BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: biometric, toolkit, fingerprint, password, security, identification, authentication, access control, attendance, recognition, matching
Free Fingerprint Verification SDK 184.108.40.206
Freeware SDK and .NET components for biometrical application development for Windows platform. Allows reading fingerprints only from scanners, storing up to 10 fingerprint records in an internal database and performing fingerprint verification (1-to-1 matching) only. Includes programming samples in C++, C#, Sun Java 2, Visual Basic 6, Visual Basic .NET and Delphi 7. Supports 40+ major fingerprint scanners and sensors.
See also: fingerprint, verification, SDK, recognition, matching, biometric, biometrical, security, scan, authentication, logon, access control, attendance control
Comodo Verification Engine 2.7
A website may seem to be in all respects legitimate. But on the Web, not everything is what it seems. Some sites are phony, created to install viruses and malware on a surfer?s computer, or steal their personal information. Immediately separate the real from the fake with Comodo Verification Engine. With VE installed, the borders around your web browser will glow green, letting you know that the site is for real. It?s that simple, and it?s free.
See also: Internet fraud, anti phishing, website verification, web surfing, fraud protection, anti phishing software, Security Authentication, comodo verification engine
Event Log Explorer 1.2.4
Windows event log analysis is a very important task for any system administrator. Event Log
Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the
Security, System, Application and other logs of Microsoft Windows. It extends the standard Event
Viewer functionality and offers new features. Download it now - it's absolutely free!
See also: system, security, application, events, event, log, monitoring, monitor, alalyzer, analysis, analyze, viewing, viewer, view, event log
ShadowSurfer eliminates new spyware, viruses and worms, cookies, internet history, cyberjunk and malware before it is permanently written to your PC. You can start a ShadowMode session, install trialware, games or surf the internet and discard those changes at the end of your session, keeping your PC in a clean and optimal state at all times.
See also: spyware, spyware removal, spyware remover, anti spyware, adware, anti virus, anti virus software, online privacy, internet privacy, computer privacy, data protection, disaster recovery, security, virtual PC, games, mp3
FileBarricader 2004 220.127.116.11
FileBarricader 2004 is primarily a file encryption utility.
FileBarricader 2004 Features:
- Includes four encryption algorithms: DES, RC2, Rijndael (AES) and 3DES (TripleDES);
- Includes four encryption strength settings: 64 bit, 128 bit, 192 bit and 256 bit;
- Provides secure file deletion, making recovery of deleted files impossible;
- Provides the ability to create self decrypting .exe files that can be sent to any computer;
See also: FileBarricader, encryption, cryptography, protection, security, file protection, rijndael, tripledes, des, rc2
ABC CHAOS 2.6
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable.
See also: security, Blowfish, encrypt, compress, shredder, chaos, safety, encryption system, protect, protecting, crypto, files, folders, documents, programs, cryptographic algorithms, source, code, generator, password, random, number
Ip2CountryResolver allows you to identify the country by given IP Address. If you are doing business on the Internet and you want to know where your users are from, you've found the right place! Ip2CountryResolver will help you to find and identify visitor's geographical location country and country code by its IP address. The tool is designed with a user-friendly interface and is easy to use.
See also: find country by ip address, network tool, network software, net tools, network monitoring, network utils, network security, port scanner, intrusion detection, event log, computer security, enterprise security, information security
PasswordGlue helps you to never forget forget a password again. Using PasswordGlue you can store all of your usernames, passwords, and related private information in a portable encrypted database. All of your information is protected by a single master password.
Your passwords can also be grouped into one or more categories, allowing flexible management of your private information.
See also: password, keys, encryption, security, redhotglue, vault, save, hide, private, personal
Kiwi Secure Tunnel 1
Free Secure Tunnel Service for use with Kiwi Syslog Daemon (or compatible). It receives, compresses, and securely transports syslog messages from distributed network devices to a Kiwi Syslog Daemon.With Kiwi Secure Tunnel it is possible to securely and reliably transport your syslog data across any potentially insecure network, such as the Internet. It can monitor files and send any new information from these files as syslog messages.
See also: Internet Security, Secure Message Transport, Message Encryption, Syslog Daemon, Unix type Syslog messages, TCP Syslog messages, Network Utilities