|
Your download link is at the very bottom of the page... always. |
Processed through Paypal No account required. Donate Bitcoin to this wallet: 1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm Donate Ethereum to this wallet: 0x40E56922F43637224935CDC35e2c96E0392A8505 Donate Litecoin to this wallet: LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL |
Files | ||||
File Name | Rating | Downloads | ||
G Security 1.0 G Security 1.0 G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys like Alt+tab, Ctrl+Alt+Esc, Alt+F4 etc will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time on a single computer with settings stored for each user individually so that each user can use G Security with its own preferences. G Security also supports hotkey to lock the system. In a few words its extremely secure, easy to use and configurable desktop locking solution available for everyone free of cost. Some of its key features include : Its easy to use. Its a Freeware. Fully locks down your computer. Can protect Windows on startup. Suitable for all kinds of users. Multi user support. ... |
5,584 | Jun 20, 2016 Malik Usman Aura |
||
Network Security Toolkit (NST) v38 Network Security Toolkit (NST) v38 A network security analysis and monitoring toolkit Linux distribution. Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 36 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines. Features Multi-Tap Network Packet Capture Web-Based Network Security Tools Management Host/IPv4 Address Geolocation Network/System Monitoring Network Intrusion Detection Network Interface Bandwidth Monitor Web-based Snort IDS Integration Active Connections Monitor Network Segment ARP Scanner Network Packet Capture CloudShark Upload Support Multi-Port Terminal Server VNC / RDP Desktop Session Management Click here to visit the author's website. |
2,894 | Oct 03, 2023 networksecuritytoolkit.org |
||
Nmap Security Scanner v7.95 Nmap Security Scanner v7.95 A free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source. Free: The primary ... |
9,968 | Jul 26, 2024 Nmap |
||
Password Security Scanner v1.61 Password Security Scanner v1.61 This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords. The security information of every stored password includes the total number of characters, number of numeric characters, number of lowercase/uppercase characters, number of repeating characters, and password strength. You can use this tool to determine whether the passwords used by other users are secured enough, without watching the passwords themselves. System Requirements This utility works on any version of Windows, starting from Windows 2000 and up to Windows 10. Supported Applications Currently, Password Security Scanner scans the passwords of the following applications: Internet Explorer 4.0 - 6.0 Internet Explorer 7.0 - 11.0 Mozilla Firefox (All Versions) Mozilla Thunderbird Google Chrome Dialup/VPN passwords of Windows (Requires elevation) MSN/Windows Messenger Microsoft Outlook Windows Live Mail Yandex Web Browser Vivaldi Web Browser SeaMonkey Web browser. Pale Moon Web browser. Chromium-Based Edge Web browser Opera Web browser (Version 15 or greater) Windows Credentials Passwords (Requires elevation) Support for more applications will be added in future versions. Known Limitations Password Security Scanner cannot scan the passwords of Firefox if they are protected by a master password. The dialup passwords and Credentials passwords of Windows can only be detected if you run Password Security Scanner with Administrator privileges (elevation). This download is for the 64bit version. If you need the 32bit version, download here. Versions History Version 1.61: Fixed Password Security Scanner to ... |
3,854 | Jul 09, 2020 Nir Sofer |
||
Service Security Editor v2.0.0.13 Service Security Editor v2.0.0.13 A Free Standalone, portable GUI utility to Set Permissions for any Windows Service Easily allow (or deny) a user the ability to start, stop, pause or modify any Windows Service with just a few clicks of your mouse. Service Security Editor will help you to configure who can access your important Windows Services. It is an easy-to-use GUI alternative to Microsoft's powerful SC and SubInACL.exe command line programs. However, as with any other administrative tool, please use it with caution. When you start Service Security Editor, it shows the list of the services running on your machine: Select a service and click the Open... button to pop up the service's standard Windows Service Security Settings window: From there, select a user in the top portion and check the boxes lower down to grant or deny him whatever capabilities you see fit. Click the Add... button to bring in an account not already on the list. And of course, click the OK or Apply buttons to record your changes. Granting a Non-Admin User Start & Stop Rights to a Service For example, suppose you have a non-administrative user called Albert Newton who needs to restart the Print Spooler service when it acts up. Unfortunately he doesn't have the necessary rights and the Stop button is disabled when he opens the service from the Services Control Panel application: To grant Albert the ability to start and stop the Print Spooler service: 1) Start Service Security Editor. 2) Select the Print Spooler service from the list: 3) Click the Open... button to launch the Service Security Settings window: 4) Albert isn't on the list, so click on the Add... button to open the Select Users or Groups window. Type in Albert's ... |
2,588 | Sep 23, 2021 Core Technologies Consulting, LLC |
||
Web Link Communications Security Inspector v1.3.2.0 Web Link Communications Security Inspector v1.3.2.0 Safely inspect and analyze suspicious web links from email or other messages before opening them in your web browser. About: This application inspects communications used in URIs without compromising your endpoint security and privacy. Just read and accept the built-in EULA to use the application's fully enabled features. A User's Guide is bundled along with the Application in the .zip file. More info, licensing and uses: The application may be used at no cost after reading and accepting the built-in EULA. Web Link Communications Security Inspector safely provides useful analytical information on web link communications whether you use it in a professional setting or personally from your own computer. In addition to analyzing suspicious web links from your email or other messaging system, you can also use this application to diagnose or validate communications with your company webservers or with your personal webserver before setting them up live on the Internet. This application may also be useful in security awareness training scenarios, to illustrate how the security of protocols used often varies from link-to-link or when client or server configurations place constraints on TLS negotiation. SHA-256: 2186f8898e92517f1838a3d1bc10c81a96be35d2bc052ee5023be26d3423df19 Requirements: x64 .NET® 6 Desktop runtime must be installed before using this application. Get it from Microsoft. Click here to visit the author's website. |
2,117 | May 22, 2022 Steve Chaison Software |
||
Win10 Security Plus v1.0 Win10 Security Plus v1.0 Win10 Security Plus is a powerful Windows OS software application that improves the security of Windows. It applies many recommended security settings and advanced security enhancements to the operating system, the changes should not cause conflicts or system errors, we have tested them many times. The program enables important security services, disables vulnerable system features (such as autorun.inf autoplay, NTVDM executions, Windows host script), improves the security of Internet Explorer and of the system integrity. And best of all, you just need to click the button "Apply Selected" and reboot the PC, that's all. This program works on Windows XP, Vista, 7, 8, 8.1, 10 (32\64-bit). If you have programs that use cscript.exe or wscript.exe you should uncheck the option "Disable Windows Script Host". Else you may get an error message like "Windows Script Host access is disabled on this machine. Contact your administrator for details." when a program executes VBScript or JScript scripts. Program Key Features Enable Important System Security Services Disable Commonly Exploited System Features Disable Autorun.inf Autoplay, 16-bit Processes, WSCRIPT.EXE Enable SmartScreen, Windows Updates, Windows Defender Enable User Acces Control (UAC), Windows File Protection (SFC) Activate Internet Explorer Memory Protection Enable Structured Exception Handling Overwrite Protection Disable Remote Registry, Remote Assistance, Short File Names Enable Driver Signing Check, System Restore, Security Center Enable Signature Verification of Downloaded Programs 40+ Security Improvements in One Powerful Program Improves System Protection Against Malware ... |
5,348 | Nov 13, 2019 site2unblock |
Showing rows 1 to 7 of 7 | Showing Page 1 of 1 | 1 |
OlderGeeks.com Copyright (c) 2024