exploited free software


Search results for tag «exploited»:

WebUnite 3.1 WebUnite 3.1
… . Users can easily disable this feature by simply clicking on the x box in the left corner as well as uninstall all together. The software is free therefore ad supported, with a significant percentage of the revenue going back to the NCMEC. The goal is to expand the network of concerned citizin… 

Seconfig XP 1.1 Seconfig XP 1.1
… p every changed setting, allowing user to restore all settings to their original values.… 

Qwik-Fix 0.56 Beta Qwik-Fix 0.56 Beta
… nown software vulnerabilities in Windows & Internet Explorer from being exploited by malicious hackers, virus writers and worm writers. Qwik-Fix is simple to use, Qwik-F… 

Active Watch 2.5 Active Watch 2.5
… tive Filter to prevent any other ActiveX object from being created by the application.… 

FireLogXP 1.3 FireLogXP 1.3
… g the Internet Connection Firewall (ICF) in Windows XP. It will read the log file and show you who is trying to get into your computer, and through which ports. The data can be filtered to include/exclude protocols, connection types, and TCP flags. It includes connections to on-line resource… 

Washee 1.0 Washee 1.0
…  the data stored in local folders on your hard disk. The web sites you visit can also place hazardous cookies on your computer that tell the sites about your surfing habits, your hardware and software configuration. Such sensitive information can be exploited by some people for commercial or malicio… 

IESecure 0.1 IESecure 0.1
… oblem. NOTE: The patch can be uninstalled!… 

PhpGmailDrive 0.3.0a PhpGmailDrive 0.3.0a
… nown as PGD. Its size is only few kB. Interestingly it allows anyone to host 2 GB files in few megabytes hosting space in server.. How? It uses Gmail as file server. It follows a special protocol called GmailFS, where subject lines of mails are exploited such a way that external Gmail checkers… 

Secure-It 1.25 Secure-It 1.25
… g the intrusion and propagation vectors proactively or simply reduce the attack surface by disabling unimportant functions. It will secure Windows desktop PCs and Internet servers against dangers by blocking the root cause of the vulnerabilities exploited by spyware, malware and worms. In som… 

Fourier Bessel Transform For Face Identification 1.0 Fourier Bessel Transform For Face Identification 1.0
… isual system, on the other hand, is known to process visual stimuli logarithmically. An alternative representation of an image in the polar frequency domain is the two-dimensional Fourier-Bessel Transform. This transform found several applications in analyzing patterns in a circular domain, but was… 


Related: