Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'breach'Pages : 1 2

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Points

MS Access Password RecoveryVer.: 1.0

categ.: >

...NET platform, complete with source. Handy for when you forget the password, or when someon...t the password, or when someone leaves a company without writing down the password. While handy, please read the following before downloading. Plea...rd. While handy, please read the following before downloading. Please note that unauthorized use of password recovery techniques can breach software license agreements and leave you without otherwise available assistance and... otherwise available assistance and remedies. You may also be liable to being sued or even prosecuted under the terms of the software license. You can in some cases be in breach of terms of your employment and find yourself out on the street. You are warned that civil and criminal proceedings risks should not be viewed lightly. If in any doubt, don`t. The algorithm for this came off a usenet post, and was origi...

Download size: 24 kBytes

Ecora Auditor Lite for WindowsVer.: 4.1

categ.: >

...t installs on a Windows workstation and collects hundreds of thousands of configuration se... thousands of configuration settings to generate on-demand, detailed configuration reports. With a click of a button, users can document Microsoft W...on reports. With a click of a button, users can document Microsoft Windows servers. Systems change constantly, and each change ? whether planned or unplanned ? can trigger downtime or a security breach. Current IT documenta...curity breach. Current IT documentation, especially in today?s compliance-driven IT environments, is essential. Auditor Lite eliminates the time-consuming and error prone manual process of data collection and ensures accurate, timely documentation of the IT infrastructure. Ecora Auditor Lite provides consistent, standardized configuration documentation that aids in: ? IT Audits ? Provide up-to-date, accurat...

Download size: 53785 kBytes

Spyware TerminatorVer.: 1.7

categ.: >

... HIPS and antivirus. Effectively remove spyware, adware, trojans, keyloggers, home page hi...jans, keyloggers, home page hijackers and other malware threats ? even dangerous threats like Look2Me, BetterInternet, VX2, and CWS. Spyware Termina... threats like Look2Me, BetterInternet, VX2, and CWS. Spyware Terminator is easy to use, requires minimal PC resources and performs ultra fast scans. Protect your computer with powerful real-time protection shield, advanced ...l-time protection shield, advanced system scanning and safe quarantine for found spyware. Scan your computer manually or schedule full system sweeps. Perform in-depth scans of your computer`s hard drives, memory, process, registry and cookies to seek out and remove all known spyware threats. Real-Time Protection guards your computer, privacy, and personal information from hidden threats before they can run, st...

Download size: 2597 kBytes

Simpo PDF Creator LiteVer.: 3.1.1

categ.: >

... you to create PDFs easily. With Simpo PDF Creator Lite, you could create PDF files from W... could create PDF files from Word / Excel / PPT / Images / HTML and any other printable files. Thus, you are able to convert Word to PDF, Excel to P...intable files. Thus, you are able to convert Word to PDF, Excel to PDF, PowerPoint to PDF, Images to PDF, etc. without difficulties, and FREE. It also supports PDF/A format and embedded font. Never worry the copyright of your.... Never worry the copyright of your PDF Documents will be infringed! Simpo PDF Creator Lite includes strong 128bit encryption and will allow you to set both Owner Password and User Password to protect your PDF documents against from breach. You are even in complete control of your PDF document to set following features: disallow printing, disallow copy or extraction, and disallow changes, such as filling in for...

Download size: 4341 kBytes

Sax2 Intrusion detection system(Free)Ver.: 3.0

categ.: >

...tem that performs real-time packet capturing, 24/7 network monitoring, advanced protocol a...onitoring, advanced protocol analyzing and automatic expert detection. By giving you insights into all of your network`s operations, Sax2 makes it e... you insights into all of your network`s operations, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth use, detect network vulnerabilities and discovered the network whether t...nd discovered the network whether there is a breach of security strategy and the signs of being attacked in the network of hazard, and then intercept and stop before their invasion. Network administrators can directly monitor http requests, email messages, ftp transfers, as well as real-time activities and message details for the two popular instant messengers: MSN and QQ. Sax2 is designed to be used by both IT...

