exploits and free software
Search results for tag «exploits and»:
BugOff 1.0.1
… CWShredder), thus protecting you from infection.
This does not remove an existing infection! Applicable to everyone that uses Internet Explorer.…
Exploit Detect 2000 1.0
… Exploit Detect 2 will detect various exploits that may appear into your system.…
LinkScanner Pro 2.5.0.0045
… -up
Compatible with major anti-virus, anti-spyware, and firewall products
Limitations
15 day trial…
XRAY 1.1
… n spot some 0day exploits since it doesnt only look for specific patterns but also suspicious data that is contained in most exploit codes.
You want to be really secure? Then you need an IDS! Only a Firewall wont help much against attacks.…
MestRe-C 4.8.6.0
… possible to work with any number of spectra simultaneously in the same document window.
Here are some key features of "MestRec":
Line fitting
Coupling Constants Analyzer
Automatic analysis of (first order) multiplets
Diagonal supression…
Morgan Multimedia MJPEG Codec 3
… Adobe Premiere, Ulead Media Studio compliant. MMX, SSE, SSE2, 3DNow!+ and SMP heavily optimized. DirectDraw YUV accelerated overlay output supported (YUY2, UYVY, ...). Support most of the M-JPEG formats (4:2:2, 4:1:1, 4:2:0, MJPG, dmb1, jpeg).…
HackBar 1.0
… y holes, you can also use this toolbar, but you will probably also need a book, and a lot of google
Re…
SafeZilla 1.0
… One of the most useful one is the ability to sandbox Olly/IDA debuggee. Just enable this option and work with your favourite tool as usual. If you lose control of your target, it will not be able to take control of your PC due to its reduced rights.…
W32.Welchia.Worm Removal Tool 1.06
… ability (described in Microsoft Security Bulletin MS03-007) using TCP port 80. The worm specifically targets machines running Microsoft IIS 5.0 using this exploit. IIS 5.0 will most likely be found on Windows 2000 systems.
W32.Welchia.Worm does th…
Identity Protection 1.5
… ternet and computer histories/activities, securely encrypt files and directories - so only you can access them, scan your computer for adware and spyware infections (and remove them as well), and even scan your computer for possible Windows security exploits and insecure security policies.
Ident…
Related: