Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'defense'Pages : 1 2 3 . . . 8

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Downloads

Active Kill Disk - Hard Drive EraserVer.: 5.1

categ.: >

...ermanently from any computer that can be started from floppy CD USB. Active KillDisk Profe... CD USB. Active KillDisk Professional conforms to US Department of Defense clearing and sanitizing standard DoD 5220.22-M. New Wipe function that wi...ing and sanitizing standard DoD 5220.22-M. New Wipe function that wipes out all unused space on existing drives, not touching existing data. 5.1 version supports 17 security standards from various countries such as: Br... various countries such as: Bruce Schneier`s algorithm Canadian OPS-II DoD 5220.22 M Gutmann`s algorithm German VSITR HMG IS5 Baseline HMG IS5 Enhanced Navso P-5329-26 (RL) Navso P-5329-26 (MFM) NCSC-TG-025 Russian GOST p50739-95 US Army AR380-19 US Air Force 5020 and some others You can be sure that once you wipe a disk with Act...

Download size: 10967 kBytes

CHAOS ShredderVer.: 2.4

categ.: >

No icon available

...Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recover...sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted i... delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensiti... others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wi...

Download size: 287 kBytes

Base Defense IIVer.: 1.00

categ.: >

...............

Download size: 3906 kBytes

Privacy Eraser FreeVer.: 2.7

categ.: >

...cy by cleaning up all your Internet history tracks and past computer activities. It suppor...computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera. With simply one ... Mozilla Firefox, Google Chrome, Safari and Opera. With simply one click, Privacy Eraser can quickly erase the Internet cache, cookies, browsing history, address bar history, typed urls, autocomplete form history, saved pass...tocomplete form history, saved password and index.dat files of your browser, and Windows` run history, search history, open/save history, recent documents, temporary files, recycle bin, clipboard, taskbar jump lists, dns cache, log files, memory dumps, error reporting and much more. Furthermore, Privacy Eraser supports plug-ins to extend cleaning features, you can easily delete the tracks left by any applicatio...

Download size: 4139 kBytes

B-2 Spirit ScreensaverVer.: 1.0

categ.: >

...ages of the B-2 Spirit stealth bomber aircraft. The Northrop Grumman B-2 Spirit is a steal... Grumman B-2 Spirit is a stealth bomber able to drop conventional and nuclear weapons. Its development was a milestone in the modernization program ...apons. Its development was a milestone in the modernization program of the U.S. Department of Defense. The B-2s stealth technology is intended to help the craft penetrate defenses previously impenetrable by combat aircraft. T... impenetrable by combat aircraft. The original procurement of 135 aircraft was later reduced to 75 in the late 1980s. In his 1992 State of the Union address, President George H. W. Bush announced total B-2 production would be limited to 20 aircraft (later increased to 21 by refurbishing a test aircraft). This reduction was largely a result of the disintegration of the Soviet Union, which effectively rendered voi...

Download size: 4157 kBytes

Battle NowVer.: 2.0

categ.: >

...g strategy to win. Choose your attack and defense strategy. After each battle you won you ...After each battle you won you will earn a certain amount of points. You can use those points to buy new equipment. But choose carefully what you buy...those points to buy new equipment. But choose carefully what you buy. If you spend all your points on defense you will have a poor attacking strength. But if you buy the latest weapons and no defense you will quickly loose al...o defense you will quickly loose all your health. Go out there choose right strategy and win the fight with one of the best free kids games out there....

Download size: 2202 kBytes

Comodo Memory FirewallVer.: 2.0.4.20

categ.: >

...ion tool which provides the ultimate defense against one of the most serious and common at...the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects most buffer overflow atta...ttack. Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data thef...Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks. The product is aimed for system administrators as well as desktop users to protect their systems and detects suspicious code executions in the stack or the heap portions of the memory. To attack a computer, a malicious program or script deliberately sends more data to its memory buffer th...

Download size: 3346 kBytes

Comodo Internet SecurityVer.: 4.0

categ.: >

...tion that protects your computer against internal and external attacks from viruses, Troja...al attacks from viruses, Trojans, worms, buffer overflows, spyware and hackers. Built from the ground upwards with your security in mind, Comodo Int...Built from the ground upwards with your security in mind, Comodo Internet Security combines powerful Antivirus protection, an enterprise class packet filtering firewall and an advanced host intrusion prevention system called ...intrusion prevention system called Defense plus in one supremely powerful application. Version 4.0 sees a major leap forward in security and usability with the addition of the new auto sandboxing feature - an isolated operating environment for unknown applications. Under default settings, unknown and untrusted applications are now automatically sandboxed so that they cannot make permanent changes to other proces...

Download size: 60751 kBytes

Comodo FirewallVer.: 4.0

categ.: >

... malware, worms, Trojans, hackers, and all Internet threats. In order to prevent threats f... In order to prevent threats from occurring, rather than just detecting them when it`s already too late, Comodo`s Firewall utilizes unique Default D...n it`s already too late, Comodo`s Firewall utilizes unique Default Deny Protection. When a file or application knocks on your PC`s door, Comodo Firewall is able to access a safe list of over 15 million files and applications ... 15 million files and applications that are known to be PC-friendly. If the file asking for access is on the list, Comodo Firewall can be sure it`s safe for your computer to allow it to execute. If not, Comodo Firewall will alert you that a possibly malicious file is trying to enter your PC. Comodo Firewall is a learning; piece of software, able to recognize your downloads and alter its alerts accordingly. It`s ...

Download size: 60751 kBytes

F-22 Raptor ScreensaverVer.: 1.0

categ.: >

...mages of the F-22 Raptor stealth fighter aircraft. The F-22 Raptor is a fifth generation s...Raptor is a fifth generation stealth fighter aircraft. It was originally envisioned as an air superiority fighter for use against the Soviet Air For...ned as an air superiority fighter for use against the Soviet Air Force, but is equipped for ground attack, electronic warfare and signals intelligence roles as well. Faced with a protracted development period, the prototype a...development period, the prototype aircraft was designated YF-22 and, as F/A-22 during the three years before formally entering United States Air Force service in December 2005 as the F-22A. Lockheed Martin Aeronautics is the prime contractor and is responsible for the majority of the airframe, weapon systems and final assembly of the F-22. Along with Lockheed Martin, partner Boeing Integrated Defense Systems pro...

Download size: 3233 kBytes

Find others 'defense' freeware Pages : 1 2 3 . . . 8
 Sponsored Links:
Google
 
Web www.FreewareBox.com