Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'defense'Pages : 1 2 3 . . . 8

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Rating

Rising Antivirus Free EditionVer.: 21.22.30

categ.: >

...s of viruses, Trojans, Worms, Rootkits and other malicious programs. Easy to use, Active D...rograms. Easy to use, Active Defense technology, Patented Unknown Virus Scan and Clean technology and Patented Smartupdate technology make RISING An... Clean technology and Patented Smartupdate technology make RISING Antivirus install and forget product and entitles you to focus on your own jobs with your computer. Key Features: Zero day protection with Rising Cloud Securi...protection with Rising Cloud Security: Rising Cloud Security users communicate with the Rising virus lab to form a rapid response network which quickly catches Trojans and other malware; Antivirus & Antispyware Protection: Protection from Trojans, worms, rootkits and other malware. With unparalleled expertise in combating Asian malware, Rising offers you actual protection against today?s cyber threats witho...

Download size: 62386 kBytes

Active Kill Disk - Hard Drive EraserVer.: 5.1

categ.: >

...ermanently from any computer that can be started from floppy CD USB. Active KillDisk Profe... CD USB. Active KillDisk Professional conforms to US Department of Defense clearing and sanitizing standard DoD 5220.22-M. New Wipe function that wi...ing and sanitizing standard DoD 5220.22-M. New Wipe function that wipes out all unused space on existing drives, not touching existing data. 5.1 version supports 17 security standards from various countries such as: Br... various countries such as: Bruce Schneier`s algorithm Canadian OPS-II DoD 5220.22 M Gutmann`s algorithm German VSITR HMG IS5 Baseline HMG IS5 Enhanced Navso P-5329-26 (RL) Navso P-5329-26 (MFM) NCSC-TG-025 Russian GOST p50739-95 US Army AR380-19 US Air Force 5020 and some others You can be sure that once you wipe a disk with Act...

Download size: 10967 kBytes

Comodo FirewallVer.: 4.0

categ.: >

... malware, worms, Trojans, hackers, and all Internet threats. In order to prevent threats f... In order to prevent threats from occurring, rather than just detecting them when it`s already too late, Comodo`s Firewall utilizes unique Default D...n it`s already too late, Comodo`s Firewall utilizes unique Default Deny Protection. When a file or application knocks on your PC`s door, Comodo Firewall is able to access a safe list of over 15 million files and applications ... 15 million files and applications that are known to be PC-friendly. If the file asking for access is on the list, Comodo Firewall can be sure it`s safe for your computer to allow it to execute. If not, Comodo Firewall will alert you that a possibly malicious file is trying to enter your PC. Comodo Firewall is a learning; piece of software, able to recognize your downloads and alter its alerts accordingly. It`s ...

Download size: 60751 kBytes

EraserVer.: 5.7

categ.: >

...move sensitive data from your hard drive by overwriting it several times with carefully se...everal times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell e...folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, duri...to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann`s paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the...

Download size: 912 kBytes

! - Privacy KeeperVer.: 7.0.1

categ.: >

...racks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection t...sy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and othe...nd program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanentl... computer activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not clean data out of ...

Download size: 67800 kBytes

Privacy KeeperVer.: 7.0.1

categ.: >

...racks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection t...sy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and othe...nd program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanentl... computer activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not clean data out of ...

Download size: 67800 kBytes

Scrambled SubmarineVer.: 2.0

categ.: >

...t`s sinking submarines, commercial crafts, and even comes out of the sea on land with no o...t of the sea on land with no one to stop it. You and your submarine are the stronghold for the whole humankind. The craft is equipped with high-tech...nghold for the whole humankind. The craft is equipped with high-tech devices and you`re the only one to save the world! The very best humans have been racking their brains over the creation of your weapons, and you`re chosen ...of your weapons, and you`re chosen as the most experienced, brave and responsible captain on Earth. The underwater world is full of dangers and adventures, you`re a stranger here, and the monster is in his home, and not alone. The best defense is an attack! Go ahead, brave captain! Armies of sharks, dolphins, cramp-fishes, jelly-fishes, crabs, all kinds of fish are waiting for you, and they will use every chance...

Download size: 1942 kBytes

F-22 Raptor ScreensaverVer.: 1.0

categ.: >

...mages of the F-22 Raptor stealth fighter aircraft. The F-22 Raptor is a fifth generation s...Raptor is a fifth generation stealth fighter aircraft. It was originally envisioned as an air superiority fighter for use against the Soviet Air For...ned as an air superiority fighter for use against the Soviet Air Force, but is equipped for ground attack, electronic warfare and signals intelligence roles as well. Faced with a protracted development period, the prototype a...development period, the prototype aircraft was designated YF-22 and, as F/A-22 during the three years before formally entering United States Air Force service in December 2005 as the F-22A. Lockheed Martin Aeronautics is the prime contractor and is responsible for the majority of the airframe, weapon systems and final assembly of the F-22. Along with Lockheed Martin, partner Boeing Integrated Defense Systems pro...

Download size: 3233 kBytes

Base Defense IIVer.: 1.00

categ.: >

...............

Download size: 3906 kBytes

TravianManager BotVer.: 3.4.8

categ.: >

...you. You can even get notified by email or icq. Sends automatically troops: You select t...matically troops: You select the villages you want to farm and TravianManager is doing the job automatically. Selects the best villages and calculat... doing the job automatically. Selects the best villages and calculates the production of the target... Stay out of troubles: If a village has to high defense, TravianManager will not visit it anymore. Evading attacks: You c...it anymore. Evading attacks: You can set what kind of troops, should be evading attacks. They will be sent away and called back after the attack. This makes you sleep much better... You can even tell TravianManager to send resources away, if they are not protected by your crannies. Alliance: Every alliance member, that is using TravianManager can share his attacks within the alliance. TravianManager will coord...

Download size: 202 kBytes

Find others 'defense' freeware Pages : 1 2 3 . . . 8
 Sponsored Links:
Google
 
Web www.FreewareBox.com