Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Malicious File Hunter 2.1
Malicious File Hunter is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card query. The software is ideal for large corporate network and can be used to find unknown malware by searching for usual malicious files used in email attacks. It can easily local any files using exact name or wildcards and alert the security administrators to sophisticated attacks that successfully evaded AV, Proxy and Firewall detection. 30 Free trial is available.
Specifications:
Version: 2.1 |
Download
|
Similar Products:
Security & Privacy :: Other
Privacy Eraser is an all-in-one privacy suite, PC optimization and cleaning tool. It cleans all of your internet history traces and past activities with one click, recovers hard drive space by deleting unnecessary and redundant files, speeds up internet surfing and browsing, boosts your PC's performance and stability making it faster, secure and more efficient.
Windows | Freeware
Read More
Security & Privacy :: Other
The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
Windows | Shareware
Read More
GUARANTEED PDF DECRYPTER (GUAPDF) 3.2
Security & Privacy :: Other
This is a GUI utility which allows you to instantly remove various operation restrictions on PDF files, such as printing and editing (even with 128 or 256 bit key, Acrobat 8.x-10.x AES encryption and compressed files supported). It also can decrypt PDF files with password for opening (40-bit key only). GPU acceleration supported.
Windows MAC Linux | Demo
Read More
Security & Privacy :: Other
The most powerful and effetive password sniffer. Ace Password Sniffer can listen on your LAN and enable network administrators or parents to capture passwords of any network user. Currently Ace Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc.
It works passively and don't generate any network traffic, therefore, it is very hard to be detected by others. No need to install additional software.
Windows | Shareware
Read More