Security Systems
Security Systems in Software title, description
Downloads: All | Freeware

 

iMyth Security Systems is a tool designed to help you deal with a large number of threats and intrusion issues that can target drives and devices connected via USB. It provides general protection in the form of system and USB shields, allows you to immunize ...
Registry - Repair - Remove - Usb - Anti-virus - lock folders - block site - restor - protection clean short-cut virus - restore hidden files
Size: 16,949k, Revised: April 13th 2014, By: iMyth Labs

System Security Suite (3S) is the program to remove internet tracks and junk files from your computer. It allows you to delete Cookies, clear Internet Explorer Cache, delete index.dat Files, clear Typed URLs, Windows Temp Folder and much more. You can also specify custom folder ...
Size: 840k, Revised: May 12th 2008, By: Igor Shpak

Strong on protection, light on system resources. Complete peace of mind for where you go and what you do online. Keeps you safe when you surf, shop and bank online. Warns you about social media suspicious content. Key Technologies: Antivirus Antispyware Two-way firewall Identity protection Network ...
Antivirus - Antispyware - Intrusion Prevention - Rootkit Detection - Web Site Authentication - Two-way Firewall - Eavesdropping Protection - Confidential Information Management
Size: 106,496k, Revised: October 25th 2008, By: Symantec Corporation

Get rid of the annoying Security alerts in Microsoft Outlook 2000, 2002/XP, 2003 and 2007! Advanced Security for Outlook allows you to determine the violator and specify the permanent action for this program (and only this program!) : allow access, block access or run the ...
Microsoft Outlook - Security Alert - Program Is Trying To Access - Outlook Object Model Security Guard - Alert Investigation - Outlook Security Patch
Size: 1,362k, Revised: December 10th 2009, By: MAPILab Ltd.

SecurityCheck Audit common Security vulnerabilities get corrective recommendations and easy remedies for Windows Systems. Check & correct unset or blank passwords, prevent unauthorized changes to important system-wide settings and programs. Secure wireless networks & prevent unauthorized access to important, private data. Reduce or eliminate shared ...
Secure - Securitycheck - System Security - Security Settings - System Check - System Vulnerabilities - System Corrections - Secure Computer
Size: 335k, Revised: May 12th 2008, By: Moon Valley Software

Using powerful 256-bit AES encryption technology, the iOpus Private Internet Gateway (iPIG) creates a secure VPN "tunnel" that protects your inbound and outbound communications (Email, Web, IM, VOIP, calls, FTP, etc.) at any Wi-Fi hotspot or wired network. iPIG shields your data from even the ...
Proxy - Ssl - Ssh - Encryption - Security - Aes - Open - Network - Wireless - Hotspot
Size: 737k, Revised: September 21st 2008, By: iMacros WebSite Testing and Web Scraping

Explorer mit Verschlüsselung Es kann wie gewohnt mit Windows-Anwendungen weitergearbeitet werden.Multimediadaten werden auch in Codierter Form abgespielt.
Explorer - Verschlüssellungstechnik - P3d
Size: 8,003k, Revised: May 12th 2008, By: Profiler3d

AFS schützt sämtliche Arten von Daten zuverlässig und sicher vor unauthorisiertem Zugriff. Dazu verwendet AFS den weltweit standardisierten, schnellen und extrem sicheren Verschlüsselungs-Algorithmus AES (256Bit). Für die Verschlüsselung der Daten wird lediglich ein Passwort benötigt. AFS ist besonders geeignet auf mobilen Datenträgen (auch ohne Installation), ...
Size: 1,758k, Revised: May 12th 2008, By: Eric Pörsel

 

Security Systems in Software text
Downloads: All | Freeware

 

When used in conjunction with your home or office PC and a suitable camera, iCatcher provides a powerful, practical and economic alternative to dedicated CCTV Security Systems. When motion is detected it automatically captures and saves the image to disk. Sensitivity controls and user-defined masks ...
Security - Motion - Detection - Surveillance - CCTV
Size: 4,076k, Revised: September 25th 2012, By: i-Code Systems

Object recognition technology demo applications for Microsoft Windows. The technology supports webcams, surveillance cameras, media files with still images and video, and is able to perform real-time video stream processing. The recognition algorithm is tolerant to object scale, rotation, pose, lightning conditions etc and is ...
Demo - Ai - Recognition - Object - Algorithm - Vision - Robotics - Robotic
Size: 10,824k, Revised: October 5th 2012, By: Neurotechnology

ClearICE Report Utility is used in conjunction with BlackICE PC Protection personal firewall created by Internet Security Systems.It allows the users of BlackICE to easily access the data in order to more accurately assess the severity of intrusion attempts and report those attempts to the ...
 , Revised: August 7th 2012, By: Brady & Associates, LLC.

The 2007 Microsoft Office Security Guide provides prescriptive Group Policy setting and Security configuration recommendations to help strengthen the Security of computers running the 2007 Microsoft Office release on computers that run Windows Vista or Windows XP in domain–based environments.The 2007_Microsoft_Office_Security_Guide.zip file includes the following ...
Size: 1,444k, Revised: May 22nd 2009, By: Microsoft Corporation.

This DVD5 ISO image file contains the Security updates for Windows released on Windows Update on April 14th, 2009.This DVD5 ISO image file contains the Security updates for Windows released on Windows Update on April 14th, 2009. The image does not contain Security updates for ...
Size: 1,294,664k, Revised: May 22nd 2009, By: Microsoft Corporation.

This DVD5 ISO image file contains the Security updates for Windows. The image does not contain Security updates for other Microsoft products. This DVD5 ISO image is intended for administrators that need to download multiple individual language versions of each Security update and that do ...
Size: 427,284k, Revised: November 11th 2009, By: Microsoft Corporation.

Monitor the Security Compliance of Your IT Environment for Computers Running WindowsThe Security Compliance Management Toolkit Series builds on previous Solution Accelerators to provide you with expanded best practices and additional automation tools to help configure and deploy Security settings for the following operating Systems ...
Size: 17,039k, Revised: November 4th 2009, By: Microsoft Coporation (201 other programs)

This DVD5 ISO image file contains the Security updates for Windows released on Windows Update on December 9th, 2008. December 2008 Security and Critical Releases ISO Image does not contain Security updates for any other Microsoft products.This DVD5 ISO image file contains the Security updates ...
Size: 1,957,089k, Revised: February 11th 2009, By: Microsoft (127 other programs)

This DVD5 ISO image file contains the Security updates for Windows released on Windows Update on July 14th, 2009. The image does not contain Security updates for other Microsoft products. This DVD5 ISO image is intended for administrators that need to download multiple individual language ...
Size: 224,195k, Revised: July 14th 2009, By: Microsoft Corporation.

This Solution Accelerator provides instructions and recommendations to help strengthen the Security of computers running the Hyper-V role on Windows Server® 2008. It covers three core topics: hardening Hyper-V, delegating virtual machine management, and protecting virtual machines.This Solution Accelerator consists of a Security guide and ...
Size: 1,034k, Revised: May 22nd 2009, By: Microsoft Corporation. (379 other programs)

What is HSSVSS? HSSVSS is a high quality motion detecting surveillance system and its free! HSSVSS turns your web cam or cameras into a video and motion detecting surveillance system. It is the very first original surveillance software, which others have, copied and are now ...
Size: 870k, Revised: June 12th 2009, By: www.hssvss.com

Install this update to fix an issue where in the presence of Internet Protocol Security (IPsec) or Windows Firewall, a race condition can be hit on multi-processor (or hyper-threaded) Systems causing memory corruption, leading to a system crash.Install this update to fix an issue where ...
Size: 1,362k, Revised: May 22nd 2009, By: Microsoft Corporation.

The All-new N-central 8 remote system management and monitoring solution provides Managed Service Providers and IT professionals in mid-size businesses a full-featured tool to deliver the most complete service remotely to their end-users, for the least expense - and report on those services with unprecedented ...
Network Monitoring - Remote Control - Remote Support - Remote Desktop - Patch Management - Endpoint Security - Remote Management - systems management - freemium - SMB
Size: 20k, Revised: June 8th 2012, By: N-able Technologies

Network Security Task Manager securely protects Windows networks from sophisticated malware not detected by traditional Security solutions. Today malware is diverse and numerous. Thousands of potential spyware, trackware, Trojans, keyloggers and spybots endanger the safety of your private and business information. The constant development of ...
Remote Process Viewer - Network Task Manager - network process viewer - remote taskman - client administrator - malware network - client security task manager
Size: 3,144k, Revised: June 25th 2012, By: A. & M. Neuber Software

Benefit the latest technologies in the BETA of 2012 Total Security from BitDefender:AUTOPILOT provides a hassle-free experience by making optimal Security-related decisions without input from you. This means no pop-ups, no alerts, nothing to configure.The SCAN DISPATCHER finds and uses time-slices when system resource usage ...
Security - Scanner - Virus - Antivirus - Spyware - Antispyware
Size: 2,355k, Revised: October 3rd 2012, By: Bitdefender LLC