Exploits Software

Network Security Scanning and Auditing

Infiltrator Network Security Scanner
 

Infiltration Systems
 

Infiltrator is an intuitive network security scanner that can quickly audit computers for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more.

Software Keywords: scanning network scanner infiltrator network auditing powerful

 
Tools to protect your Computer's Security.

Identity Protection
 

Infiltration Systems
 

Identity Protection is a powerful, easy to use security suite for protecting your computer and internet identity from hackers. Identity Protection features secure utilities to clear your internet and computer histories/activities, securely encrypt files and directories - so only you can access them, scan your computer for adware and spyware infections (and remove them as well), and even scan your computer for possible Windows exploits.

Software Keywords: adware removal privacy spyware removal encryption hacker identity protection

 
Growler Guncam is a game video capture tool.

Growler Guncam
 

Growler Software
 

Growler Guncam is a game recorder and video capture tool that allows users to create video from games and other programs. Guncam can turn this video into AVI files, animated GIF files, and even JPEG still shots. Use Guncam to create a machinama masterpiece, use it to share your game exploits with friends, or just use it to help improve game-play.

Software Keywords: screen shot screen capture game capture video capture game video recorder game movie making

prevent malicious email from downing your nw

Mailwall
 

Omniquad Ltd
 

Mailwall - Removes all types of e-mail threats - Intercepts all e-mail messages on your network, disassembles them and looks for undesired/illicit content and threats in your e-mail: SPAM exploits, macro viruses and malicious HTML code. All policies are rules based - you can automatically filter, delete or quarantine suspicious messages. Works with all mail servers and does not require changes in setup for your existing e-mail users.

Software Keywords: e-mail mail removes filter policy anti spam

Binary Modular DataFlow Machine

BMDFM
 

BMDFM
 

BMDFM (Binary Modular DataFlow Machine) is software, which enables running an application in parallel on shared memory symmetric multiprocessors (SMP) using the multiple processors to speed up the execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static and mainly DYNAMIC SCHEDULING of the data flow instruction sequences derived from the formerly sequential program.

Software Keywords: machine modular binary environment dataflow smp

Anti-Virus/Trojan Integrity Checker

Sentinel
 

RuntimeWare
 

Sentinel works by analyzing exploits in both your Registry and your system folders; integrating with ANY Anti-Virus program to quarantine these threats. Sentinel's Integrity Checker will notify your anti-virus/trojan application(s) if any file has been modified or added in any way whatsoever (using either a heavily optimized CRC32, SHA-1, MD5 or MD4 algorithm--for those of you who don't speak geek: Sentinel is fast, and very secure).

Software Keywords: crc antitrojan watch supplement integrity

A firewall and proxy-server application

Irbis Firewall
 

Irbis Software
 

Irbis Firewall is a firewall and proxy-server application developed to protect computers running Microsoft Windows 2000/XP against network attacks. Irbis Firewall allows you to manage packet filters and control access to Internet easily. Compact in size and handy in use Irbis Firewall provides user-friendly GUI interface for exercising control over the network access to your computer, and protects your computer against most of remote exploits.

Software Keywords: network protecting against proxy safety

Protect your computer from I-worms & hackers

Anti-Cracker Shield
 

SoftSphere Technologies
 

Protect your computer from Internet worms and hackers' attacks, which become possible due to the operational system and software vulnerabilities ("exploits"). Neither antiviruses, nor firewalls can protect from exploits. Only Anti-Cracker Shield, a multilevel security system is able to cope with all known and unknown versions of "exploits". It is possible and is necessary to protect from hackers!

Software Keywords: applications os protect vulnerabilities hackers

Morgan M-JPEG codec is a Windows video codec

Morgan Multimedia MJPEG Codec
 

Morgan Multimedia
 

Morgan M-JPEG is a video codec. This third version is particularly optimized for Intel and AMD last generation CPU and Windows XP and 2000 operating systems but it is even fully optimized for older CPU and older Windows versions. It also takes full advantage of multi-processors systems. It is more accurate and up to 5x faster than the previous version. Morgan M-JPEG codec V3 exploits all the power of Pentium III, Pentium 4 and other Athlons CPU

Software Keywords: avi ulead media studio dc30 motion jpeg buz rainbow runner

Screensaver presentation of Maxabella Homes

Maxabella General Screensaver
 

TIGME.COM
 

This screensaver contains 24 photos taken from various Maxabella Luxury Homes and the Arabella surrounding area in the Western Cape, South Africa.

Software Keywords: realestate maxabella luxury arabella homes nature

 

Page 1 out of 2    1 2


 

Copyright © 2003-2012 TverSoft Software