Directory: A-Z
Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you ...
A content filter monitors the use of a computer. With the help of content filter software, you decide which websites can and cannot be accessed, or which applications can be run. Content filters are popular with parents who want to make sure that their ch ...
The number one solution for powerful PC surveillance and monitoring needs. Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations, and even screenshots. Also, SpyAgent can filter websites and applications ...
Spyware, adware, browser hijackers, and dialers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! Prevent the ...
Note:SpywareGuard is temporarily unavailable SpywareGuard provides a real-time protection solution against spyware that is a great addition to SpywareBlaster's protection method. An anti-virus program scans files before you open them and prevents ...
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration t ...
Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It shou ...
srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...
Intrusion Prevention System (IPS) for ssh (default port 22), this IPS responds to the suspicious activity by setting the linux firewall (iptables) to block network traffic from the suspected malicious source. Suspicious activity is determined via auth or ...
Securepoint has developed a professional and free of charge openVPN-Client based on SSL-VPN for Windows. The complex encryption and authentication methods can be managed in a very simple and clear manner in combination with the Securepoint SSL VPN Client ...
Unisys Stealth™ is an innovative, software-based security solution that: ?Conceals communication endpoints making them undetectable to all unauthorized parties inside and outside the enterprise Implements with no disruption to your existing IT infrast ...
The only way to reliably detect wireless protocols is to use preselected chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect Stealth 1207i which has 6 channels for different frequenc ...
The Stealth SM2020 is the most advanced portable speech protection system which protects you against listening and recording devices. The Stealth SM2020 creates sound barrier interference which masks your speech and any sound to be extremely difficult or ...
The StealthWatch sensor appliance provides fast, accurate monitoring for unexpected or unauthorized network behavior. Using flow-based architecture it provides continuous, real-time network traffic monitoring and instant identification of attack
Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes. It provides a high-performance implementation of NIC-to-disk packet writing, handles deleting those files as disk fills up, ...
Keep your credit cards safe and ready for checkout. Encrypted vault for your credit card numbers, synced to all your devices, for easy one-click payment. Protects your private notes and other text data. Keep your secrets, licenses, passport information ...
Award-winning Technology Kills all forms of Malware... STOPzilla successfully scans, removes and blocks Spyware, Adware, Pop-up ads, Phishing attacks, hijackers, rootkits, Trojans, bots, drive-by downloads, rogue programs, messenger service ads, keylogger ...
Stormshield Network Security physical firewalls The hardware firewall is a stable and efficient security solution to protect corporate networks from cyber attacks. Real-time protection (intrusion prevention and detection, application control, antivirus, ...
Total control over malicious traffic The award-winning Strata Guard® high-speed intrusion detection/prevention system (IDS/IPS) stops hackers dead in their tracks, preventing malware, spyware, port scans, viruses, and DoS and DDoS attacks from compromisi ...
IPSEC is Internet Protocol SECurity. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised r ...