Download size: 7051 kBytes

SuperEasy Codec CheckerVer.: 1.08

categ.: >

...because...", "No filter found", "XXX could not render". Quite some movie night has been en...e some movie night has been ended abruptly or at least interrupted by a message like this ? which may not be surprising since software players usual...like this ? which may not be surprising since software players usually inform you that a problem has occurred, but not about why it occurred or how it could be solved. This is where the SuperEasy Codec Checker steps into the...erEasy Codec Checker steps into the breach. The software analyzes video clips and audio files and lists the found information in a clear tree structure. Classified by audio- and video stream and by used file format the software informs you about for instance resolution, frame rate, file container, audio- and video bit rate as well as about the used codec. With this information you are perfectly equipped to insta...

Download size: 7372 kBytes

SpamWars for MacOSVer.: 2.0

categ.: >

...de mail, thanks to a verification method of the relation between you and your e-mail conta...ween you and your e-mail contacts. This technique, called Challenge - Response, not only works for traditional e-mails but also for automated replie...not only works for traditional e-mails but also for automated replies, newsletters or lists to which you wish to remain available ! Compared with classic anti-spam solutions based on the analysis of the content of the message...lysis of the content of the message, SpamWars ensures 100% efficient protection and above all guarantees not to erase any useful messages by accidentally considering it as Spam, (false positive). Compared to other solutions using similar sender-identification technology, SpamWars stands out by the fact that it is autonomous ie it requires neither external hosting nor installation on an Internet accessible web se...

Download size: 30957 kBytes

LepideAuditor for File ServerVer.: 13.01.01

categ.: >

...vers in the network. File server audit solution tracks all changes made to Files, Folders,...hanges made to Files, Folders, Shares and Permissions and generates predefined reports to cover all requirements related to File server auditing. An...eports to cover all requirements related to File server auditing. Analyzing all File Server changes helps Administrators to prevent unauthorized access to sensitive business data, harmful changes made to files, shares, folder...anges made to files, shares, folder structures, permissions and other items. File server auditor software also helps Admins to avoid heavy penalties caused by security breach and compliance violations to successfully audit File server. Complete information about who, what, when and where questions are generated by software. Additionally, it also generates instant alerts to notify Admins of critical changes ...

Download size: 23961 kBytes

Event Log MonitoringVer.: 12.10.01

categ.: >

...network security, email compliance and system performance. Organization now can effectivel...rganization now can effectively tackle the compliance violation issues with the help of centralized Event Log Monitoring software. Lepide Event Log ...help of centralized Event Log Monitoring software. Lepide Event Log Manager collects event information of some or all computers on a network from Windows Log Event directory. It also sends email alert to the network administr...mail alert to the network administrator, in case any breach of regulatory compliance is reported on specific computers. Acting as ideal centralized Event Log Monitoring tool, it enables organization to effectively enforce existing email security standards such as HIPAA, GLBA, PCI, SOX and FISMA. It also generates multiple pre-defined compliance reports in HTML, RTF, DOC and TXT file formats. Lepide Event Log Man...

Download size: 32358 kBytes

Windows File Server AuditingVer.: 13.01.01

categ.: >

...ators to overcome the limitations of complex and time consuming native auditing. No more l...ing native auditing. No more limitations of change archiving on account of security threat and storage inefficiencies. You can archive Windows file ...ity threat and storage inefficiencies. You can archive Windows file server data for as long as you want with complete security and easy accessibility. Software provides means for a successful and secure file access auditing,...ul and secure file access auditing, so that you are completely aware of all changes being made to the files, folders, permissions and shares. Software allows you to perform requirement-centric Windows file server auditing on the basis of variables such as File Name, File server name, Monitoring time, File type, Drive, Process, Events, Directory, etc. Intuitive and easy-to-use interface of software allows y...

Download size: 23961 kBytes

Find others 'breach' freeware Pages : 1 2
 Sponsored Links:
Google
 
Web www.FreewareBox.com