Street Hacker | License: Demo | | ||
Console based games like Street Hacker introduce a new form of heart pumping adrenaline which cannot be reproduced outside of this gaming genre. Use brute force generators, port scanners, IP scanners, exploit scripts, Viruses, Worms, & Trojans, to help you hack the streets in 8 of Americans biggest cities. Become a part of this extremely dynamic world & choose your own allies in the hacker's war for the world.... Publisher: Stephen Henke| Date: 04-02-2004 | Size: 6073 KB | ||
- |
Hacker 2005: The Broken Link | License: Shareware | | ||
Delve deep into the underground world of a computer hacker Working for a black agency, your mission is to steal money, files, and other valuable material from internet servers across the world. A few years ago, Adam Mindlin had a vision. He saw a company based purely on profit... But it was more than that, much more. His idea was to create a global network of agents. These agents would stop at nothing to gain maximum profit in the minimum possible time. Adam was quick to discover the Internet was more than vulnerable. He had found his path to success. Morality was of little concern to him, as for the past 8 years, Adam and his rapidly growing team of agents have been operating from the shadows. Publisher: Blind Virus| Date: 0-61-2004 | Size: 2450 KB | ||
- |
Hacker 2004 Digital Evil | License: Shareware | | ||
Delve deep into the underground world of a computer hacker Working for a black agency, your mission is to steal money, files, and other valuable material from internet servers across the world. A few years ago, Adam Mindlin had a vision. He saw a company based purely on profit... But it was more than that, much more. His idea was to create a global network of agents. These agents would stop at nothing to gain maximum profit in the minimum possible time. Adam was quick to discover the Internet was more than vulnerable. He had found his path to success. Morality was of little concern to him, as for the past 8 years, Adam and his rapidly growing team of agents have been operating from the shadows. Publisher: Shadow Zero| Date: 20-10-2003 | Size: 2450 KB | ||
- |
UnHackMe | License: Shareware | | ||
The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files. UnHackMe allows you to detect and remove Rootkits.. Publisher: Greatis Software| Date: 11-05-2006 | Size: 1040 KB | ||
- |
PC Digital Safe | License: Shareware | | ||
PC Digital Safe with Virtual Anti-Hacker Keyboard is designed to protect you by preventing Identity Thieves and Hackers from recording your keystrokes. Also by securely storing all your passwords, valuable information and by automatically filling in Web Forms for you. (Saving you time online). PC Digital Safe Highlighted Features: Securely store all your Data, Remember all your Passwords, Full Network Support Organize all your valable information and save you time, Defeats Keyloggers Supports 32 Bit & 64 Bit Platforms Prevent theft of your data, Creates accounts for other users, Store data for each family member in a seperate password protected safe, Strong Encryption - 256 Bit - Rijndael Algorithms approved by the U. Publisher: MicroSmarts LLC| Date: 11-03-2006 | Size: 5688 KB | ||
- |
Xeon Personal Firewall | License: Shareware | | ||
Xeon Personal Firewall is one of the most powerful firewalls available on the internet. You are able to control which applications can access the internet, and what security setting you would like on your computer. You can also choose to block all traffic when you are away from the computer, and you are able to view logs of security alerts and all incoming and outgoing traffic. Xeon Personal Firewall scans all your ports to detect possible hacker attempts on your system, and will identify the hacker and his/her location.. Publisher: eConcept Software| Date: 11-05-2004 | Size: 784 KB | ||
- |
Advanced Anti Keylogger | License: Shareware | | ||
Advanced Anti Keylogger is powerful but easy to use anti-spy software to prohibit operation of any keyloggers currently in use or presently being developed anywhere. Once installed our anti-spy software will protect your privacy immediately and constantly. One particularly scary and dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy software. Especially developed unique protection algorithm of our anti-hacker program will block operation of such keystroke monitoring feature for all spy software, both known and unknown. Publisher: Spydex Inc| Date: 18-08-2004 | Size: 718 KB | ||
- |
FreeSysInfo | License: Freeware | | ||
FreeSysInfo allows you to discover system and network information on your local machine or network computer. The tool used WMI ( Windows Management Instrumentation ) to discover full NDIS information, wireless network status and type, network adapters, system processes and services, serial communications and display information, hardware and connections status, user and system accounts, proxy settings, shared resource information and more. The tool is designed with a user-friendly interface and is easy to use. . Publisher: Nsasoft LLC.| Date: 26-12-2005 | Size: 442 KB | ||
