Exploit Pstn


Advertisement

Sophos Windows Shortcut Exploit  v.1.0.1

The Windows Shortcut Exploit Protection tool runs whenever Windows tries to display an icon corresponding to a Windows shortcut. The tool intercepts this request and validates the shortcut. If the shortcut does not contain an exploit, the icon is displayed.

Windows Shortcut Exploit Protection Tool  v.1.0.0

Detects and blocks the Windows Shortcut Exploit. The Windows Shortcut Exploit Protection tool runs whenever Windows tries to display an icon corresponding to a Windows shortcut. The tool intercepts this request and validates the shortcut. If the shortcut ...





Advertisement

Exploit Submission Wizard  v.8. 2. 2001

The program was designed from the outset to offer all web users the ability to submit sites fully automatically to the ever increasing number of search engines on the net without hassle or complication, and in a fraction of the time and cost normally ...

Antibody Anti-Exploit  v.0.1

Antiexploit framework for home, business, or server use. Completely opensource, and free(as in free beer). Antibody doesn't use a signature database, instead it emulates the possible threat to find out whats really going on.

GFI MailSecurity for Exchange/SMTP

GFI MailSecurity for Exchange/SMTP is an email content checking, exploit detection, threats analysis and anti-virus solution that removes all types of email-borne threats before they can affect an organizations email users. Using multiple virus scanners ...

Quttera

Quttera is a Signatureless Malicious Content Detection Solution designated especially to identify the potentially malicious executable code, zero-day vulnerability exploit and shellcode embedded into computer files such as movies, images, documents and ...

SocketShield  v.1.1.1

SocketShield is a dedicated zero-day exploit blocker. Using a combination of research technologies and an understanding of anti-malware techniques, the program is able to block exploits from entering your computer, regardless of how long it takes for ...

Privacy Restorer

Its an open book for all to seeand exploit. With a simple mouse click, award-winning Privacy Restorer permanently removes the history of your activities on a PC.

Teleon Gateway for Skype

Calls can be forwarded from PSTN to Skype remote user and vice versa, in fix transfer mode or free dial mode. You can receive Skype call from your cellphone.

Requirements:
Windows 2000/XP. CPU above 900Mhz, 256MB RAM.
PCTel modem card(you ...

Teleon Skype Gateway for Voice Modem

Calls can be forwarded from PSTN to Skype remote user and vice versa, in fix transfer mode or free dial mode. You can receive Skype call from your cellphone.

Requirements:
Windows 2000/XP. CPU above 900Mhz, 256MB RAM.
A voice modem ...

PC-Telephone  v.6.3

Make FREE pc-to-pc, pc-pc and cheap pc-to-phone, pc-phone, pc-to-fax, pc-fax, phone-to-pc, phone-pc, fax-to-pc, fax-pc, SIP-telephone, sip-to-phone calls over Internet/VoIP or ISDN/PSTN telephone networks. Use your computer as internet telephone, USB ...

ArtistScope Site Protection System  v.2.0

ArtistScope Site Protection System (ASPS) provides the most secure copy protection for all web data, pages, images, html, video and other embedded media without data leakage or memory exploit while viewed using the ArtisBrowser secure web browser. Fully ...

Space Empires V  v.1 79


Plot:
In this game you will be able to explore, expand, exploit and exterminate. This is known as the four x for the old gamers.

As in the previous games of this saga, you will have to start in a small planet with some resources ...

ASSP Toolbar for Outlook  v.1. 1. 2029

The toolbar integrates with Outlook, making it a breeze to exploit ASSP's email interface.

ASSP Toolbar for Outlook can also be fully managed by a network administrator. The product offers easy deployment via an MSI-based installer, full Group ...

SQL Power Injector  v.1 2

1 that helps the penetration tester to find and exploit SQL injections on a web page.

For now it is SQL Server, Oracle, MySQL, Sybase/Adaptive Server and DB2 compliant, but it is possible to use it with any existing DBMS when using the inline ...

Pages : 1 | 2 >
Newest Reviews