Security

General Security (Security Tools)

 

Software Spotlight!

Message To Developers: We are looking for one developer for the Software Spotlight position in this category. If you feel that you have one of the better products and are interested, please contact barter[at]thebusinessjunction.com If you would like to see what a Software Spotlight looks like please click here!
 
Note To Readers: Below you find links to what our staff considers to be the best software available in this category. Efforts have been made to assure a good selection while eliminating software that we do not feel is worthy of consideration. If you do not see it listed here you probably should not consider purchasing the product. If our readers or a developer feels that a particular piece of software should be listed please contact us with specifics and we will make every effort to give it our attention and, if worthy, we will include it in our next update.
 

Acunetix Web Vulnerability Scanner 2.0

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Hackers are concentrating their efforts on web-based applications - 75% of cyber attacks are done at the web application level, a Gartner Group study has revealed: Web application security has become a priority in any organization. The reasons for this are clear: Web applications control valuable data and are much more difficult to secure. Firewalls and SSL provide no protection against web application hacking, simply because access to the website has to be made publicly available! Web applications are posted on the Internet and can be attacked 24 hours a day, 7 days a week and often have direct access to backend data such as customer databases. Besides, web applications are often tailor-made, usually meaning they have been tested less than off-the-shelf software and more susceptible to attack. 

The need for automated web application security scanning
Unfortunately manually auditing a web application to prevent such attacks is complex and time-consuming. With a web application scanner, the process can be largely automated. Acunetix Web Vulnerability Scanner is an automated web application security testing tool that crawls your entire website and attacks it so as to identify potential weaknesses – before hackers do!

Acunetix Web Vulnerability Scanner first identifies web servers from a particular IP or IP range. After that, it crawls the whole site, gathering information about every file it finds, and displaying the entire website structure. After this discovery stage, it performs an automatic audit for common security issues.

Automatically audited vulnerabilities
Acunetix Web Vulnerability Scanner automatically detects the following vulnerabilities in web applications:

- Cross site scripting
- SQL injection
- CRLF injection
- Code execution
- Directory traversal
- File inclusion
- Script source code disclosure
- Discovers files/directories that may contain sensitive information
- Looks for common files (such as logs, application traces, CVS web repositories), back-up files or directories
- Finds directory listings
- Discovers directories with weak permissions
- Discovers available web server technologies (such as WebDAV, FrontPage, etc.)
- Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
- Inspects the HTTP version banners and looks for vulnerable products
- Tests password strength of applications.
spacer

Read More...>>




AGuardDog Suite

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


This security tool offers several tools to help keep your computer safe, includes everything you need to protect your home or small office computer. 
  • Privacy Protection utility, which cleans up the work traces and cookies. 
  • Spyware Remover, which detect all the spywares and removes it from your computer. 
  • Personal Firewall security system to protect your computers from unauthorised access over the LAN and/or Internet.
  • Hidden Surfing tool that helps you browse without your IP being known to the site you visit.
  • IE plug-in analyzer, which blocks all browser helper objects which can be adware or spywares.
  • Password Manager, an Internet Explorer companion application that makes it very easy for you to automatically fill in any Web-based forms that would normally require you to repeatedly type in your details. 
  • It Offers Much More! Hassle Free Automatic Updates and No Renewal Fee.
spacer

Read More...>>




AlertMobile Pro™ 4.0.1

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


AlertMobile Pro™ is special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to a mobile device, receives and executes response commands. AlertMobile Pro™ can be integrated with an alarm system for physical protection of rooms, safes etc. 

AlertMobile Pro™ has the following features: 

- Recording a user logon name, date, time and a computer name
- Monitoring the active tasks list
- Handling the critical programs list
- Sending SMS alerts to the security administrator's mobile phone
- Receiving control commands from the security administrator's mobile phone
- Protection from unauthorized external access
- Protection from unauthorized physical access

With control commands you can remotely administer your computer via mobile phone. Just send the SMS from your mobile and one of the following actions can be performed: 

  • Displaying messages sent from a mobile phone 
  • Disabling a user's account and forcing system restart 
  • Termination of the active process 
  • Termination of all active processes from the monitored processes list 
  • Locking the active process 
  • Locking all active processes from the monitored processes list 
  • Dismounting all protected drives 
  • Tracing the route of a stolen or lost laptop or desktop PC 
  • Sending to a mobile phone the confirmation of command execution status 
  • AlertMobile™ can be used by security administrators to control the corporate security policy, by parents to monitoring their children computer activity, or by anyone else who wants to ensure that nobody uses his or her computer without permission.
spacer

Read More...>>




EventTracker™ v4.6

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


EventTracker™ is a centralized real-time event management solution that includes a central Manager console, remotely deployable Agents and an optional Remote Viewer.

The EventTracker™ Manager includes the Console application, a Manager Service to receive, analyze and process the events that are sent by the Agents, a Client Manager application to remotely deploy and manage the Agents, a Reports Console application and a backend ODBC database. 

The EventTracker™ Agents reside on each monitored Windows systems; they gather event data from the event log and performance and service data from the operating system and reports it to the EventTracker™ Manager(s). 

The optional Remote Viewer is a View only console application designed for use by roving administrators. It can be installed on any Windows system from where the administrator would like to view the event activity in his enterprise. 
spacer

Read More...>>




GhostSurf 2005 Platinum

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


The Internet can be a dangerous place. Web sites and hackers are trying to steal your identity. Spyware is installed on your computer without your knowledge, and is reporting personal information about you. Your screen is constantly bombarded by pop-up, banner, and Flash advertisements. Everything you do and download online can be watched.

Antivirus and firewall programs don't protect you from these threats. GhostSurf Platinum is the solution.

GhostSurf Platinum provides a secure, anonymous connection and spyware defense needed for a clean and productive Internet experience.

Features:
  • Surf Anonymously 
  • Detect and Remove Spyware 
  • Prevent Identity Theft 
  • Block Ads and Popups 
  • Encrypt Your Data 
  • Erase Your Tracks 
spacer

Read More...>>




Host Security Personal 1.40

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Host Security Personal(HSP) allows you to view and edit all lists used for web site and IP addresses blocking. It gives you complete control and visibility of all block and permitted lists.

HSP protects you from hacker attack when you surfing the Internet. It can block all unrequested network connections to your computer, or only allow some IP to access your computer and leave all others being blocked. You can also block some specified IP and let the other to access your computer. 

HSP can block online chatting with MSN Messenger, Yahoo! Messenger, ICQ, and AOL Instant Messenger. 

HSP can password-protects files and folders. It keeps files and folders secret and safe by hiding and locking them. HSP can also make files and folders read-only so malicious programs like computer viruses and worms can't modify or delete both your important data and system files. Without password, nobody is able to delete, rename, move, modify or use the protected files and folders. 

HSP can restrict accesses to local hard disks, CD-ROM drives, floppy drives, and removable disk drives so without your permission unauthorized people can't copy files from your computer, install programs in your computer, or play games with the CD-ROM of your computer.
spacer

Read More...>>




PC Activity Monitor Pro

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


PC Activity Monitor Pro™ is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. 

The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Pro™ is completely hidden from everyone except you. Only you can launch or delete PC Activity Monitor Pro™. This lets you secretly monitor anything viewed on your computer while you are away. This process goes on undetected and logs a considerable amount of data. Simply install the agent to the PCs and within seconds, you'll be monitoring your networked computers. Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro™ is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition. 

Even when parents are outside of the home they can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial espionage. For local Intranet networks a system administrator can monitor correctness of user's PC activity and restore activity history in any case of problems. Government, law enforcement and investigative agencies can gather critical intelligence data and evidence of criminal PC activity. It is a powerful management tool for companies, which want to increase their productivity and profitability. 

Key product features: 

  • Windows 95/98/ME/NT/2000/XP OS platform supported; 
  • Extremely easy setup; 
  • New unique anti-detection technology (Hides Itself); 
  • New stealth Log-file sending technology; 
  • New Log Analyzer (easy understanding report); 
  • Interception: Keystrokes; International keyboards; DOS-box and Java-chat keystrokes; System logon passwords (9x/NT/2K/XP); Chat conversations (ICQ, Yahoo, AIM, etc.); Mouse clicks; File activity; Visited URLs; Clipboard copy/paste; Running applications; Opened windows (titles and content); Software install/uninstall; etc. 
  • Unique stealth-technology: Invisible log-file; Invisible executable files; Invisible in system registry; Invisible in task manager; Invisible in Add/Remove Programs Menu; etc. 
  • Strong Log-file protection; 
  • Strong passwords protection; 
  • Installation packet fits into 3.5" floppy; 
  • Configurable nag-screen. 
spacer

Read More...>>




Qwik-Fix Pro

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Qwik-Fix Pro uses Active System Hardening™ to protect Windows™ desktops against new threats by blocking the underlying vulnerabilities exploited by new and emerging dangerous worms, trojans, spyware and viruses.

Start protecting your computer today
against 'zero-day' cyber attacks and
feel secure online.

Qwik-Fix Pro is the first security application to utilize Active System Hardening which fundamentally changes the way Windows computers are secured. By blocking the underlying security vulnerabilities in Windows itself, Qwik-Fix Pro closes the openings that attackers use to damage and hijack your computer. Traditional anti-virus and anti-spyware tools are only able to detect and clean up your PC after the damage has been done and your computer is hopelessly infected. Qwik-Fix Pro prevents installed spyware and malware from being able to exploit your computer. 

Qwik-Fix Pro is simple to install and easy to use. Its intuitive interface and get the job done approach sets this product apart. Qwik-Fix Pro does all the work. The number of security settings alone that need to be updated on your PC number in thousands to equal the protection you will get with one mouse click in Qwik-Fix Pro. 

Qwik-Fix Pro stands out in a crowded field of security products by delivering a defense that dead-bolts your Windows machine against attack. Anti-Virus, Spyware, Patch Management, Personal Firewall and Intrusion Prevention products are all reactive approaches that have largely failed in their primary mission to provide an adequate base defense for a Windows PC.

Qwik-Fix Pro is able to deliver this revolutionary solution as a result of its world-class security research team at PivX Labs. Dedicated security researchers stay ahead of the malicious coders by diligent and creative research to ensure that protections are in place well before hackers launch attacks. Qwik-Fix Pro summarizes the results of this industry-leading security research and delivers it to your personal computer. By purchasing Qwik-Fix Pro, you are essentially hiring the very best security researchers in the world to protect your machines. 

spacer

Read More...>>




RegFreeze

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Protect your PC Now!

RegFreeze is an effective tool to counteract spyware modules trying to install themselves onto your computer. With RegFreeze, you can feel safe and secure while surfing the Internet. 

Most spyware changes your browser's start page or search page. RegFreeze is intended to prevent the destructive consequences of spyware. RegFreeze 's primary objective is to prevent any important preferences (such as your browser's start page etc.) from being changed without your knowledge. 

RegFreeze detects changes in a timely manner and notifies you about them (or, if an automatic mode is enabled, processes changes automatically). 

RegFreeze spyware scanner will clean your system quickly and effectively! Use RegFreeze and you will forget about spyware forever! 
spacer

Read More...>>




R-Guard Data Security Software 2.2

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


R-Guard 2.2 is a reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services. R-Guard enables the user to control access rights to various file systems objects (files and folders) not only for users, but for applications and system processes as well. R-Guard prevents data from disclosure, theft, modification, corruption, and deletion by another user or various malicious programs such as viruses, trojan horses, spyware, etc.

R-Guard is Windows independent Security System that enables its users to set the rights either for users or applications to access and/or modify file system objects on any file system including FAT. For example, the administrator can forbid access to any or all .doc file objects for all applications except Microsoft Word. After that, even if any virus application starts in the system, the file would never be corrupted or deleted by the virus. Then the administrator can forbid a peer-to-peer file exchange program access to all files in the system except files in its own folder(s). In this case, even if that program launches a trojan, it will never get access to the data or system files. Such protection level cannot be achieved by the standard Windows security services because they control access to files basing on the user's access rights, which the trojan can easily obtain. R-Guard controls the access rights for each program/application individually. 

R-Guard is Windows independent Data Encryption System that enables its users to encrypt file objects and keep them encrypted on a hard drive on any file system including FAT and even on a virtual hard drive on a remote file server. Files from the remote server are transferred in the encrypted form and decrypted on the host only. 

To ensure strong and fast encryption, R-Guard uses an industry standard AES encryption algorithm with 256-bit key in the Cipher Block Chaining mode. 

To secure encryption key generation, the R-Guard Data Encryption System uses a complex randomized block key and variable-length key generated from the user password (MD5 algorithm). 
spacer

Read More...>>

 


space
Translate Page!
Espa˝olFranšaisDeutschNederlands


 

 

 

 

Newsletter

Sign-Up for The Business Junction Newsletter and Get "FREE" Newsletter Sign-Up Software, Specials Updates, Product Updates and MUCH MORE!


 

| Home | AdvertiseAffiliates | Contact Us | Contents | Disclaimer & Terms Of Use |

Free Bonus Gifts | Free Software | Hot Software | JV Giveaways | Link Partners |

Link To Us | Newsletter | Newsletter Articles (The Best From Our Archives) |

Privacy Policy | Site of the Week | Software Directory | Software Spotlights | Special Offers | Turnkey Web Sites |

The World's Largest Digital Package!
SUPER COMBO PACKAGE
(16,090+ Products & Getting Bigger Daily)

Our Other Premium Packages!
EXTREME Niche Combo Package (8,585+ Products)
Private Label Rights Package (3,230+ Products)
Graphics & Web Design Package (3,915+ Products)
Internet Marketing Package (2,615+ Products)
Sports, Leisure, and Health Package (2,540+ Products)
Social Media Marketing & SEO Package (1,265+ Products)
Affiliate Marketing Package (825+ Products)
Blog, Podcasting, & RSS Package (745+ Products)
Article Marketing Package (260+ Products)
Auction Marketing Package (210+ Products)
Joint Venture Marketing Package (65+ Products)
Pop-Ups Package (35+ Products)

Copyright 1996 - 2015 TheBusinessJunction.Com

Protected by Copyscape Plagiarism Finder
(All Rights Reserved: No material from this site may be copied for use on another site or
used for any commercial purpose without prior written permission. Violators will be prosecuted!)

The Business Junction does not offer technical assistance with any software sold from our website. All software comes with its own instructions, help and/or 
installation files. Note that most software is designed for Windows platform. If it does not specifically state that it is compatible with Mac platform, do not purchase.