Download the latest version of software you need for free

Advertising


  • Web
  • Download Free PC Software
  • Showing posts with label Security. Show all posts
    Showing posts with label Security. Show all posts

    WTM Copy Protection 2.51


    WTM Copy Protection 2.51



    WTM Copy Protection 2.51 | 2.11 MB

    With the WTM software, you will find answers to all your problems related to CD copy protection, video CD protection, data CD protection, and music CD protection amongst others, to make your work easy to access and at the same time, well protected against copying and duplication.

    Copy protection is vital for any organization and individual who wants to preserve their investment. In protecting this, USB Flash Drive Copy Protection plays a significant and efficient role. USB Flash Drive Copy Protection includes the ability to copy and crypt all types of data namely pdf, doc, xls, txt, pps, psd, xml, exe, scr and so on, thus giving enhanced and efficient digital rights management for users. This is done using the USB hardware key of USB flash drives. USB Flash Drive Copy Protection is an efficient tool that balances ease of deployment, ease of customer use and adequate security.

    When we say copy protection, we mean that there will be no illegal and fraudulent copying of the data contained in the CD. Although there are copyright laws in existence today, this is a much-needed requirement. CD duplication and piracy is a rampant business and you are well within your rights to ask for video protection, CD copy protection, data protection, copy protection for important and sensitive data. It goes without saying that unauthorized copying can cause untold harm to the business in question or even to your personal information.

    DVD Protection with the File Protection Tool is an easy-to-use tool that applies the concept to the file system of the DVD and thereby hides or embeds a file by encrypting the same. This results in giving an effective and efficient protection to the DVD. This efficient tool helps you keep the privacy of sensitive files by encrypting them using powerful encryption technology. This powerful professional DVD Protection with the File Protection Tool thus gives absolute enhanced protection to any digital information present on your DVDs.

    WHY WTM?
    Why not WTM? WTM CD Protect will give you the required protection against illegal copies. You will have copy protection for you music, videos, and most importantly, for your sensitive and confidential business data. Here you get a protection system that is strong, easy to use and very effective against tampering of any kind.

    1Password 3.8.2


    1Password 3.8.2




    1Password 3.8.2 | Mac Os X | 17 MB

    1Password is a password manager that uniquely brings you both security and convenience. It is the only program that provides anti-phishing protection and goes beyond password management by adding web form filling and automatic strong password generation. All your confidential information, including passwords, identities, and credit cards, is kept secure in one secure place using a highly encrypted keychain.

    1Password fully supports most web browsers, including Safari, Camino, OmniWeb, DEVONagent, Firefox, Flock, Fluid, and NetNewsWire. All browser extensions share the data stored in the keychain which means you never need to manually copy your passwords between browsers or from the password manager to a browser ever again!

    1Password has received numerous awards, including 4.5 mice from Macworld magazine, MacLife Editors pick, and was the Pick of Week on MacBreak Weekly by both Leo Laporte and Merlin Mann.
    1Password also has a companion iPhone/iPod touch application available in iTunes App Store.

    Operating Systems
    Mac Os X 10.7 (Lion)
    Mac OS X 10.6 (Snow Leopard)

    Password Vault Manager v0.9.1.0


    Password Vault Manager v0.9.1.0



    Password Vault Manager v0.9.1.0 | 3.49 Mb

    Password Vault Manager is a product used to manage all your passwords and your sensitive information. Keep your credit card numbers, your bank accounts, your serial numbers or your alarm codes in an organized and secured database. Share with your team members only what they need to know and keep your data safe.

    Save your credentials and passwords in a database.
    Share some or all of your sensitive information within your business safely.
    Monitor user activities with the database logs.
    Faster and more secure solution.

    Anti-Trojan Elite 5.5.1


    Anti-Trojan Elite 5.5.1



    Anti-Trojan Elite 5.5.1 | 6.9 Mb

    Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory.Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time before it starts. The ATE can detect more than 22000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time.

    Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all processes; The registry repair utility can been used to repair registry altered by malware; The registry monitor utility can been used to repair any change of important registry keys and values with real time.

    THE REASONS CHOOSE ANTI TROJAN ELITE
    - Real-time malware firewall, protecting user's computer in real-time.
    - Detecting and cleaning binded malware, doesn't hurt normal file and clean the malware.
    - Detecting and cleaning no process malware, some malware don't have a EXE file, they are only some DLL files and running as some threads in other process, ATE can detect and clean this type of malware even it's running.
    - Free tools. View the information of Tcp/Ip states and processes informations.

