attacks shareware downloads
Search results for «attacks»:
Pop Up Police 3.3
… k like you - not for you -- about what you want to see on your PC.
Unlike Pop Up Blockers, our software is SMART so it won't allow anything you don't want to see. Our exclusive Ad Control TechnologyTM instantly forbids pop ups, banners and sneak attacks to ensure you get the most out of your bro…
Zip Password Recovery Master 6.2.0.0
… the following archives: WinZip 6.x - 8.x for Windows (Nico Mac Computing), PkZip 4.x for MS-DOS (PKWARE) and WinRar 2.8 (Eugene Roshal).…
Protect IIS 3.1
… rity policy changes.
Simulated attacks.
Built-in CodeRed, Nimda and other attack simulators to test your installation.…
dotDefender 2.18
… ver: IIS 5 or IIS 6
Limitations
15 days trial…
XRAY 1.1
… d an IDS! Only a Firewall wont help much against attacks.…
Avira Premium Security Suite 10.2.0.668
… Avira Premium Security Suite will protect you in a comprehensive way against the dangers from the Internet. Avira Premium Security Suite offers you numerous advantages from the AntiVir Premium Edition. In addition, the integrated firewall wards off attacks such as DoS attacks (Denial of Service att…
ThreatNuker 2.0.2
… code 24/7 using customized tools. And once a website is added to the ThreatNuker list you can rest assured that no harm can come from that place again.
Limitations
to solve the problems you must register…
1st Email Anti-Virus 4.0
… all kinds of email threats.
Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does.
It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs…
Look 'n' Stop Firewall 2.05
… t trys to transmit your personal data to the outside without your agreement. Your permanent Internet connection can be scanned permanently from the outside.…
Personal Firewall PF 2.5.0.4
… ill report 360° reporting logs back to the Server (virus alert, traffic monitoring, policy violation). Integration with existing network management with our https/Syslog network interface.
Limitations
30 d…
Related: against attacks new attacks attacks pop attacks brute attacks