Download the latest version of software you need for free

Advertising


  • Web
  • Download Free PC Software
  • Showing posts with label Security. Show all posts
    Showing posts with label Security. Show all posts

    Child Control 2011 11.259.0.0


    Child Control 2011 11.259.0.0


    Child Control 2011 11.259.0.0 | 19.0 MB

    Computers are the place for children. This is the place where they can sharpen their agility as well as their abilities. They can learn and make new friends. What’s more, the Internet provides information for homework assignments. So far, so good. But they also need to be protected from the computer—for one thing, so that they don’t lose their sense of time and forget to go out and play with their friends once in a while, and for another, because of the dangers lurking on the Web.

    That’s why responsible parents everywhere install Child Control on every computer that their children use.New! Internet Remote Control: Starting with Child Control 2009 you can modify the most important settings or view session logs directly on the Internet. No matter where you are. No matter which browser you are using. This feature is part of the Online Functions.

    Just a few things Child Control lets you do:
    *NEW: Blocking of file sharing programs and sites
    *NEW: 1,000,000 undesirable sites can now be selected for restriction
    *NEW: Adult-content filtering provided by German government authorities
    *NEW: Email reports of on- and off-times and daily statistics
    *NEW: additional configuration options
    *Works with all versions of Windows from 95 to Vista
    *Limit time on the computer for each day of the week
    *Limit use of the Internet for the day and the week
    *Set PC off-limits times (e.g. after 11 p.m.)
    *Set Internet off-limits times (e.g. after 11 p.m.)
    *Easily extend time with passwords or TAN’s
    Define “unwelcome” web content using keywords
    *Set time limits for categories of websites, such as videos and online games
    *Set specific time limits for each computer application
    *Grant unlimited time for specific applications, such as learning tools
    *Log all computer activity to let you later review each user’s activities
    *Block modifications to major Windows settings
    *Protect your data by blocking access to specific folders
    *Limit children’s access to specific programs
    *Disable “backdoor” access to programs or functions
    *Extend all time limits during vacation time—one click does it all
    *Set up a central database for multiple users (schools, institutions, etc.)
    *for computers connected by modem, networks, DSL, routers, etc.
    *Easily import or export settings or blacklists
    *Send log files to any email address

    OS : Win XP/2000/Vista/Win 7
    Language : English

    Spy Emergency 9.0.705.0 Multilanguage


    Spy Emergency 9.0.705.0 Multilanguage


    Spy Emergency 9.0.705.0 Multilanguage | 16.65 Mb

    Spy Emergency is the anti spyware, anti malware, anti spam solution that fast and secure removes spyware, malware, spam and other internet threats from your computer. Spy Emergency protects you against thousands of various infections and potencially unwanted software, including spyware, adware, spam, virus, trojans, worms, homepage hijackers, remote administration tools, activex components, dialers, scumware, keyloggers, data mining software, toolbars, tracking cookies, browser, hijackers/BHO's.

    Spy Emergency do not slow down your computer and still protects you while your are working not like others spyware removal software. Spy Emergency has more than 985,000 threat definitions in its signature database! Small and regular definition updates greatly reduce update downloading time. Spy Emergency is ready to fight malware on Windows Vista operating systems.

    Spy Emergency Features:
    • Support for Internet Explorer, Mozilla Firefox and Opera browsers
    • Scan of your system memory
    • Scan of your registry
    • Scan of your storage
    • Built-in anti-spam
    • System directory storage scan
    • Tracking cookies scan
    • Host file scan
    • Hijackers scan
    • Heuristic malware detection
    • Polymorhic malware detection
    • Generic unpacker with support for UPX, Aspack
    • Command line interface
    • Automatic LSP stack repair
    • Real-time memory shields that blocks spyware before it executes
    • Prevention shields that blocks malware installation
    • Browser shields, including homepage shield
    • Tracking cookies shields
    • Automatic database updates
    • News updates
    • Individual spy restore functionality
    • Keeplist
    • Scheduling support
    • Simple configuration
    • Intuitive and clear user interface for spyware removal
    • Handy Shell Extension Scanning
    • Skin support
    • Language support
    • Premium Technical support
    • and much more...

    Child Control 2011 11.258.0.0


    Child Control 2011 11.258.0.0



    Child Control 2011 11.258.0.0 | 19.0 MB

    Computers are the place for children. This is the place where they can sharpen their agility as well as their abilities. They can learn and make new friends. What’s more, the Internet provides information for homework assignments. So far, so good. But they also need to be protected from the computer—for one thing, so that they don’t lose their sense of time and forget to go out and play with their friends once in a while, and for another, because of the dangers lurking on the Web.

    That’s why responsible parents everywhere install Child Control on every computer that their children use.New! Internet Remote Control: Starting with Child Control 2009 you can modify the most important settings or view session logs directly on the Internet. No matter where you are. No matter which browser you are using. This feature is part of the Online Functions.

    Just a few things Child Control lets you do:
    *NEW: Blocking of file sharing programs and sites
    *NEW: 1,000,000 undesirable sites can now be selected for restriction
    *NEW: Adult-content filtering provided by German government authorities
    *NEW: Email reports of on- and off-times and daily statistics
    *NEW: additional configuration options
    *Works with all versions of Windows from 95 to Vista
    *Limit time on the computer for each day of the week
    *Limit use of the Internet for the day and the week
    *Set PC off-limits times (e.g. after 11 p.m.)
    *Set Internet off-limits times (e.g. after 11 p.m.)
    *Easily extend time with passwords or TAN’s
    Define “unwelcome” web content using keywords
    *Set time limits for categories of websites, such as videos and online games
    *Set specific time limits for each computer application
    *Grant unlimited time for specific applications, such as learning tools
    *Log all computer activity to let you later review each user’s activities
    *Block modifications to major Windows settings
    *Protect your data by blocking access to specific folders
    *Limit children’s access to specific programs
    *Disable “backdoor” access to programs or functions
    *Extend all time limits during vacation time—one click does it all
    *Set up a central database for multiple users (schools, institutions, etc.)
    *for computers connected by modem, networks, DSL, routers, etc.
    *Easily import or export settings or blacklists
    *Send log files to any email address

    Ultimate Keylogger Pro v1.80.45

    Ultimate Keylogger Pro v1.80.45

    KRyLack Ultimate Keylogger Pro v1.80.45 | 3.49 Mb


    Ultimate Keylogger is the popular all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. To avoid tampering of the software, it features a unique file protection. Ultimate Keylogger is completely undetectable. During monitoring sessions it will not be listed in the task manager.

    The software can be installed in less than five minutes and runs maintenance free. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or network. Ultimate Keylogger has a password protected interface and hot-key combination for accessing the application. All recorded information is stored in an encrypted file. Ultimate Keylogger does not consume computer resources.

    Data Guardian 2.0.7

    Data Guardian 2.0.7


    Data Guardian 2.0.7 | Mac Os X | 12 MB

    Security and privacy are two of the most important issues in today's world; leaving passwords on sticky notes around your computer simply will not cut it anymore. Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is. Create multiple databases in Data Guardian for a variety of purposes such as an address book, customer database, Christmas shopping list, journal, password manager, or even notepad.
    Easily create collections to store records, and even apply custom color labels and icons! Change the view options for each collection to see the information you want, and add your own custom data fields. Do not be stuck with a program which forces you to input your information into predefined fields. Enter the data you need to, not what you are forced to.
    Aside from Data Guardian's easy to use Keychain integration* to autofill passwords on web sites, it also offers a variety of other tools and features to enhance each record. Dial phone numbers through your modem with a single click, create new e-mail messages, generate secure passwords (based on an algorithm of your choosing), and even synchronize two databases.
    Data Guardian is the ultimate database solution, and not only if security is a priority. Allow it to become your computerized Swiss Army Knife in an age of digital chaos.

    Monitoring Cameras 7.3.0.0.35

    Monitoring Cameras 7.3.0.0.35

    Monitoring Cameras 7.3.0.0.35 | 1.15 Mb


    Monitoring Cameras is surveillance and monitoring software. Use your webcam or camera to monitor your home or office! The motion detection system will trigger alerts and will notify you by Sound Alarms, Emails, SMS or FTP. Videos and images can be recorded locally or remotely.