    Symantec PGP Command Line 10.2


    Symantec PGP Command Line 10.2



    Symantec PGP Command Line 10.2 | 12.33 Mb

    PGP® Command Line now from Symantec enables organizations to quickly and easily integrate encryption into batch processes, scripts and applications to ensure the security of corporate data at rest or in transit. Whether your challenge is protecting credit card information, financial transactions, payroll, medical records, or other confidential information, PGP Command Line’s scriptable encryption is a key part of an organization’s data protection tool kit.

    Key Features
    - Command line based scriptable encryption which operates on 35 different platforms from laptops to servers to mainframes.
    - Integrates with most existing scripting tools such as Shell Scripts, Perl, and Windows batch files.
    - Over 300 encryption operations available; encrypt, decrypt, wipe, self-decrypting archive creation and more.
    - Can allocate and manage keys as well as interact with keyservers to support uploading and downloading of keys from keyservers plus searching for keys over LDAP.

    Key Benefits
    - Easily add encryption to existing operational scripts and applications such as backup procedures, end-to-end file transfers and lock-box based data access.
    - Automate labor and time intensive encryption activities such as file server encryption and ftp file transfers.
    - Simplify true end-to-end file transfer protection. Easily protect files not only in transit but also at rest on the sending and receiving file servers.

    PGP Desktop And Professional 10.2


    PGP Desktop And Professional 10.2




    PGP Desktop/Professional 10.2 Multilingual (Windows/MacOSX) | 72.6/26.2 MB

    PGP Desktop Professional provides a comprehensive set of encryption applications to protect sensitive data in email, instant messages, and on disk or removable media. This data is at risk of compromise: email and instant messages can be intercepted or misdirected, laptops are easily lost, and PCs are often targets for theft. PGP Desktop Professional secures confidential information wherever it exists, protecting the business and helping meet partner and regulatory mandates for information security and privacy.

    Disk, Volume, & File Protection 
    PGP Desktop Professional includes PGP Whole Disk Encryption to lock down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files. Pre-boot authentication is enforced and the always-on encryption is transparent to the user, automatically protecting data. Volume and file encryption provides an added layer of security to protect sensitive data while the system is powered on.

    PGP-Protected Messaging
    PGP Desktop Professional provides email and instant messaging (IM) encryption between AOL Instant Messenger (AIM) users with PGP Desktop to enable confidential communications. Policy-based enforcement simplifies security, providing transparent operation with no additional user requirements.

    Flexible Deployment Options
    PGP Desktop Professional can be rapidly deployed in standalone mode in smaller companies or to critical users within a larger enterprise. As security requirements evolve, organizations can easily migrate existing users to a centralized, managed architecture without changes to user behavior or credentials and add new encryption functionality to existing deployments, as needed.

    CamBlocker 1.0


    CamBlocker 1.0


    CamBlocker 1.0 | 0.9 Mb

    Is someone spying on you through your web camera? CamBlocker enables you to block all your web cameras, when you don't need them, and protect yourself from being spied on. You can also password protect CamBlocker and prevent your teenager, or anybody else, from using a web camera. The program stays out of way in system tray area, with minimal use of system resource.

    Clean Disk Security 7.94


    Clean Disk Security 7.94



    Clean Disk Security 7.94 | 1.04 MB

    A secure file deletion and comprehensive clean-up for tightest security. This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. Clean Disk Security will help you keep your disks clean and with more free space because it overwrites the spaces ocupied on the HDD by the deleted informations.

    The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the Windows swap file, and can optionally clean unneeded temporary files from your hard disk, such as your Internet browser cache, files in your system's Recycle Bin, and can clear the "recent files" list.

    Comes with a direct disk viewer for discovering all that is hidden on your hard disk.

    Outpost Security Suite Pro 7.5.1-X86-X64

    Outpost Security Suite Pro 7.5.1-X86-X64





    Outpost Security Suite Pro 7.5.1 (3791.596.1681) x86/x64 | 92/102 Mb

    Agnitum Outpost Security Suite Pro provides the first line of defense against malicious software by proactively controlling how programs behave and interact on a PC and preventing security breaches. The Host Protection module proactively monitors for and blocks sophisticated hacking techniques used to compromise or steal data. By analyzing threats and displaying actionable alerts, Host Protection blocks zero-day attacks and other unauthorized activities, providing advanced protection against botnets, rootkits and inadvertent data disclosure. This latest version extends the range of monitored events and operations for even greater and more customizable protection. Outpost excels in all currently-known leaktests, with additional focus on keylogger-like activities.

    Both anti-virus and anti-spyware capabilities are provided through the universal Anti-Malware module, which ensures that your computer is kept clean of any malicious program that might infect it while you’re surfing the web. The on-access monitor constantly watches for and instantly disinfects, quarantines or removes any malware objects found in key areas of the PC, while the on-demand scanner lets you scan for and remove threats on hard disks, network folders, DVDs, or external storage devices. Email attachments are checked in real time as they leave or arrive, and you can move any suspicious file to the quarantine area for later review. Additional protection now prevents known rootkits and other sophisticated malware from loading and embedding themselves on your PC.

    Award Keylogger 2.16


    Award Keylogger 2.16


    Award Keylogger 2.16 (x86) | 3.5 MB

    Award Keylogger allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Award Keylogger makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones.

    Main Features:
    • New! Run keylogger as a Windows service
    • Easy-to-use, even for beginners
    • Absolutely invisible/stealth mode
    • Logs accounts and passwords typed in the every application
    • Logs message typed in all instant messengers
    • Visual surveillance, support screenshots view
    • Slide show for screenshots
    • Captures the contents behind the asterisks
    • Captures mouse clicks
    • Logs websites visited
    • Captures AOL/AIM/Yahoo/ICQ chats
    • Keyword Detection and Notification
    • Records contents of password protected web pages, including Web Mail messages
    • Logs Windows Clipboard
    • Sends log by e-mail
    • Uploads ALL logs into the separate folders by FTP
    • Invisible for the firewall program
    • Invisible in the Windows startup list
    • Monitors all users of the PC
    • User friendly HTML file format for emailed logs
    • Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List
    • Records Windows 9.x/Me/2000/XP/VISTA logon passwords
    • Intercepts DOS-box and Java-chat keystrokes
    • Supports international keyboards
    • External log viewer
    • Supports printing of the log
    • Optimized for Windows XP
    • Exports log to HTML

    Note: patch to file wak.exe

    OS : Win XP/2000/Vista/Win 7
    Language : English

    Dead Mans Switch 1.0.0


    Dead Mans Switch 1.0.0


    Dead Mans Switch 1.0.0 | 5.2 MB

    Dead Man's Switch (DMS) offers strong protection for your secrets. DMS can be configured to either securely delete or encrypt a nominated folder should an unauthorized person ever access your computer. This allows you to securely protect any file from unauthorized access. If you have a password list, credit card details, confidential correspondence, private photos or videos, a secret diary or any other computer file that you would like to keep private then DMS can protect it. DMS gives you the means to protect your files from prying eyes. Give yourself the peace of mind that comes from knowing that your secrets are truly secure. Get your copy of DMS today!

    Web Vulnerability Scanner V7.0

    Web Vulnerability Scanner V7.0





    Web Vulnerability Scanner  7.0 Build 20110714 | 20.1 MB

    Audit your website security with Acunetix Web Vulnerability Scanner. As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.

    Firewalls, SSL and locked-down servers are futile against web application hacking!

    Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.

    Acunetix - a world-wide leader in web application security

    Acunetix has pioneered the web application security scanning technology: Its engineers have focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection. Acunetix Web Vulnerability Scanner includes many innovative features:

    * An automatic Javascript analyzer allowing for security testing of Ajax and Web 2.0 applications
    * Industries' most advanced and in-depth SQL injection and Cross site scripting testing
    * Visual macro recorder makes testing web forms and password protected areas easy
    * Extensive reporting facilities including VISA PCI compliance reports
    * Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
    * Intelligent crawler detects web server type and application language
    * Acunetix crawls and analyzes websites including flash content, SOAP and AJAX

    Which Vulnerabilities does Acunetix WVS Check for?

    Data Guardian 2.0.9


    Data Guardian 2.0.9




    Data Guardian 2.0.9 | Mac Os X | 12.4 MB

    Security and privacy are two of the most important issues in today's world; leaving passwords on sticky notes around your computer simply will not cut it anymore. Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is. Create multiple databases in Data Guardian for a variety of purposes such as an address book, customer database, Christmas shopping list, journal, password manager, or even notepad.
    Easily create collections to store records, and even apply custom color labels and icons! Change the view options for each collection to see the information you want, and add your own custom data fields. Do not be stuck with a program which forces you to input your information into predefined fields. Enter the data you need to, not what you are forced to.
    Aside from Data Guardian's easy to use Keychain integration* to autofill passwords on web sites, it also offers a variety of other tools and features to enhance each record. Dial phone numbers through your modem with a single click, create new e-mail messages, generate secure passwords (based on an algorithm of your choosing), and even synchronize two databases.
    Data Guardian is the ultimate database solution, and not only if security is a priority. Allow it to become your computerized Swiss Army Knife in an age of digital chaos.

    Features
    Create unlimited records, collections, and fields!
    Insert pictures into records
    Dial phone numbers directly from records
    Import virtually any flat-text file and map it to custom fields
    Export your database to a flat-text file for use in other programs
    Synchronize databases
    Automatically login to servers
    Synchronize Data Guardian with Safari's Keychain to aid in auto-fill
    QuickBrowser — access to Data Guardian from within any application
    Up to 448-bit Blowfish encryption
    Record application activity to a log
    Auto-clear clipboard after a specified interval
    Dynamically generate passwords based on a user specified algorithm
    Automatically saves databases
    Can discard changes and quit Data Guardian if left idle for a period of time
    Print a sheets of record information in a variety of formats
    Apply changes to a selection of records at the same time
    Powerful RegEx search function
    Cross platform compatible database format between the Mac and Windows versions
    Auto-quit if idle for a specified time period

    Real Clear History 3.2.6.6


    Real Clear History 3.2.6.6



    Real Clear History 3.2.6.6 | 1.15 Mb

    Remove all tracks of your web surfing and computer activities completely! Your computer tracks all your activities while you are working on the computer or surfing the Internet. So anyone who can access your computer is able to obtain your web surfing history, what videos you've seen, what files you've downloaded, what documents and files you've just opened and more. Easily and completely clear the stored information so the next person using your computer will never know your computer activities.

    Use Real Clear History to completely remove all traces of numbers of programs: wipe your browsing history, cache (temporary files), cookies, and stored passwords; empty your recycle bin, clear your clipboard content, clean your history of run programs, recently opened files, and much more. It supports Internet Explorer, Firefox, Windows Media Player, Yahoo, MSN, Google, etc.

    Key Features
    - Remove all traces of web surfing and computer use
    - Wipe stored web browser data
    - Clear all history with a simple click of a button
    - Many windows tracks cleaning tools enabled
    - Perfect with Real Hide IP

    Zemana AntiLogger 1.9.2.521


    Zemana AntiLogger 1.9.2.521



    Zemana AntiLogger 1.9.2.521 Multilanguage | 8.82 Mb

    Anti-Logger, developed to deal with different kinds of malware threats, protects your banking passwords, private emails & chat conversations from spying proactively without needing a signature-based algorithm and includes powerful, anti-action methods.AntiLogger prevents all known forms of malwares which intend to carry out information theft.

    As AntiLogger uses a proactive and a unique way to detect potentially harmful applications which have not already been recognized or identified by any anti-virus programs consequently, it protects your 'Information Security' from a range of threats.Modules: Anti-SSL Logger, Anti-WebCam Logger and Anti-ClipBoard Logger are the first security solutions developed in the world. Also, you will realize that these modules have the best features if compared to similar applications.Anti-KeyLogger Module provides a new powerful protection against keyloggers which have not been even caught by known, the most popular security softwares in the world.

    Here are some key features of "Zemana AntiLogger":
    · Anti-SSL Logger Module that provides protection against SSL Logger
    · Anti-WebCam Logger that provides protection against WebCam Logger
    · Anti-Key Logger Module that provides protection against Key Logger
    · Anti-Screen Logger that provides protection against Screen Logger
    · Anti-Clipboard Logger that provides protection against ClipBoard Logger
    · System Defence Module that protects your system

    GiliSoft Private Disk 2.2


    GiliSoft Private Disk 2.2


    GiliSoft Private Disk 2.2 | 3.67 MB

    GiliSoft Private Disk is a software which will make transparent encryption using virtual hard drives.GiliSoft Private Disk uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. GiliSoft Private Disk mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by kernal driver, encrypted, and written to the volume file.Attempts to read from this volume are also intercepted, and the relevant data is read by kernal driver from the volume file, decrypted, and presented to the application trying to read the data.

    Dismounting the "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared.When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase.

    Features and Benefits:

    • All data is stored encrypted within the "Private Disk" container.

    • Access to your files on virtual volume on the fly.

    • Mapping any free drive letter like G:, F:, K: for virtual volume.

    • Requires password authentication before the files become accessible.

    • Works with all Windows application - even DOS applications.

    • Really Fast.

    • Looks like normal hard drive.

    • Several volumes may be mounted at the same time.

    • Encrypted volumes can be backed up to tape, CD, etc.

    • No need to encrypt/decrypt files. The encryption is transparent.

    • Support for USB Flash Drives.
    You can make a portable Private Disk on USB drive.

    • The "Private Disk" container can be protected.
    No one can delete the Private Disk without password.

    •System Compatible
    Windows 2000/2003/XP/Vista/Windows 7 (32&64).

    Child Control 2011 11.260.0.0


    Child Control 2011 11.260.0.0


    Child Control 2011 11.260.0.0 | 19.0 MB

    Computers are the place for children. This is the place where they can sharpen their agility as well as their abilities. They can learn and make new friends. What’s more, the Internet provides information for homework assignments. So far, so good. But they also need to be protected from the computer—for one thing, so that they don’t lose their sense of time and forget to go out and play with their friends once in a while, and for another, because of the dangers lurking on the Web.

    That’s why responsible parents everywhere install Child Control on every computer that their children use.New! Internet Remote Control: Starting with Child Control 2009 you can modify the most important settings or view session logs directly on the Internet. No matter where you are. No matter which browser you are using. This feature is part of the Online Functions.

    Just a few things Child Control lets you do:
    *NEW: Blocking of file sharing programs and sites
    *NEW: 1,000,000 undesirable sites can now be selected for restriction
    *NEW: Adult-content filtering provided by German government authorities
    *NEW: Email reports of on- and off-times and daily statistics
    *NEW: additional configuration options
    *Works with all versions of Windows from 95 to Vista
    *Limit time on the computer for each day of the week
    *Limit use of the Internet for the day and the week
    *Set PC off-limits times (e.g. after 11 p.m.)
    *Set Internet off-limits times (e.g. after 11 p.m.)
    *Easily extend time with passwords or TAN’s
    Define “unwelcome” web content using keywords
    *Set time limits for categories of websites, such as videos and online games
    *Set specific time limits for each computer application
    *Grant unlimited time for specific applications, such as learning tools
    *Log all computer activity to let you later review each user’s activities
    *Block modifications to major Windows settings
    *Protect your data by blocking access to specific folders
    *Limit children’s access to specific programs
    *Disable “backdoor” access to programs or functions
    *Extend all time limits during vacation time—one click does it all
    *Set up a central database for multiple users (schools, institutions, etc.)
    *for computers connected by modem, networks, DSL, routers, etc.
    *Easily import or export settings or blacklists
    *Send log files to any email address

    OS : Win XP/2000/Vista/Win 7
    Language : English

    1Password 3.8.0


    1Password 3.8.0



    1Password 3.8.0 | Mac Os X | 17.6 MB

    1Password is a password manager that uniquely brings you both security and convenience. It is the only program that provides anti-phishing protection and goes beyond password management by adding web form filling and automatic strong password generation. All your confidential information, including passwords, identities, and credit cards, is kept secure in one secure place using a highly encrypted keychain.

    1Password fully supports most web browsers, including Safari, Camino, OmniWeb, DEVONagent, Firefox, Flock, Fluid, and NetNewsWire. All browser extensions share the data stored in the keychain which means you never need to manually copy your passwords between browsers or from the password manager to a browser ever again!

    1Password has received numerous awards, including 4.5 mice from Macworld magazine, MacLife Editors pick, and was the Pick of Week on MacBreak Weekly by both Leo Laporte and Merlin Mann.
    1Password also has a companion iPhone/iPod touch application available in iTunes App Store.

    Operating Systems
    Mac Os X 10.7 (Lion)
    Mac OS X 10.6 (Snow Leopard)

    Data Guardian 2.0.8


    Data Guardian 2.0.8



    Data Guardian 2.0.8 | Mac Os X | 12 MB

    Security and privacy are two of the most important issues in today's world; leaving passwords on sticky notes around your computer simply will not cut it anymore. Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is. Create multiple databases in Data Guardian for a variety of purposes such as an address book, customer database, Christmas shopping list, journal, password manager, or even notepad.
    Easily create collections to store records, and even apply custom color labels and icons! Change the view options for each collection to see the information you want, and add your own custom data fields. Do not be stuck with a program which forces you to input your information into predefined fields. Enter the data you need to, not what you are forced to.
    Aside from Data Guardian's easy to use Keychain integration* to autofill passwords on web sites, it also offers a variety of other tools and features to enhance each record. Dial phone numbers through your modem with a single click, create new e-mail messages, generate secure passwords (based on an algorithm of your choosing), and even synchronize two databases.
    Data Guardian is the ultimate database solution, and not only if security is a priority. Allow it to become your computerized Swiss Army Knife in an age of digital chaos.

    Features
    Create unlimited records, collections, and fields!
    Insert pictures into records
    Dial phone numbers directly from records
    Import virtually any flat-text file and map it to custom fields
    Export your database to a flat-text file for use in other programs
    Synchronize databases
    Automatically login to servers
    Synchronize Data Guardian with Safari's Keychain to aid in auto-fill
    QuickBrowser — access to Data Guardian from within any application
    Up to 448-bit Blowfish encryption
    Record application activity to a log
    Auto-clear clipboard after a specified interval
    Dynamically generate passwords based on a user specified algorithm
    Automatically saves databases
    Can discard changes and quit Data Guardian if left idle for a period of time
    Print a sheets of record information in a variety of formats
    Apply changes to a selection of records at the same time
    Powerful RegEx search function
    Cross platform compatible database format between the Mac and Windows versions
    Auto-quit if idle for a specified time period

    Mac OS X 10.5 or later

    Outpost Pro 7.5.3720.574.1668 Final

    Outpost Pro 7.5.3720.574.1668 Final


    Outpost Security Suite Pro 7.5.3720.574.1668 Final (x86/x64) | 91.72/101.67 Mb

    Agnitum Outpost Security Suite Pro provides the first line of defense against malicious software by proactively controlling how programs behave and interact on a PC and preventing security breaches. The Host Protection module proactively monitors for and blocks sophisticated hacking techniques used to compromise or steal data. By analyzing threats and displaying actionable alerts, Host Protection blocks zero-day attacks and other unauthorized activities, providing advanced protection against botnets, rootkits and inadvertent data disclosure. This latest version extends the range of monitored events and operations for even greater and more customizable protection. Outpost excels in all currently-known leaktests, with additional focus on keylogger-like activities.

    Both anti-virus and anti-spyware capabilities are provided through the universal Anti-Malware module, which ensures that your computer is kept clean of any malicious program that might infect it while you’re surfing the web. The on-access monitor constantly watches for and instantly disinfects, quarantines or removes any malware objects found in key areas of the PC, while the on-demand scanner lets you scan for and remove threats on hard disks, network folders, DVDs, or external storage devices. Email attachments are checked in real time as they leave or arrive, and you can move any suspicious file to the quarantine area for later review. Additional protection now prevents known rootkits and other sophisticated malware from loading and embedding themselves on your PC.

    Features:
    • Preemptive threat protection
    • Self-protection
    • 360-degree malware defense
    • Scheduled scans and exclusions
    • Connection security
    • Application access control
    • Comprehensive coverage
    • Intrusion protection
    • Protection from spam
    • Unsafe web site access restriction
    • IP Blocklist keeps surfing clean
    • Safe repository for personal data
    • Ad-free, anonymous surfing
    • Network activity monitoring
    • Password-protection, multiple configuration profiles
    • Better manageable events logs
    • Driver certification and latest Windows platforms compatibility
    • IPv6 support
    • Adaptive firewall rules
    • Entertainment mode for uninterrupted gameplay and video viewing
    • Auto-learning mode
    • Automatic configuration
    • Improvenet delivers more ready-made configurations
    • SmartAdvisor - instant, context-sensitive help
    • Hands-free updates
    • Faster, more intelligent scans