Software for Internet and Computer Security
Secure IT File Encryption Software Released

Secure IT File Encryption Software Released

Cypherix announces the release of Secure IT File Encryption Software (12.2 series). Encrypts any file, folder, any type of data on all Windows PC.

RDP Shield Brute Force Protection for Remote Desktop

RDP Shield Brute Force Protection for Remote Desktop

RDP Shield monitors remote desktop connections and in particular failed login attempts, and blocks an IP when an attack is suspected.

A Different Approach To Protection From Modern Monitoring Software

A Different Approach To Protection From Modern Monitoring Software

SpyShelter is an award winning, World*s Best Anti-Keylogging software, which ensures that whatever you type into your computer, is protected against dangerous people who want to steal your data.

Aobo Internet Filter for Mac V2.1 Released

Aobo Internet Filter for Mac V2.1 Released

Aobo Software released Aobo Internet Filter for Mac v2.1 on October 25, 2013. Aobo Internet Filter for Mac helps Mac OS X users to block adult sites, block other websites, block applications and log website history with simple and easy ways.

KinderGate Parental Control 3.0 Is Released

KinderGate Parental Control 3.0 Is Released

Newly updated KinderGate Parental Control 3.0 from Entensys filters HTTPS traffic, combines a convenient intuitive interface with support for Windows, Linux and Mac OS X.

Proxy Server Software for Windows.

Proxy Server Software for Windows.

CCProxy from www.youngzsoft.net, is an easy-to-use proxy server. It*s an Internet access controlling proxy software, also known as web filter proxy server. Besides, many people also use this proxy server software for Internet sharing.

Secure Web Browser To Copy Protect Web Sites

Secure Web Browser To Copy Protect Web Sites

ArtisBrowser provides the best security and copy protection for information kiosks and exams. Data and media cannot be extracted from browser cache or memory.


 Page:   1     2  

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .