application security free software
Search results for tag «application security»:
XP Firewall Control 2.5
… .
XP firewall control introduces per-application named security zones and allows security zone management.
Here are some key features of "b Wall":
Complete usage of XP firewall benefits;
Handy application access control on the desktop;
Per-application security zones;…
LASsie 4.5
… n a form for a user
Filter certain records for a given user
Incorporate a sign-on form into your application
Optionally use network login username instead of sign-on form
Add/edit/remove users and Security Levels
LASsie is called "light" application security because it is not intended to…
N-Stalker Web App Security Scanner Free Edition 1.0.0.22
… safe environment to deploy Web Applications.
From a security guru to a security conscious professional, N-Stalker allows for a wizard-driven policy configuration, providing an easy-to-use interface to customize the scanner according to your needs.…
Active Security Monitor 2.0.0.18
… exposure to viruses, identity theft and network intrusion.
A recommended list of products, services and articles to help you resolve any security vulnerability found.
Messages and alerts concerning your security software.
Limitations None…
FoolProof Security 5.0
… eficial use of their computer learning experience.
FoolProof Security features
The leading desktop security solution
Allows multiple Security Groups
Locks applications and Control Panels
Directs file saving
Provides internet access security…
Desktop USB Security Key 1.0
… s or NO" to start application.
4) Press "Yes", the application will create an unique session key and write to USB drive.
5) Press "No" , the application exits.
6) A desktop shortcut called, "Desktop USB Security Key" should now be on your desktop.…
BPS Security Console Toolbar 1.0
… mover
BPS PC Internet Firewall Security
BPS WinTrace Remover
BPS Data Shredder
BPS Popup Shield
BPS PC System Tweak for Windows
BPS Phishing Blaster.
If a security tool is installed in your system (either trial or free) the caption of the b…
Computer Security 1.5
… lcomed quests".
Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.…
Security Config Wizard NT 1.5
… o set a lot of security related (mostly) hidden options from Windows NT from computers across all obtainable domains if you have the rights! Configuration Wizard NT is a very useful utility for Network Manager, Advanced Users and Software Developers.…
Core Force 0.91.134 beta
… ations for a growing list of programs.
These security profiles can be downloaded by any user from the community Web site and they're also completely open so that they can be peer-reviewed to minimize security hazards.
The community approach t…
Related: