




















































Hacker
![]() |
BitDefender Professional offers maximum protection, combining powerful antivirus engines and advanced Internet filtering technologies. BitDefender Professional ensures antivirus protection as well as data confidentiality, active content control and Internet filtering. Adding to these the Instant Messaging protection (unique feature in the whole information security market), you have the ideal solution for your computer. Running silently in the... |
![]() |
WhereIsIP is an interesting and powerful Internet tool to help you know the geographic location of an internet user who you are interested with . You can use it to find where a member of chatroom or email sender even ICQ friend TRULY come from , or where the website you visited is .
OS: Windows Software Terms: Chat, Dns, Domain Name, Email, Geographic, Hack, Hacker, Icq, Ip, Jufsoft |
![]() |
Personal Passworder keeps more than just passwords! This award-winning password manager will keep your passwords, serial numbers, credit card numbers, phone entries and other information safely and securely. You can even create customized groups for your data! All data is encrypted with hacker-proof, reliable algorithm. You will never forget your passwords again, because Personal Passworder will remember them for you!
OS: Windows Software Terms: Blowfish, Encrypt, Encryption, Keep, Keeper, Pass, Password, Passworder, Store |
![]() |
Shadow Security Scanner is a security scanning tools to audit your network security. It is intended for use by network, domain and systems administrators, network security professionals, Internet users and everyone who wants to know more about network and Internet.
OS: Windows Software Terms: Attack, Hacker, Ids, Network, Safety, Scanner, Security, Shadow |
![]() |
Keep those prying eyes out of your communications and prevent unwanted people from reading your private files. Invisible Secrets encrypts and hides data in places where not even your wife, boss, or a hacker would look for sensitive information. Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web...
OS: Windows Software Terms: Decrypt, Email Encryption, Encrypt, Encryption Software, File Encryption, Folder Encryption, Hide, Invisible Secrets, Message, Prot |
![]() |
WebAgain is the award-winning anti-defacement utility that automatically fixes vandalized websites without taking the site offline. It monitors the content of your website 24/7 and when WebAgain detects that unauthorized material has been posted, it restores the original content and saves a copy of the hacked pages in a quarantine area for offline inspection. WebAgain sends email notifications to keep you informed of the status of your website.
OS: Windows Software Terms: Assurance, Backup, Content, Data, Deface, Disaster Recovery, Hacker, Information, Integrity, Intrusion |
![]() |
Fantastic tool to speed up or down computer and windows operating system -256~+256 times, your Games and other Software will give you a new taste of surprise. Change software speed (such as games or movies) and change your feeling; Run fast or slow in your game and easy win! Run slow in your film to view and admire! You can define the hotkey, Press the hotkey to show or hide the window, speed up, speed down, or adjust to the appointed speed.
OS: Windows Software Terms: Computer Speed Up, Game Cheat, Hack, Hacker, Internet, Speed Up Game, Speed Up Windows, Win98, Window, Windows |
![]() |
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet Explorer and a lot more. Click the details button to learn more. An excellent program if you don't want others to be messing up with your system.
OS: Windows Software Terms: Anti Hacker, Protect From Hackers, Secure Desktop, Secure Pc, Security Tools, Window Security Toolkit, Windows Security Toolkit |
![]() |
Active Whois returns important information on websites. Locate individuals or organizations with postal address including country for the domain or IP address holder, all with a single click! The netstat, trace route and nslookup included too. Active Whois is an easy-to-use network tool for the retrieving of all information such as country, email and postal addresses for the owners of IP addresses and Internet domains. Unlike other WHOIS clients, Active Whois does not require special...
OS: Windows Software Terms: Active, Activewhois, Address, Domain, Find, Idn, Ip, Search, Whois |
![]() |
NetManager Personal Firewall is simple, but very powerful firewall. The firewall continuously checks all your Internet traffic. If there is a suspicion that information sent to Internet or received from it may be dangerous for your computer or your confidentiality that transmission will blocked and you will get a notification about potentially dangerous traffic. You can decide whether to transmit this information or not. NetManager guards the...
OS: Windows Software Terms: Anti Virus, Anti-virus, Content, Enterprise, Firewall, Firewalls, Free Software, Hacker Protection, Home Security, Internet Applications |
![]() |
An easy-to-use and affordable PC firewall with features including monitoring and customizing 12 ports, "Keep Alive" (to help maintain your connection), a klaxon alarm, the ability to start with windows and stay hidden, automatically record and save attack history, and more.
OS: Windows Software Terms: Back-door, Defence, Defense, Firewall, Hack, Hacker, Pc Firewall, Privacy, Security, Trojan |
![]() |
With BestCrypt you allocate a portion (container) of free space on your drive where you keep all your sensitive data in encrypted form, creating a virtual drive in your system that you work with as you would any other drive. BestCrypt uses strong encryption algorithms, including Blowfish, GOST, and DES. Features include a time-out option, hot keys, a wiping utility, and the ability to add your own encryption algorithm.
OS: Windows Software Terms: Bcwipe, Bestcrypt, Encryption, Hacker, Protection, Security |
![]() |
BCWipe ensures that another person will not restore files you have deleted from a disk. BCWipe uses military-grade procedures to shred deleted file contents. BCWipe wipes individual files and folders, wipes free disk space, wipes the swap file to remove any possible remaining sensitive data, and wipes directory entries. BCWipe includes Task Manager to set up predefined times when files are wiped out automatically.
OS: Windows Software Terms: Bcwipe, Delete, Erase, File, Hacker, Security, Wipe |
![]() |
Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer.
OS: Windows Software Terms: Access, Attack, Bcwipe, Bestcrypt, Control, Firewall, Freeware, Hacker, Monitoring, Security |
![]() |
BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation / uninstallation and update of BestCrypt on remote client computers.
OS: Windows Software Terms: Bcwipe, Bestcrypt, Data, Encrypt, Encryption, Hacker, Hard Drive, Protection, Secret, Security |