A Windows - Program to manage their semi-automatic creation of backups with "Confixx" web accounts. The program is Multiaccountfähig and can create backups and import back into your account.
Downloads: 68659 - Freeware - Download Now
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
Downloads: 72256 - Shareware - Download Now
This tool is designed specifically to disable/remove Miner Virus without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some malware carries out which are ignored
Downloads: 64116 - Freeware - Download Now
Actual Invisible Key Logger is the most powerful stealth keylogger software. Actual Invisible Key Logger runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords.
Downloads: 87292 - Shareware - Download Now
The NeXpose Community Edition is a free, single-user vulnerability management solution specifically designed for very small organization or individual use.
Downloads: 78346 - Freeware - Download Now