    Features:
    - Real-time monitoring - Monitoring all your cameras in real-time
    - Real-time motion detection - Our software advanced algorithm will detect movement according to a given sensibility
    - Email or SMS Alert - Be alert by SMS or by Email, you will receive an email with pictures of what has happen
    - Sound alarm - Our software can trigger a sound alarm whenever something is detected
    - Update automatically your website - Update your website by upload your cameras images or video in real time
    - Images recording - Keep in archive the pictures that have been saved
    - Images Periodic Snapshots - Take snapshots following an interval time
    - Videos recording - Keep in archive the videos that have been saved
    - Videos Periodic Recording - Record videos following an interval time
    - Support IP cameras and webcams - Hundreds of cameras are supported (up to 20 differents at the same time)
    - Easy to use - Only a few click are enough to configure the software the way you need it!
    - Task scheduling management - You do not need to worry about starting the monitoring, you can schedule task
    - Automatic FTP transfer - This will guarantee that your datas will be in a secure place
    - Logs and archives system - You will know what happen every seconds
    - Watermarking - Add some text to your cameras videos and images
    - Automatically starts with windows - Configure Monitoring Cameras to start with windows
    - Multiple images format support - Support many different formats
    - Video compression - Video are compressed in order to take less disk space

    Conficker Removal Tool

    Conficker Removal Tool

    Conficker Worm was at one time reported to have infected upwards of 12 million PC’s around the world. Conficker Worm was originally designed to exploit flaws found in Microsoft’s Windows MS08-067 vulnerability. Conficker Worm may prevent you from accessing security services or websites and spread to other computers through network shares.

    Safely remove the Conficker Worm, including Conficker.A and Conficker.B variants, from your system. Conficker is a computer worm that exploits Microsoft’s Windows MS08-067 vulnerability, spreads through network shares, and creates an autorun.inf file that allows it to replicate itself. Computer users infected by Conficker should try our free Conficker Removal Tool tailored to fight against the Conficker Worm. See what others are saying about Enigma’s Conficker Removal Tool!
    Our Conficker Removal Tool scans your entire system to detect and remove Conficker Worm from your computer without causing damage to your system files.

    How our Conficker Removal Tool Benefit You

    The Free Conficker Removal Tool uses a four-step process that disables the infection to ensure Conficker is completely removed from your system. Because Conficker disables various security services it is necessary that the Conficker Removal Tool first disable the Computer Browser, Server and Scheduler Services, Conficker AutoRun.inf files and Conficker Service files. Each process requires a reboot so that the Conficker Removal Tool is able to eliminate Conficker.

    Conficker Removal Tool Video Demonstration

    Watch the Conficker Removal Tool video demonstration and see how Conficker Removal Tool can help you get rid of the Conficker Worm.
    Tip: Turn your sound ON to listen to the video.

    Spyhunter v4.5.11.3608

    Spyhunter v4.5.11.3608

    Spyhunter v4.5.11.3608 | 23.04 Mb


    SpyHunter is a powerful, real-time anti-spyware application certified by West Coast Labs’ Checkmark Certification System and designed to assist the average computer user in protecting their PC from malicious threats. SpyHunter is automatically configured out of the box to give you optimal protection with limited interaction so all you need to do is install it for immediate and ongoing protection. As malware continues to evolve and become more sophisticated to avoid detection by anti-spyware/anti-virus programs, SpyHunter responds with new advanced technology to stay one step ahead of today’s computer threats.

    How SpyHunter can Benefit You
    Detect, remove and block thousands of spyware, rootkits, adware, keyloggers, cookies, trojans, worms and other types malware.
    New! Integrated SpyHunter Compact OS to aid in removal of rootkits and other stubborn malware parasites.
    New! System Guards will identify and stop any processes that attempt to secretly auto-start malware entries by exploiting the Windows registry.
    New! Exclusions feature allows you to exclude certain programs from being detected in future SpyHunter scans.
    Interactive one-on-one customer support service called Spyware HelpDesk.
    New spyware definitions updates added daily to ensure complete protection from the latest malware trends.
    Easy to use interface with intelligent automatic protection.
    Custom malware fixes specific to your computer’s spyware problems. SpyHunter’s Spyware HelpDesk creates a diagnostic report that is analyzed by our technicians, and an automated custom fix generated from the report is sent back to you via SpyHunter.

