|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: biometric, toolkit, fingerprint, password, security, identification, authentication, access control, attendance, recognition, matching
Free Fingerprint Verification SDK 18.104.22.168
Freeware SDK and .NET components for biometrical application development for Windows platform. Allows reading fingerprints only from scanners, storing up to 10 fingerprint records in an internal database and performing fingerprint verification (1-to-1 matching) only. Includes programming samples in C++, C#, Sun Java 2, Visual Basic 6, Visual Basic .NET and Delphi 7. Supports 40+ major fingerprint scanners and sensors.
See also: free, fingerprint, verification, SDK, recognition, matching, biometric, biometrical, PC, Windows, security, scan, authentication, logon, access control, attendance control
Comodo Verification Engine 2.7
A website may seem to be in all respects legitimate. But on the Web, not everything is what it seems. Some sites are phony, created to install viruses and malware on a surfer?s computer, or steal their personal information. Immediately separate the real from the fake with Comodo Verification Engine. With VE installed, the borders around your web browser will glow green, letting you know that the site is for real. It?s that simple, and it?s free.
See also: Internet fraud, anti phishing, website verification, web surfing, fraud protection, anti phishing software, Security Authentication, comodo verification engine
Smart Credit Card Number Validation 1.0
Smart Credit Card Number Validation: A simple free software use to determine if a credit card number could be valid before submitting it for real-time online authentication. Based on ANSI X4.13, the LUHN formula, aka the Mod 10 algorithm is used to validate accurate credit card numbers. Heavily commented.
See also: Credit Card Number Validation, card validation, card authentication
Softtanks Security Software 1.2
Our Security software will work only on Windows 95/98/ME/2000 Operating System. Our Security System will help keep your computers safe from general public as well as your friends and collegues.
You just need to remember the passwords which you can change any time.
It will Protect your Computer from
· Unauthorized use by anyone.
· You can Start the security system whenever you leave your computer.
See also: security, softtanks, protect, unauthorized, system, computer, software, pc, password, operating system, viruses, windows, utility, passwords, secure, systems, computers, demo, free
ClamAV For Windows 0.87.1-2
An open source command line anti-virus scanner for Windows that is fast and powerful and can easily be integrated with server applications for use in a mail server or proxy server. It can also be used to scan individual files or folders when necessary.
Includes a high speed scanning daemon, completely free and unlimited definition updates, and full documentation.
See also: antivirus, anti-virus, virus, clamav, windows, security, trojan, e-mail
CHAOS Shredder 2.4
By overwriting the portion on the hard drive that was previously allocated to the files several times with junk data, CHAOS Shredder will completely erase files from your disk, without the possibility to recover it by any practical software or hardware methods.
See also: security, stream cipher, encrypt, compress, shredder, chaos, tools, safety, encryption system, protect, protecting, crypto, files, folders, documents, programs, cryptographic algorithms, source, code, software, generator, password, random, number, p
Finger is the tool for discovering user information by using well known finger service.Using Finger tool makes possible to get Abuse Address of remote host.For example to get the abuse address of prontomail.com you should type email@example.com in the finger input section.
See also: finger service, network tool, network software, net tools, network monitoring, hacking, port scan, network utils, network security, computer security, enterprise security, information security, internet security, network attack, security software, freeware
Ecora Auditor Lite for Windows 4.0.6157.17003
A Windows® application that collects configuration settings and documents them in HTML and Word file formats. Configuration settings collected from Windows, AD, Exchange, IIS, Citrix, Cisco routers, Oracle, Netware, Domino. Great for documentation. Eliminates the time-consuming and error prone manual process of data collection and ensures accurate, standardized reports for IT audits, security, disaster recovery, troubleshooting, and more.
See also: consolidations, mergers, troubleshooting, disaster recovery, IT security, IT compliance, configuration reporting, configuration documentation, IT documentation, Microsoft Windows
Free Keylogger King 1.3
Imagine you are writing an e-mail message. Then you click a wrong button or your e-mail client hangs and you have to write the same text from scratch. Sounds familiar? With Free Keylogger King, you will never lose any of your text, whether it was typed in an e-mail client, a text editor, an on-line form or anywhere else. This free program logs everything you type. Get your passwords, registration keys and other info safely logged!
See also: spy software, keylogger, key logger, Hardware KeyLogger, hardware keystroke recorder, keystroke recorder, password recorder, keystroke logger, password grabber, passwords, password, keytrap, invisible keylogger, invisible keylogger 97, keyboard logger, keylogger stealth, keyboard monitor, keyboard monitoring, keycopy, keystroke recorder, keystroke recorder, keystroke logging, keystroke capture, key capture, keylog, keylogwn, keystroke recording, key monitor, keystroke monitoring, keyboard monitoring, keyboard capture, keyspy, spy on user, recorder, key monitor, monitoring, recording, keystroke, key stroke, activity monitor, access, accountability, attack, access control background check, audio, background investigation, business intelligence, Big Brother, bigbrother, bug, bugging, capture, catch, control, cheating spouse, child monitoring, competitive intelligence, competitor intelligence, computer monitoring, corporate information security policies, computer, desktop, data interception, desktop monitoring, economic espionage, email, e-mail, e-mail monitoring, employee monitoring, eavesdropper, eavesdropping, eavsdrop, equipment, espionage, freeware, foreign intelligence, home security, hack, hacker, hacking, hardware keylogger, hardware keystroke recorder, hook, hooking, husband, industrial espionage, intelligence gathering, internet monitoring, inspection, investigator, inspection, intelligence, intercept, intercept, interception, interceptor, intrusion, investigate, investigation, investigative, investigator, internet, gathering, grabber, government agency, key, keyboard, keycopy, keylog, keylogger, keylogwn, keyspy, keystroke, keytrap, keytrapper, law enforcement, Little Sister, littlesister, logger, logging, logon, military agency, monitor, monitoring, nonviral malware, nonvirus malicious programs, password, patrol, parental control, personnel security program, police, private investigator, product, program, p.i., PC, pwd, recorder, recording, surf, software, spy kids, screen capture, snapshot, snooper, snooping, snoopware, spies, spy, spy gadget, spy gear, spy on user, spysoft, spytool, spyware, surveillance, tracking, traffic, trap, trapper, trapware, Trojan, trojan, tool, utilities, video, virus, web, wife, workplace surveillance etc.