|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
BioCert Authenticator Lite Edition 10 Users 1.2
BioCert Authenticator Lite Edition 10 Users Our standard software programming toolkit offers 1:m matching capability up to 10 users. This toolkit is primarily focused upon students and learning programmers that wish to explore the feasibility of inclusion of Biometric Authentication within their projects. The Lite is a full-featured toolkit with all of the functionality of the Pro edition, with a limitation of 10 fingerprints
See also: biometric, toolkit, fingerprint, password, security, identification, authentication, access control, attendance, recognition, matching
Free Fingerprint Verification SDK 22.214.171.124
Freeware SDK and .NET components for biometrical application development for Windows platform. Allows reading fingerprints only from scanners, storing up to 10 fingerprint records in an internal database and performing fingerprint verification (1-to-1 matching) only. Includes programming samples in C++, C#, Sun Java 2, Visual Basic 6, Visual Basic .NET and Delphi 7. Supports 40+ major fingerprint scanners and sensors.
See also: fingerprint, verification, SDK, recognition, matching, biometric, biometrical, security, scan, authentication, logon, access control, attendance control
Comodo Verification Engine 2.7
A website may seem to be in all respects legitimate. But on the Web, not everything is what it seems. Some sites are phony, created to install viruses and malware on a surfer?s computer, or steal their personal information. Immediately separate the real from the fake with Comodo Verification Engine. With VE installed, the borders around your web browser will glow green, letting you know that the site is for real. It?s that simple, and it?s free.
See also: Internet fraud, anti phishing, website verification, web surfing, fraud protection, anti phishing software, Security Authentication, comodo verification engine
Event Log Explorer 1.2.4
Windows event log analysis is a very important task for any system administrator. Event Log
Explorer is an effective tool for viewing, monitoring and analyzing events recorded in the
Security, System, Application and other logs of Microsoft Windows. It extends the standard Event
Viewer functionality and offers new features. Download it now - it's absolutely free!
See also: system, security, application, events, event, log, monitoring, monitor, alalyzer, analysis, analyze, viewing, viewer, view, event log
Print Logger Pro 3.0.3
Print Logger - program for the accounting of use of the printer for a
Windows NT platform. Represents native Windows NT service with the
remote management program. Program connecting to the event log of remote
or local print server and chooses from it the print-related messages.
The chosen messages writes to a log files, dividing them by days, by
months, by years. Advanced graphical reports can be viewed from embedded HTTP server.
See also: print quota, quota management, cost recovery system, print cost recovery, printer accounting server, printer management software, print software tracking, print control, printer monitor, quota manager, printer management, print tracking, printing security, print manager, printing control, cost recovery, printing management, audit print, network printing, total cost of ownership, print management
FileBarricader 2004 126.96.36.199
FileBarricader 2004 is primarily a file encryption utility.
FileBarricader 2004 Features:
- Includes four encryption algorithms: DES, RC2, Rijndael (AES) and 3DES (TripleDES);
- Includes four encryption strength settings: 64 bit, 128 bit, 192 bit and 256 bit;
- Provides secure file deletion, making recovery of deleted files impossible;
- Provides the ability to create self decrypting .exe files that can be sent to any computer;
See also: FileBarricader, encryption, cryptography, protection, security, file protection, rijndael, tripledes, des, rc2
Deskman Personal Edition 5.51
Deskman allows you to protect desktops easily. Restrict access to system settings and keep your desktop tightly secured from a simple interface. Home users need a simple way of protecting their computers on coffee breaks, or restraining access to their desktop on shared computer environments. Securing your Desktop has never been so easy. Free for personal use.
See also: easy security, desktop security, desktop restrictions, access control, security software, user control, desktop manager, security manager, system protection, access point
pcSuper Scanner 1.1
Use our proprietary pcSuper Scanner to check for opened ports on your computer. It will automatically scan ALL ports – no exceptions.
See also: LeakTest, firewall, firewalls, security, scanner
IeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer and reads all information from the history file on your computer, displays the list of all URLs that you have visited. It also allows you to clear history, delete cookies and temporary internet files. The tool is designed with a user-friendly interface and is easy to use.
See also: network tool, explorer, network software, net tools, network monitoring, port scan, network utils, network security, port scanner, intrusion detection, event log, computer security, enterprise security, information security, internet scanner
2X SecureRDP for Terminal Services 4.0
2X SecureRDP dramatically increases the security of your terminal servers by accepting/denying incoming RDP connections by IP, Mac address, computer name & more. Logon screen is only displayed if the connection is established from particular IPs or machines. Computers that do not meet the filter restrictions don't see the logon screen & won't get to try a brute force logon! Its an ideal FREEWARE tool for secure remote administration
See also: Windows Terminal services, Microsoft Terminal Services, Terminal server, RDP, security