Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (3039)
- Business (5565)
- Communications (1642)
- Desktop (531)
- Development (1260)
- Education (505)
- Games & Entertainment (1131)
- Graphic Apps (1290)
- Home & Hobby (269)
- Network & Internet (1005)
- Security & Privacy (1246)
- Servers (129)
- System Utilities (32725)
- Web Development (518)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
SurfSolo 2.0
No one knows more about ?surfing? and downloading habits than your ISP (Internet Service Provider). The ISP is able to know who you are, every site you visit, every page you view, and every file you download. How this happens? Every time you are connected on the Internet your ISP gives you an IP number that is a unique address which identifies you from the other computers on the network living you vunerable to any attacks from hackers or eavesdroppers. SurfSolo was created to protect you from those problems. Powerful software that allows the user to get totally anonymous and at the same time protects the data exchange on the Internet.The software provides a direct encrypted link(by using SSH Protocol) with one of the world wide SecurStar high bandwidth security proxy servers. ?SSH protocol (Secure Shell protocol)? which makes the connection encrypted from your personal computer to any website. A protocol says which format the data is going to be sent and which rules will be applied. The SSH protocol creates a ?virtual tunnel?, in such a way you are totally invisible from any kind of monitoring. If someone tries to track your IP number, it will recognize only our SecurStar server's IP, so it would be impossible to track your personal IP number. The SurfSolo also provides free e-mail account (no mailbox size limit). Sending emails from it will not reveal your personal IP number. At the moment SecurStar has 5 proxy servers available around the world (Malaysia, Hong Kong, Germany, Holland and Czech Republic).When the customer purchases the software he can choose one of the Proxy servers available.
Specifications:
Version: 2.0 |
Download
|
Similar Products:
Security & Privacy :: Other
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased.
Windows | Shareware
Read More
WEB CACHE ILLUMINATOR 5.4.1.000
Security & Privacy :: Other
Easily investigate all the web pages and images that someone has viewed. This program will succinctly show the web page title, date/time it was viewed, and thumbnails of all the images viewed. As an added convenience, it can search the computer and locate all of the cache folders for you.
Windows | Shareware
Read More
Security & Privacy :: Other
Index.dat files are hidden files on your computer that contain all tracks of your online activity, where have you been on internet, what sites you visited, list of URL-s, files and documents you recently accessed. Index.dat files stored on your computer are obviously a potential privacy threat as they can be found and viewed without your knowledge. Index.dat Analyzer is free tool to view and delete contents of hidden index.dat files.
Windows | Freeware
Read More
Security & Privacy :: Other
LSASecretsView is a small utility that displays the list of all LSA secrets stored in the Registry on your computer.
The LSA secrets key is located under HKEY_LOCAL_MACHINE\Security\Policy\Secrets and may contain your RAS/VPN passwords, Autologon password, and other system passwords/keys.
Windows | Freeware
Read More