Security Rules
Advertisement
SolidShare v.2. 6. 2011
By setting the security rules, you can prevent unauthorized access from entering the local network, you can also restrict what traffic is allowed for each source, destination, application, schedule, and perform NAT or not.
SolidShare is divided ...
Advertisement
CoreFTP v.2.1.1649
It supports SFTP and HTTPS, and it is compliant with HIPAA security rules.
The user interface is very graphical and useful. The application can work in ASCII mode, binary mode or directly in Auto mode. User can manage all the files and folders ...
Sax2 Free v.4.60 Build 1.0.0.123
Comprehensive recognition of internet attacks
Sax2 reduces omissions and misstatements with more than 1500 security rules to ensure the validity of attacks characteristics. Users' system will be in the best condition at any time with Sax2's knowledge ...
FastTrackFTP v.2.5.7.1
The connection can be established using SSL2, SSL3, TLS, SSH2 or PGP security rules, and even using encrypted passwords. Transfers can be made in Automatic, Binary and ASCII modes. Once the connection is made, the application shows a log with ...
ShunIPCalc v.3.0
In the 'Mask Calculator' tab you can play with the fields in order to obtain different types of subnetwork masks, which allows you to have IPs on the same physical subnetwork using security rules between subnets. You can enter different values for IP ...
007 Password Recovery v.1.0.0.1
Because of the security rules Windows applies, when entering a password, the input box only shows asterisks. Same as when Windows fills in automatically the password input box.
Users that need to remember login passwords can run this application ...
Password Decryptor v.1.0.0.1
Because of the security rules Windows applies, when entering a password, the input box only shows asterisks. Same as when Windows fills in automatically the password input box.
Users that need to remember login passwords can run this application ...
WhatChanged for Windows v.2.0
Restoral and viewing actions can be restricted in compliance with existing security rules. Change reports provide detailed information, useful when interacting with vendors. The friendly Change Browser permits easy traversal of the file and registry.
Security Center Lite
Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities. The unique network monitoring engine provide ...
Avira Premium Security Suite
Avira Premium Security Suite is a new, comprehensive protection package for end-users as well as small offices and home workers. The Avira Premium Security Suite is a combination of Aviras brand-new firewall and the proven anti-virus software AntiVir ...
Security Center v.2.5.2800.2097
Lan-Secure Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities. The unique network monitoring ...
Lumension Endpoint Security Client v.4.4.1452
New approaches and solutions are required to ensure enhanced security and compliance with the lowest total cost of ownership possible. The once-separate IT functions of operations and security must collaborate and share information seamlessly to gain ...
Security Center Pro v.2 4
Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities.
Security Center can be connected ...
Lan-Secure Security Center v.2.8
Security Center is network management program for network security that implements real-time intrusion detection IDS and prevention IPS and helps to protect networks from potential intruders, unauthorized connections and malicious activities.Security ...