untrusted shareware downloads
Search results for «untrusted»:
DefenseWall 2.05
… with limited rights of modification of critical system parameters, and only in the virtual zone that is specially allocated for them, thus separating them from trusted applications.
In the case of penetration by malicious software via one of the untrusted applications (web browsers, etc), this c…
SafeLaunch 2.0
… o connect out over the network will be automatically intercepted by Safe Launch, giving you the option of either allowing the activity to occur or denying permission.…
glChat 7.40
… ilizes advanced encryption techniques combined with user configurable encryption keys and network port numbers. Use glChat today and chat with secure confidence.…
Virtual Sandbox 2.0 Build 209
… nvironment not having access to personal files, system settings and local networks.
With Virtual Sandbox installed, any program can be allowed to run in a discardable, carefully…
CobraSoft Pop Up Stopper 2.0
… er will stop and control annoying pop-up windows while you browse the web. You have complete control over what to do with the pop up windows that are captured by this program. Integrates into Internet Explorer as a side band. Options include trusted/untrusted list, audio notification, open in curren…
Startup Agent 2.1
… m ever re-starting on bootup…
Online-Armor 1.1.1.826
… rmor.
Here are some key features of "Online Armor":
Keylogger Detection
Mail Filter
Web Filter
Cookie Cutter
Trusted Sites
untrusted Sites
Prevent Spyware
Remove Spyware
Settings Monitor
IE Extensions
DNS Checker
Hosts Chec…
Remote Database Manager SQL 1.0
… werful query tool, that can save and load queries, and has a structure analyzer to help you remember your column names and data types. It also provides automatic backups and a data restoration wizard.
Stop entering your log in information into untrusted 3rd party websites to manage your online…
Privatefirewall 7.0.24.10
… pes so that personal computer users and IT managers within small, medium or large organizations can more effectively and proactively protect the environments and private data for which they are responsible.
Internet and network security settings, untrusted web sites and IPs, and the manner in whi…
ThreatSentry 4
… chniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance.
An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system baseline to detect untrusted activity and prevent attacks on Microsof…
Related: untrusted