Easy Desktop Keeper 1.8 This is an utility you can use to prevent users from changing your desktop items such as icons, files, folders and wallpaper.. You can also save you desktop layo
Trang 1corporate high-performance SMTP server The program has security and anti-spam features From Ixis Research, Ltd
Easy Desktop Keeper 1.8
This is an utility you can use to prevent users from changing your desktop items such as icons, files, folders and wallpaper You can also save you desktop layouts
to files and easily get your desktop items back to their original positions just with a click of mouse Switching between layouts is also possible From Ixis Research, Ltd
File & Folder Protector 2.5
File and Folder Protector is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/2000/XP at Windows kernel level
An easy-to-use user interface alows you to allocate access to your files and folders between users according to predefined schedules It means that each user has his own list of allowed and disallowed files and folders within certain time periods The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level This guarantees that this program will never lose your data, as may happen if you use other file- and folder- protecting software
PC Lockup 2.1
It is a computer security software, which enables you to apply password protection
to Windows and restrict others from being able to use your PC while you are away
An allowed time schedule and duration can be defined for
each user to restrict access to your PC in definite hours PC LockUp also supports monitor power save options and has some additional useful features
like built-in password protected screen saver and network user validation feature for Windows logon to increase your security This program is very easy to use
Public PC Desktop 3.3
Create and manage a secure locked up kiosk workstation for internet cafe,
information terminals, public libraries, hotel and airport terminals and so on
This program is ideal for places where a lot of people will be using the computer and the owner of the workstations does not want to have the
hassles of reinstalling the environment From Ixis Research, Ltd
Trang 2Security Administrator 10.5
Password-protected security utility for Windows Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply
password protection to Windows, disable running applications, and secure Internet Explorer From Ixis Research, Ltd
Download:
Code:
http://www.megaupload.com/?d=0II0GBY1
Enjoy!
Password Recovery Utilities AIO
Included:
1.) LostPassword Passware Kit v8.0.2514 Enterprise Edition
2.) ActMon Password Recovery XP 4.03
3.) Accent Office Password Recovery 2.5.0.48
4.) Easy Password Recovery 2.01
5.) Accent Word Password Recovery
6.) ElcomSoft Distributed Password Recovery v1.674
7.) Visual Zip Password Recovery Processor v6.2
8.) MSN and Google Talk Password Recovery v1.5
9.) PDF Password Remover v2.5.05312006
10.) KRyLack Password Recovery v2.11.03
11.) MS Access Password Recovery v1.01
12.) FTP Password Recovery Master 1.02
13.) Advanced Office Password Recovery ver.3.12
14.) Advanced RAR Password Recovery
15.) MS Outlook Express Password Recovery
16.) LostPassword Passware Kit v8.0 Portable
Download Links: ((31MB))
Code:
http://rapidshare.com/files/26891935/AD_P_R.rar
Trang 3Mirror
Code:
http://www.mediafire.com/?8wl5jjl3jkh
mirrors
http://depositfiles.com/files/790771
or
http://www.filefactory.com/file/dc468e
Security Tool AIO 2007 May (34 in 1)by Cyber Godfather
Download:
Code:
http://rapidshare.com/files/33825688/AIO_security_tool 2007 34_in_1_cyberw arez.rar.html
Pass:
www.cyberwarez.info
Security Tools 2 AIO by canalman
Quote:
This AIO i made for people who want to protect/clean their pc from all sorts of un-deleteable malware/spyware/dialers/phishing garbage etc
I tried to combined 19 useful tools that will help you do the job
There are many anti-spyware scanners (free/AIO) so i left them out
SOME PROGRAMS ARE FOR THE MORE EXPERIENCED USERS so use it only if you know what youre doing!
A-squared Anti-Dialer
No chance for the Dialer rip off! Protect your PC with a-squared Anti-Dialer from manipulated dial up connections, which can cause a phone bill of several hundred dollars quickly a-squared Anti-Dialer provides a complete defense against Dialers Scan all files on your harddisks for Dialer behavior using the Dialer scanner The integrated background guard protects the PC from new infections As soon as a
Trang 4potential Dialer creates or manipulates a dial up connection, the a-squared Anti-Dialer will alert it
AirSnare
is another tool to add to your Wireless Intrusion Detection Toolbox AirSnare will alert you to unfriendly MAC addresses on your network and will also alert you to DHCP requests taking place If AirSnare detects an unfriendly MAC address you have the option of tracking the MAC address's access to IP addresses and ports or
by launching Ethereal upon a detection
Anti-Keylogger Elite (AKE)
is a utility designed to detect keyloggers and give you the power to Prevent Or Allow the keylogger to function AKE can prevent known and unknown
keyloggers from infiltrating your computer Logging everything you type on your keyboard and see on screen
FileASSASSIN
can delete locked files on your system It uses advanced techniques to unload modules, close remote handles, and terminate processes to allow the optional removal of the file
I Hate Keyloggers
will prevent your typing from being recorded by malicious software such as key loggers, spyware, remote administration tools The software will disable hook-based keyloggers so the keyloggers will not be able to capture your keystrokes This way you can type sensitive information (passwords, email, credit card
number, etc) with confidence The log file of the key logger will be empty (your
Trang 5keystrokes are not recorded)
Keylogger Detector
is easy-to-use tool to detect most types of keylogger and kill them It is the first product of its kind in the world that based on windows HOOK technique, and does not reply on signature matching, so it can detect various types of keylogger
possibly included in any commercial, shareware, freeware products, as well as in Trojan horses, viruses of very different operation principles
PhishGuard
is a service that detects and rapidly disables Internet "phishing" or "spoofing" attacks designed to steal critical financial data PhishGuard works with all popular browsers on Microsoft Windows computers.Phishing attacks use fraudulent
websites and emails that mimic well-known organizations in order to trick
unsuspecting Internet users A simple login or account number entry screen
becomes a sophisticated trap By assuming you are dealing with a trusted party, you can reveal financial information including credit card numbers, bank accounts, passwords, and social security numbers to the "bad guys" This type of attack is very difficult for the typical person to detect, as the scammer’s emails and websites mimic the exact style and graphics of the spoofed company, and appear genuine Sensitive financial information disclosed to scammers is used to make fraudulent financial transactions and to enable long-term identity theft
Privacy Vault 2007
Lock down and hide sensitive data on you machine Privacy Vault allows you to store pins, passwords, financial information, videos and media or just about
anything else in a hidden and encrypted location Once locked down, only your password can unlock the vault!
Trang 6RootkitRevealer
is an advanced rootkit detection utility It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit RootkitRevealer successfully detects all persistent rootkits published at www.rootkit.com, including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys) If you use it
to identify the presence of a rootkit please let us know!