security » Page 65 » Developer.Team

VIPRE Internet Security 2014 7.0.6.2

VIPRE Internet Security 2014 7.0.6.2
VIPRE Internet Security 2014 7.0.6.2 | 53 Mb


VIPRE Internet Security 2014 - Internet security essentials that don't slow down your PC. VIPRE Internet Security 2014 is the award-winning antivirus software that includes a firewall, spam filter and bad website blocking into one powerful package of internet security solutions for complete protection against malware.
Read more

HIPAA Security Rule Assistant 11.5

HIPAA Security Rule Assistant 11.5
HIPAA Security Rule Assistant 11.5 | 10 Mb


HIPAA Security Rule Assistant provides facilities protection HIPAA, a program for knowledge and development of Safety Rules HIPAA. The program contains a worksheet risk analysis, sample calculations, sample disaster recovery plan and samples of incident report forms. The program also has a field for describing the actions and input calculations and procedures designed to comply with the rules. You can view the rule in whole or in part. Enter and describes how to perform actions, add comments and much more.
Read more

Ashampoo Anti-Virus 1.0.8

Ashampoo Anti-Virus 1.0.8
Ashampoo Anti-Virus 1.0.8 | 219 Mb


You don't have to sacrifice speed and comfort over security when you protect your data with Ashampoo Anti-Virus 2014. With powerful automated real-time protection and frequent updates, Ashampoo Anti-Virus 2014 offers reliable protection against all common Internet security threats, known and unknown. And it does so in a very discrete and unobtrusive manner without restricting your freedom of use.
Read more

Burp Suite Pro v1.5.20

Burp Suite Pro v1.5.20
Burp Suite Pro v1.5.20 | 8 Mb


Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun.
Read more

GridinSoft Trojan Killer 2.2.1.7

GridinSoft Trojan Killer 2.2.1.7
GridinSoft Trojan Killer 2.2.1.7 | 39 Mb


Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in the field of system security to ensure safety for computer systems. We propose products to help you get rid of annoying adware, malware and other rough tools. It is very important to restore control on your computer as soon as possible and do not allow anyone to use your data.
Read more

GiliSoft Full Disk Encryption 3.3.0 DC 20.02.2014

GiliSoft Full Disk Encryption 3.3.0 DC 20.02.2014
GiliSoft Full Disk Encryption 3.3.0 DC 20.02.2014 | 2 Mb


GiliSoft Full Disk Encryption's offers encryption of all disk partitions, including the system partition.Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files. It provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Read more

MONyog Ultimate 5.6.8.0

MONyog Ultimate 5.6.8.0
MONyog Ultimate 5.6.8.0 | 10 Mb


MONyog MySQL Monitor and Advisor is a "MySQL DBA in a box'' that helps MySQL DBAs manage more MySQL servers, tune their current MySQL servers and find and fix problems with their MySQL database applications before they can become serious problems or costly outages. MONyog pro-actively monitors enterprise database environments and provides expert advice on how even those new to MySQL can tighten security, optimize performance and reduce downtime of their MySQL powered systems. MONyog provides a log analysis module, a 'query sniffer' and a 'processlist watcher' that makes it easy to identify the statements and applications that run slow on the server. This includes various filtering and EXPLAIN options for an efficient workflow when you want to optimize your applications.
Read more

Serv-U File Server 15.0.1.20

Serv-U File Server 15.0.1.20
Serv-U File Server 15.0.1.20 | 18 Mb


Serv-U is a powerful, easy-to-use, award-winning FTP server created by Rob Beckers. An FTP server uses the FTP protocol to share files across the Internet. Serv-U is not only 100% compliant with the current FTP standard, but also includes numerous features unique to Serv-U that make it a perfect file sharing solution for virtually everyone. Serv-U features an open architecture that makes it very easy to extend, monitor, and change the server behavior with external DLLs. Regardless of the purpose behind your FTP server, everyone will benefit from the numerous security features Serv-U incorporates.
Read more

PDF-XChange Editor 3.0.307.2

PDF-XChange Editor 3.0.307.2
PDF-XChange Editor 3.0.307.2 | 52 Mb


The PDF-XChange Editor is smaller, faster and more feature rich than any other FREE PDF Reader/ PDF Viewer/ PDF Editor available. No PDF reader or Viewer offers more features than PDF-XChange - or does so without compromising performance and quality.
Read more

Acunetix Web Vulnerability Scanner Consultant Edition 9.0.20140206

Acunetix Web Vulnerability Scanner Consultant Edition 9.0.20140206
Acunetix Web Vulnerability Scanner Consultant Edition 9.0.20140206 | 28 Mb


Audit your website security with Acunetix Web Vulnerability Scanner. As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.
Read more