòîì, à òàêæå î ñàéòàõ, êîòîðûå âîçâðàùàþòñÿ â ðåçóëüòàòàõ ïîèñêà (Google, Yahoo, AOL, MSN è äðóãèõ). Îí äîáàâëÿåò êíîïêó íà ïàíåëü èíñòðóìåíòîâ âàøåãî áðàóçåðà è ðÿäîì ñ ðåçóëüòàòàìè ïîèñêîâîé ñèñòåìû, êîòîðûå óêàçûâàþò íà óðîâåíü áåçîïàñíîñòè äëÿ ñàéòà, îñíîâàííûé íà íàäåæíîñòè è áåçîïàñíîñòè. Íàçíà÷åííûé óðîâåíü áåçîïàñíîñòè îñíîâàí íà ðåéòèíãàõ äðóãèõ ïîëüçîâàòåëåé WOT, à òàêæå áàçû äàííûõ âðåäîíîñíûõ ñàéòîâ, ïîääåðæèâàåìûõ WOT.
|