File Security Manager
Even if a tested download is found to be clean and safe to install we highly recommend you to use a
- complete protection for the PC against viruses, worms, trojans, keyloggers, spyware and adware, and offers a real-time scanning for email, internet traffic and files
- full internet protection solution that adds firewall protection, antispam and antiphishing protection, protection from leaks of confidential data.
ESET NOD32 Antivirus 4.2 scan report:
SoftArea51 has checked File Security Manager, version 184.108.40.206, with ESET NOD32 Antivirus on 30, August 2011 and found it to be
clean and safe to download and install.
Kaspersky Anti-Virus 2011 scan report:
SoftArea51 has checked File Security Manager, version 220.127.116.11, with Kaspersky Anti-Virus on 30, August 2011 and found it to be
clean and safe to download and install.
Flash Player is a cross-platform browser plug-in that delivers breakthrough Web experiences to over 98% of Internet users
The award-winning Firefox Web browser has security, speed and new features that will change the way you use the Web. Don t settle for anything less
Google Talk is a simple and free way to talk with and send instant messages to your friends.
playstation 2 games
CHMOD Calculator to set file permissions for UNIX.How to set file permissions. for your perl and php scripts.Octal and Symbolic format
EMCO Permissions Audit XML
EMCO Permissions Audit XML Edition provides a few clicks access to all tasks related to the management of permissions on different network resources. Scan different domain/workgroups for all available servers with just a single mouse click.
Local Account Manager
Local Account Manager is an award winning local users and groups management tool for Windows XP Home. Using the program you can easily add, modify, delete users and groups (manage security accounts), assign user rights, define privileges.
Calculate the octal values for speific permissions on a unix shell. You select the permissions via check boxes and the prgram imediatly tells you what the octal values are for the command. Makes your life easiler. STFLoanCHCalc Makes it very easy.
NetShareWatcher is network security improvement software. It allows network administrators to monitor network shares and identify shares which are violating data access policy in their organization.
Impose auto-shred dates on MS Word files you distribute. Use AutoShred Doc in stand-alone mode or through the Outlook and Lotus Notes plug-ins. Your recipients must install the free Pinion Receiver to work with the files you secure and distribute
ScriptLogic WinCloak(TM) provides increased security on NTFS volumes by adding Out of sight out of mind filtering to the Windows file system. Users will only see the files and/or folders that that they have permission to access
Hide specified windows or windows of specified process. You can hide any visible window on your desktop,hide all the windows of specified processes or executable-files. You can select a window which will be shown onto the top after hidding.
Antivirus and antispyware software
Comodo Antivirus - the total virus and malware prevention kit for your computer. Features on-demand and on-access virus scanners, anti-spyware mechanism, auto-sandbox technology, cloud-based scanning and behavior analysis of unrecognized files. Free.
Visit www.001micron.com to download recovery program. Fat Data Recovery software provides facility to restore data and file from hard disk partition. Cost effective revive program is capable to restore lost data.
Protea AntiVirus Tools for Lotus Notes/Domino automatically scans/cleans the message body, attached files, rich text fields and OLE objects in Domino mail, keeps Domino bases virus-free.
Download Memory Card Recovery program from www.memorycarddatarecovery.net to restore your deleted or erased most precious text document, images, music file from picture card or SD card.
Personal Firewall, Process Monitor and Host Intrusion Prevention (HIPS) software blocks hackers, Trojans, keyloggers, code injection, program hijacking and zero-day threats.