    Super Clear Cookies 2.1.1.8

    Super Clear Cookies 2.1.1.8

    Super Clear Cookies 2.1.1.8 | 1.98 Mb


    Super Clear Cookies is very helpful if a website or forum has banned you or is monitoring your online activity with tracking cookies. This powerful cookies cleaner can also wipe ALL cookies from Internet Explorer or Mozilla Firefox. Super Clear Cookies also allows you to un-ban yourself on many websites and "reset" your website status with a given domain. By safely wiping unwanted cookies from your PC, Super Clear Cookies provides you super protection guarding your online privacy.

    Key Features:
    -Only remove the useless cookies, and keep the rest
    - Quickly and easily delete all Internet Explorer and Firefox cookies
    - Clear stored website passwords or other stored site data of a given domain
    - Prevent websites from tracking your online activities
    - Perfect with Super Hide IP

    Super Clear History v2.2.0.6

    Super Clear History v2.2.0.6

    Super Clear History v2.2.0.6 | 1.85 Mb


    Wipe your web surfing and computer use activities permanently! Your computer tracks all your activities while you are working on the computer or surfing the Internet. So anyone who can access your computer is able to know your web surfing history, what videos you've seen, files you've downloaded, documents and files you've just opened and more. Easily and safely clean the saved data so the next person using your computer will never know your computer activities. Wipe activity history of dozens of programs such as FireFox, Internet Explorer, Windows Media Player, Yahoo, MSN, and Google. Automatically empty your recycle bin, clear your clipboard content, clean your history of run programs, recently opened files, and much more.

    Key Features

    Clear All History of Your Online and Offline Activities
    Purge Stored Web Browser Data
    Quickly Clean All History with Just One Click
    Many Windows History Cleaning Tools Enabled
    Automatically Clean All History

    TrustPort Total Protection 2012 12.0.0.4798

    TrustPort Total Protection 2012 12.0.0.4798 Multilanguage

    TrustPort Total Protection 2012 12.0.0.4798 Multilanguage | 264 MB


    Maximum protection for your computer against malware, online threats and misuse of confidential data. The program protects the computer from viruses and spyware at all entry points. All electronic mail and websites are examined in order to detect dangerous or unwanted content. It enables the reliable protection of sensitive data by encryption or the permanent shredding of confidential files no longer in use.

    Complete data protection
    - Antivirus and antispyware
    - Internet protection
    - Intelligent firewall
    - Data protection by encryption
    - Reliable data shredding
    - Access management - NEW!

    Antivirus and antispyware
    The program uses traditional scanning and heuristic analysis in order to disable any malware which might enter the computer from the internet or add on media. Two top quality motors ensure the detection of harmful code almost to the magic figure of 100%.

    Personal firewall
    The firewall serves to distinguish between legitimate and illegitimate connections between the computer and the Internet. The program automatically allows Internet communication for commonly used applications. In the case of unknown or suspicious programs the user is always asked whether connection should be permitted or disabled.

    Access management - NEW!
    The software brings your data protection to a new level. It enables limiting access to selected system devices, e.g. flash drives or external hard drives. It is possible to assign different user privileges to these targets. Especially corporate customers may appreciate this feature as a huge benefit.

    Data encryption and shredding
    Two methods of file encryption are available. For the secure backing up of data it is advantageous to store it in an encrypted archive, for everyday security it can be kept on an encrypted disk. In addition the program enables the permanent shredding of sensitive data which is no longer in use.

    Portable antivirus
    With the help of this application, you can generate a portable version of the antivirus on your flash drive. It will enable antivirus scanning of any given computer on which you may be working.

    System recovery disk
    In case of a serious virus damage the program enables creation of a system recovery disk with an antivirus module. After loading the operating system from the recovery disk it is possible to eliminate malware, which could not have been removed by other means.

    Award Keylogger 2.14-X86

    Award Keylogger 2.14-X86
    Award Keylogger 2.14 -x86 | 4.35 MB


    Award Keylogger allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Award Keylogger makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones.

