Skip to main content

Directory: A-Z 

Results 1041 - 1060 of 1235
Safer Networking Ltd.
Commercial

Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you ...

Spybot - Search & Destroy
ExploreAnywhere Software
Commercial

A content filter monitors the use of a computer. With the help of content filter software, you decide which websites can and cannot be accessed, or which applications can be run. Content filters are popular with parents who want to make sure that their ch ...

Category Uncategorised
SpyBuddy
Spytech Software and Design
Commercial

The number one solution for powerful PC surveillance and monitoring needs. Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations, and even screenshots. Also, SpyAgent can filter websites and applications ...

Category Uncategorised
Spytech SpyAgent
BrightFort LLC.
Freeware

Spyware, adware, browser hijackers, and dialers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! Prevent the ...

SpyWareBlaster
BrightFort LLC.

Note:SpywareGuard is temporarily unavailable   SpywareGuard provides a real-time protection solution against spyware that is a great addition to SpywareBlaster's protection method. An anti-virus program scans files before you open them and prevents ...

Bernardo Damele A. G.
Open Source

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration t ...

Category Website Scanners
sqlmap
Icesurfer
Freeware

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It shou ...

Category Website Scanners
SQLNinja

srm

elleron
GPL

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

Marshyski
Open Source

Intrusion Prevention System (IPS) for ssh (default port 22), this IPS responds to the suspicious activity by setting the linux firewall (iptables) to block network traffic from the suspected malicious source. Suspicious activity is determined via auth or ...

Category Host IPS
Securepoint GmbH
Commercial

Securepoint has developed a professional and free of charge openVPN-Client based on SSL-VPN for Windows. The complex encryption and authentication methods can be managed in a very simple and clear manner in combination with the Securepoint SSL VPN Client ...

Category VPN Clients
SSL VPN Client
Unisys
Commercial

Unisys Stealth™ is an innovative, software-based security solution that: ?Conceals communication endpoints making them undetectable to all unauthorized parties inside and outside the enterprise Implements with no disruption to your existing IT infrast ...

Stealth
Global TSCM Group, Inc.
Commercial

The only way to reliably detect wireless protocols is to use preselected chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect Stealth 1207i which has 6 channels for different frequenc ...

Global TSCM Group, Inc.
Commercial

The Stealth SM2020 is the most advanced portable speech protection system which protects you against listening and recording devices. The Stealth SM2020 creates sound barrier interference which masks your speech and any sound to be extremely difficult or ...

Lancope
Commercial

The StealthWatch sensor appliance provides fast, accurate monitoring for unexpected or unauthorized network behavior. Using flow-based architecture it provides continuous, real-time network traffic monitoring and instant identification of attack

Google
Open Source

Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes. It provides a high-performance implementation of NIC-to-disk packet writing, handles deleting those files as disk fills up, ...

Sticky Password
Commercial

Keep your credit cards safe and ready for checkout. Encrypted vault for your credit card numbers, synced to all your devices, for easy one-click payment. Protects your private notes and other text data. Keep your secrets, licenses, passport information ...

Sticky Password
STOPzilla!
Commercial

Award-winning Technology Kills all forms of Malware... STOPzilla successfully scans, removes and blocks Spyware, Adware, Pop-up ads, Phishing attacks, hijackers, rootkits, Trojans, bots, drive-by downloads, rogue programs, messenger service ads, keylogger ...

STOPzilla Antivirus
Stormshield
Commercial

Stormshield Network Security physical firewalls The hardware firewall is a stable and efficient security solution to protect corporate networks from cyber attacks. Real-time protection (intrusion prevention and detection, application control, antivirus, ...

Stormshield Network Security Firewall
StillSecure
Commercial

Total control over malicious traffic The award-winning Strata Guard® high-speed intrusion detection/prevention system (IDS/IPS) stops hackers dead in their tracks, preventing malware, spyware, port scans, viruses, and DoS and DDoS attacks from compromisi ...

Category IPS Network
strongSwan project
Open Source

IPSEC is Internet Protocol SECurity. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised r ...

Category VPN Servers