- |
eTrust PestPatrol Anti-Spyware | License: Shareware | | ||
eTrust PestPatrol Anti-Spyware is a powerful security and personal privacy tool that detects and eliminates destructive pests like trojans, spyware, adware and hacker tools. With eTrust PestPatrol Anti-Spyware, you can sweep your PC of malicious software designed to invisibly track the sites you surf, the products you buy, and the messages you send. Protect yourself from dangerous spyware that can steal your identity, slow your PC, cause annoying pop-ups. eTrust PestPatrol Anti-Spyware complements your anti-virus and firewall software, extending your protection against non-viral malicious software that can evade your existing security software and invade your personal privacy. Publisher: Downloadatoz.com| Date: 25-05-2005 | Size: 5550 KB | ||
- |
StarForce SafenSec | License: Shareware | | ||
SafenSec is a software for protection user’s data from threats and vulnerabilities. SafenSec is new generation of protection systems: - against spyware, Trojans etc., - against hacker attacks, breaking in, information theft, - against user unqualified actions. Safe’n’Sec Personal advantages Innovation technologies of proactive protection Safe’n’Sec proactive protection system is based on the technology of intercepting and intellectual analysis of the system calls at the operating system level. All running applications constant analysis Malicious code real-time blocking Total protection against any intrusion into your PC Compatible with leading antivirus software and firewalls Known malware searching and deleting (in extensive set) Efficiency doesn’t depend on updates Efficiently uses system resources (only 5MB RAM) Easy and comfortable interface. Publisher: StarForce Technologies| Date: 20-02-2006 | Size: 4601 KB | ||
- |
Registration Creator ActiveX v4.0 | License: Shareware | | ||
Registration Creator is our latest software licensing control. With few lines of code, you can protect your software with cutting-edge technology from hackers, crackers and the occasional friend-to-friend software sharing. Registration Creator gives your software the ability to protect itself from hacker tools and detects trial bypasses, such as setting the date back. Along with the hacker protection, Registration Creator has a robust serial number generation system that stores valuable information inside the actual serial number. This allows for detection of license types, dates of purchase and much more. Publisher: D & L Comuting, Inc.| Date: 30-12-2004 | Size: 10935 KB | ||
- |
SafeShopper | License: Shareware | | ||
Is your credit card really safe after you have placed an order online, or is your information only a password guess away from a hacker? You may be surprised how many online stores leave critical backdoors open on their computers. These are the same computers which store your credit card information just after placing an order online! SafeShopper allows you to verify an online store's security before you place an order online by clicking the SafeShopper button in your Internet Explorer toolbar. SafeShopper provides you with an instant report as to if the online store is safe to shop at. SafeShopper also provides you with the location, owner, and contact information of the web site. Publisher: ksoft| Date: 02-02-2004 | Size: 575 KB | ||
- |
a-squared Anti-Malware | License: Shareware | | ||
a-squared protects your PC from Malware-based hacker attacks. Its special capabilities in dealing with Trojans, Worms, Dialers, Adware and Spyware make it an indispensable enhancement to any protection system, whether on a private PC or a company network. The unique Malware-IDS technology in the background provides the first line of defense against individual attacks by specialized Trojans that cannot be recognized by conventional signature-based anti-virus software. These types of Trojans are a favorite attacker tool for spying on Online Banking access data and company secrets. Stop them now with a-squared! The included disk scanner is designed to clean infected computers. Publisher: Emsi Software GmbH| Date: 10-01-2008 | Size: 26804 KB | ||
- |
Protoport Personal Firewall | License: Shareware | | ||
When you're connected to the Internet, you're sending and receiving information in small units called packets. A packet contains the addresses of the sender and the recipient along with a portion of data, a request, a command, or almost anything having to do with your connection to the Internet. But just as with postal mail, not every package that arrives at your computer is one you want to open. Protoport Personal Firewall examines each data packet sent to or from your computer to see if it meets a set of criteria. The firewall then passes or blocks the packet selectively. After you download and install the ProtoPort Personal Firewall software, your computer will be protected against hacker attacks. Publisher: SoftCab Inc| Date: 06-11-2005 | Size: 177 KB | ||
- |
Safe n Sec Plus Anti-Spyware | License: Shareware | | ||