    Main Features:
    • New! Run keylogger as a Windows service
    • Easy-to-use, even for beginners
    • Absolutely invisible/stealth mode
    • Logs accounts and passwords typed in the every application
    • Logs message typed in all instant messengers
    • Visual surveillance, support screenshots view
    • Slide show for screenshots
    • Captures the contents behind the asterisks
    • Captures mouse clicks
    • Logs websites visited
    • Captures AOL/AIM/Yahoo/ICQ chats
    • Keyword Detection and Notification
    • Records contents of password protected web pages, including Web Mail messages
    • Logs Windows Clipboard
    • Sends log by e-mail
    • Uploads ALL logs into the separate folders by FTP
    • Invisible for the firewall program
    • Invisible in the Windows startup list
    • Monitors all users of the PC
    • User friendly HTML file format for emailed logs
    • Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List
    • Records Windows 9.x/Me/2000/XP/VISTA logon passwords
    • Intercepts DOS-box and Java-chat keystrokes
    • Supports international keyboards
    • External log viewer
    • Supports printing of the log
    • Optimized for Windows XP
    • Exports log to HTML

    AVG Internet Security 2011-X86-X64

    AVG Internet Security 2011-X86-X64

    AVG Internet Security 2011 10.0.1391 Build 3789 Multilingual (x86/x64) | 179/201 Mb


    Complete protection for everything you do! With AVG Internet Security, our most advanced protection, you get a worry-free online experience every time. This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide.

    AVG Internet Security's multiple layers of protection mean you don't have to worry about identity theft, spam or viruses. And it'll even prevent you from accidentally visiting harmful sites. It's faster, smarter security that won't slow your computer down. With AVG Internet Security you also have access for the first time to AVG Identity Theft Recovery Unit that will help you get your life back in order if you ever become a victim of identity theft – online or offline. Unique Internet security thanks to new technology - Only AVG gives you real-time protection against malicious websites thanks to our new LinkScanner technology.

    • Safely bank and shop online without fear of identity theft thanks to AVG's new Identity Protection technology
    • Surf, and search with confidence, with LinkScanner® checking web pages at the only time that matters - right before you click that link

    Password Generator Professional 5.54

    Password Generator Professional 5.54

    Password Generator Professional 5.54 Enterprise Edition | 3.4 MB


    Password Generator Professional can generate millions of unique passwords in a matter of seconds. It will ensure the passwords are completely random, and cannot be guessed by hackers.

    You will be able to customize the format of the passwords in virtually any way you want, and you have a wide range of export possibilities.

    Features Highlight
    Quickly Generate Secure Passwords
    Set the length and number of passwords you need, and press "Generate" to get going.
    Use Flexible Masking Patterns
    Use masked mode to fine tune your results.
    Enjoy Word List and Dictionary Support
    Grab words from files, modify and use them as you please.
    Make Easy To Remember Passwords
    Make pronounceable passwords that are easy to remember.
    Make Secure, Random Numbers
    The generation algorithm creates high quality random numbers using a twisted generalized shift feedback register.
    Make Command-line Calls to Password Generator
    Commandline support allows integration with your own system.
    Run user-created scripts
    You can use VBScript scripts to modify the generated passwords as you like.
    Multiple Output Options
    Export to text, XML, HTML, CSV and Microsoft Excel, print to paper and copy to clipboard.
    Create Complete Login Details
    Create user names or grab them from files and assign passwords.
    Save to Multiple Files
    You can generate long password lists into separate files, making them easier to manage.

    Award Keylogger 2.10-x86

    Award Keylogger 2.10-x86
     
    Award Keylogger 2.10 x86 | 4.3 MB


    Award Keylogger allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Award Keylogger makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones.


    Main Features:
    • New! Run keylogger as a Windows service
    • Easy-to-use, even for beginners
    • Absolutely invisible/stealth mode
    • Logs accounts and passwords typed in the every application
    • Logs message typed in all instant messengers
    • Visual surveillance, support screenshots view
    • Slide show for screenshots
    • Captures the contents behind the asterisks
    • Captures mouse clicks
    • Logs websites visited
    • Captures AOL/AIM/Yahoo/ICQ chats
    • Keyword Detection and Notification
    • Records contents of password protected web pages, including Web Mail messages
    • Logs Windows Clipboard
    • Sends log by e-mail
    • Uploads ALL logs into the separate folders by FTP
    • Invisible for the firewall program
    • Invisible in the Windows startup list
    • Monitors all users of the PC
    • User friendly HTML file format for emailed logs
    • Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List
    • Records Windows 9.x/Me/2000/XP/VISTA logon passwords
    • Intercepts DOS-box and Java-chat keystrokes
    • Supports international keyboards
    • External log viewer
    • Supports printing of the log
    • Optimized for Windows XP
    • Exports log to HTML

    Lock Folder XP 3.9

    Lock Folder XP 3.9

    Lock Folder XP 3.9 | 3.03 MB


    Lock Folder XP is a new security tool that lets you lock your files, folders, and drives with your personal password. Locking folders, files, and drives also effectively protects you from malicious programs, such as viruses, worms, and trojans. Locking files, folders, and drives is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private, and confidential information. And because locking your files, folders, or drives makes them invisible, they cannot be deleted, damaged, or harmed in any other way. We also advise you to get Lock Folder XP if you have a laptop and travel frequently. After all, if your notebook gets lost or stolen, you do not want strangers to see your financial data, or credit card or Social Security numbers.

    Perfect Uninstaller 6.3.3.9 Datecode 2011

    Perfect Uninstaller 6.3.3.9 Datecode 2011



    Perfect Uninstaller 6.3.3.9 Datecode 2011 | 3.3 MB

    Perfect Uninstaller is a better and easier way for you to completely uninstall any unneeded application that standard Windows Add/Remove Program can't remove. Have you ever been bothered with software applications that can't be uninstalled by the standard Windows Add/Remove Programs? You are the right place!

    What Perfect Uninstaller can do for you ?
    • Uninstall / remove any unwanted application in your PC
    • Forcibly remove unwanted programs that cannot be uninstalled completely from "Windows Add or Remove Programs" control panel applet.
    • Clear registry entries and drivers that the applications left over
    • Show detailed information of a certain application installed in your computer
    • Completely remove Adobe Reader, McAfee, Aol Toolbar, AVG Anti-Virus, Norton 2006/2007 and much more difficult to completely uninstall applications! Start your free trial now!

    With Perfect Uninstaller, you can uninstall any unwanted applications in your system easier and faster. The standard Add /Remove Program can not often completely uninstall all applications and broken registry keys.Unlike your own PC Add/Remove Program , Perfect Uninstall can not only uninstall the applications , but also clean the registry files left over themselves. It will protect your PC from corrupted registry errors , improving your PC performance and speed !

    Extreme GPU Bruteforcer 1.9

    Extreme GPU Bruteforcer 1.9

    Extreme GPU Bruteforcer 1.9 | 22.3 MB


    Extreme GPU Bruteforcer is a professional solution for the recovery of passwords from hashes using GPU. The software supports hashes of the following types: MySQL, MySQL5, DES(Unix), MD4, MD5, MD5(Unix), MD5(APR), MD5(phpBB3), MD5(Wordpress), LM, NTLM, SHA-1 and many others. On modern graphics cards from NVIDIA that support the CUDA technology, the software demonstrates outstanding operation speed. For example, an average attack speed on NVIDIA GTS250 is 420 million passwords per second for MD5 hashes, 700 million passwords per second for MySQL hashes and 550 million passwords per second for NTLM hashes. The solution implements several unique attacks, including mask and dictionary attacks, which allow recovering even the strongest passwords incredibly fast. Utilizing the power of multiple graphics cards running simultaneously (supports up to 32 GPU), the software allows reaching incredible search speeds of billions of passwords per second!

    The number of salted hashes the software can handle simultaneously: 800; the number of unsalted hashes: unlimited.

    ZoneAlarm Pro 10.0.243.000

    ZoneAlarm Pro 10.0.243.000

    ZoneAlarm Pro 10.0.243.000 | 55.0 MB


    ZoneAlarm Pro - a well-known firewall designed to protect your computer from threats of all kinds at work on the Internet and local networks. The program provides excellent protection on the basis of the firewall, including the possibility of completely disconnect all network and Internet activity. Firewall has flexible configuration rules, which can be configured individually or use the preset rules. Filter Application (Access List), allows you to set access rights to the network for each program. There is a possibility of instantaneous automatic or manual blocking of access applications on the Internet. The program monitors incoming and outgoing mail, and can rename potentially dangerous attachments and put them in quarantine. Number of outgoing mail can be restricted to prevent mass mailings when infecting a computer, e-mail worms.