Safe n Sec Plus Anti-Spyware is a complex solution including Safe n Sec reliable proactive protection of PCs against unknown viruses, Trojans, other malwares, and Anti-Spyware Module intended for scanning and removing spyware. Safe n Sec Plus AS - new generation of security systems, Against new viruses, Trojans and other malware Against spyware programs Against hacker attacks, PC breaking and information theft Against user unqualified actions Safe n Sec uses the innovation technologies of proactive protection based on permanent analysis of applications behavior. The integrated scanner Anti-Spyware Module detects spy programs that trace the user actions on the PC and send the gathered info to the Internet unknown to the user. Publisher: S.N.Safe&Software EN| Date: 26-03-2007 | Size: 15416 KB | ||
- |
pcAudit | License: Freeware | | ||
You have seen many times “Secured web site†or “Your transaction on this page is secured†on your bank’s web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer. Run pcAudit while on a secured web page and see for yourself that whatever you type while on a secured web page - CAN be seen by a hacker, unless your computer is protected.. Publisher: Internet Security Allaince, Inc| Date: 29-09-2004 | Size: 97 KB | ||
- |
WhereIsIP | License: Shareware | | ||
WhereIsIP is an interesting and powerful Internet tool to help you know the geographic location of an internet user who you are interested with . You can use it to find where a member of chatroom or email sender even ICQ friend TRULY come from , or where the website you visited is .. Publisher: JufSoft| Date: 30-06-2002 | Size: 648 KB | ||
- |
BarracudaDrive Pro | License: Shareware | | ||
All in One Secure Advanced Remote Access. BarracudaDrive is the worlds most advanced remote access tool. BarracudaDrive is not one product, but many integrated into one. BarracudaDrive includes a long list of features; here are some of the highlights: GetMyLAN is an advanced SSL VPN product and provides secure and easy remote access to your company LAN. GetMyLAN is very simple to use with nothing to configure on the remote PC. Just log on and you will access your corporate network with up to 256-bits encryption without any of the hassles of traditional VPN configurations. GoToMyWebServer lets you remote control your office or home PC from anywhere. Publisher: Real Time Logic| Date: 09-08-2007 | Size: 2044 KB | ||
- |
Invisible Secrets | License: Shareware | | ||
Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets 4 features: strong encryption algorithms; a password management solution that stores all your passwords securely and helps you create secure passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends or business partners; a tool that allows you to transfer a password securely over the internet and a cryptboard to help you use the program from Windows Explorer. Publisher: NeoByte Solutions| Date: 29-03-2004 | Size: 2500 KB | ||
- |
StarForce SafenSec Plus Anti-Spyware | License: Shareware | | ||
Safe'n'Sec Plus Anti-Spyware is a complex solution including Safe'n'Sec reliable proactive protection of PCs against unknown viruses, Trojans, other malwares, and StarForce Anti-Spyware Module intended for scanning and removing spyware. Safe'n'Sec Plus AS - new generation of security systems, Against new viruses, Trojans and other malware Against spyware programs Against hacker attacks, PC breaking and information theft Against user unqualified actions StarForce Safe'n'Sec uses the innovation technologies of proactive protection based on permanent analysis of applications behavior. The integrated scanner StarForce Anti-Spyware Module detects spy programs that trace the user actions on the PC and send the gathered info to the Internet unknown to the user. Publisher: StarForce Technologies| Date: 06-02-2006 | Size: 11234 KB | ||
- |
AET Tracer Lite | License: Shareware | | ||
AET Tracer Lite is a award winning network analysis and visualization tool. The program is used to trace routing paths to arbitrary internet addresses. This can come in handy when you want to trace an abusers (hacker/spammer) geographical position. Or to discover and analyse bottlenecks on the network. Or if you just want to know the location of the person you are chating with on the internet.. Publisher: AET Data Consulting| Date: 10-03-2003 | Size: 10708 KB | ||
- |
Resolution Anti Cyber Crime | License: Demo | | ||
Problem - Viruses and other malicious applications are created more frequently and can infect any computer connected to the internet or those that run applications that are infected at a rapid-fire rate, often before a software update is available from the antivirus vendor, and before the individual can distribute the update to relevant platform... Current antivirus approaches simply will not be enough to counter emerging malicious-code threats, such as those posed by the vectors of instant messaging and peer-to-peer (P2P) applications, active content, and Web applications for malicious-code infections. Publisher: Digital Security Group| Date: 12-02-2007 | Size: 20899 KB | ||
- |
Ip2Ip Messenger & spy for Lan-Internet | License: Shareware | | ||
Advertise for FREE and SPAM FREE.Keeps scare of being called SPAMMER away IP2IP is a feature-rich direct advertising program designed to deliver your messages directly to desktops, using the latest technology available. IP2IP can effectively broadcast your messages to millions of potential leads without the use of opt-in e-mail lists or banner ads.Each successful broadcast sent indicates that your message appeared on your recipients scr. Publisher: GuardPrivacy.com| Date: 9-12-2002 | Size: 359 KB | ||
- |
The Shield Pro - Antivirus & Firewall | License: Shareware | | ||
The Shield Pro 2007 - AntiVirus & Firewall The Shield Pro 2007 AntiVirus and Personal Firewall provides essential protection from Viruses, Trojans, Data Thieves, Hackers, and Online Privacy Threats. Powerful yet easy to use, protect yourself, your family, and your PC online with The Shield Pro. The Shield Pro accurately detects and repairs Viruses with its fully optimized and separated AntiVirus engine for Macro, Email, Script and Windows Viruses. It is distinguished from the other AntiVirus tools by its high-speed Scanning capability. It also Scans and cleans email messages on a real time basis before they ever reach your computer. Publisher: PCSecurityShield| Date: 07-12-2006 | Size: 6042 KB | ||
- |
Cryptic Disk | License: Shareware | | ||
Cryptic Disk 2.4 provides a simple and affordable way to protect disks and disk partitions by encrypting them. The encrypted data cannot be accessed without entering the password, even if a hacker gets access to a PC or the hard drive is stolen. The program uses the AES 256-bit encryption algorithm, the same type of encryption that NASA, the FBI and the Department of Defense use to protect their data. Encrypting and decrypting takes one click and does not require a PhD in mathematics or computer science. Cryptic Disk 2.4 can be used either at home or in the office. The program supports multiple users with different degrees of access privileges, as set by the system administrator. Publisher: EXLADE, Inc.| Date: 05-02-2007 | Size: 2385 KB | ||
- |
Invisible Secrets Encryption Software | License: Shareware | | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features: strong encryption algorithms; steganography and a library of favorite carriers locations; a password management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends or business partners, you will be able to safely send the self-decrypting packages as zip files; a tool that allows you to transfer a password securely over the internet; a cryptboard to help you use the program from Windows Explorer and a real-time news system that allows you to be kept up-to-date with new versions, new products, new features, and special offers, without having to browse our website searching for new information. Publisher: NeoByte Solutions| Date: 30-06-2006 | Size: 2740 KB | ||
- |
FutureWare HackerTracker | License: Shareware | | ||
FutureWare HackerTracker for Windows 9x/NT/2K/XP examines web server log files to identify hacker attacks, capturing source IP Address, attack signature collection, buffer overflow detection, etc., that can be used to generate reports and source data for IP Address blocking at the server or front-end router or firewall. Search engine scans and web site activity aggregations are also done, importing them into MS Excel spreadsheets as required.. Publisher: FutureWare SCG| Date: 27-03-2003 | Size: 1708 KB | ||
- |
Zurfo Stealth | License: Shareware | | ||
"Zurfo Stealth" protects your privacy while you are surfing in the Internet. You do not leave any traces, neither local nor online. The core of "Zurfo Stealth" is the stealth engine. Spy able directories like "Internet Cache" etc. will become invisible by the help of this engine. Your IP is hidden. No external visibility possible (by Administrator, Hacker). This technology is also used in connection with fiscal systems. This engine is used to cover the application area of Zurfo after decoding.. Publisher: Zurfo Ltd.| Date: 01-01-2007 | Size: 15579 KB | ||
- |
Stealth Storage | License: Shareware | | ||
Stealth Storage is a small and powerful file encryption tool. It encrypts files on-the-fly using well-known strong ciphers like BLOWFISH, RIJNDAEL etc. It is totaly invisible when installed. Nobody will even notice there are encrypted files on a computer.. Publisher: SoftCab Inc| Date: 01-10-2004 | Size: 443 KB | ||
- |
Secure Folder(For Windows 2000/XP) | License: Shareware | | ||
Secure Folder is an useful utility that protects your private folders or files. It allows you to password-protect and prevent unauthorized access to your personal and important files and folders. With Its help, you are able to hide your important folders and files, make them inaccessible or read-only. Without password, nobody is able to uninstall Secure Folder and delete, move, rename or modified your protected folders and files.. |
Subscribe to Blog Serba Lengkap.Semuanya Ada Disini ! by Email
0 comments