Suspect
In this game a number of suspects will be shown to you. After a certain time period one of the suspects will be covered up, and you will need to remember who the suspect is and be able to pick up the correct face of the suspect among a number of different faces. As the game progresses there will...
Platforms: Windows
License: Freeware | Size: 260 KB | Download (453): Find the Suspect Download |
With Services_RickProof, you can check any suspect URL with this package and you will never get rick rolled again.Services_RickProof is an interface for communicating with http://rickproof.com.Installation- $ pear install -f Services_RickProof-0.1.0.tgz- Call from command line with: $ rickproof...
Platforms: PHP
License: Freeware | Size: 10 KB | Download (39): Services_RickProof for Scripts Download |
The Port Scan Attack Detector (psad) is a collection of three system daemons that are designed to work with the Linux Netfilter firewalling code to detect port scans and other suspect traffic. Port Scan Attack Detector project features a set of highly configurable danger thresholds (with...
Platforms: *nix
License: Freeware | Size: 460.8 KB | Download (146): Port Scan Attack Detector Download |
PostArmor is an application that helps to keep your electronic mailbox free of unsolicited e-mail, better known as spam: it looks at the relevant parts of your email before it leaves the mail server, and lets the legitimate messages pass through undisturbed, while leaving suspect messages on the...
Platforms: *nix
License: Freeware | Size: 286.72 KB | Download (90): PostArmor Download |
McAfee GetSusp is intended for users who suspect undetected malware on their computer. GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the McAfee Global Threat Intelligence...
Platforms: Windows
License: Freeware | Size: 1.4 MB | Download (433): GetSusp Download |
Many programs place hidden files in your computers' filesystem. If these files become corrupt or outdated, they can be almost impossible to find. AccessTracker is a rough hewn program that identifies all files that have been accessed or modified since it was launched. To use it, first launch...
Platforms: Mac
License: Freeware | Size: 307.2 KB | Download (41): AccessTracker Download |
The latest version of Alessandro Blasi’s famous CONTASCATTI Desktop Phone Meter program.
This freeware program – which requires online registration and activation for purely statistical purposes - monitors and displays PTSN, IDSN and ADSL internet connection charges on your computer desktop...
Platforms: Windows
License: Freeware | Size: 1.79 MB | Download (518): Contascatti Euro 2003 Download |
Free full version of Spyware Terminator includes Real-Time Protection, HIPS and antivirus. Effectively remove spyware, adware, trojans, keyloggers, home page hijackers and other malware threats - even dangerous threats like Look2Me, BetterInternet, VX2, and CWS. Spyware Terminator is easy to use,...
Platforms: Windows
License: Freeware | Size: 2.9 MB | Download (2381): Spyware Terminator Download |
This junkmail-busting freeware utility will K.O. spam according to both objective and personal criteria, deleting or archiving it while placing an optional warning notice on any suspected spam mail it allows through to your mailbox. "When suspect spam mail is marked for rejection, you can delete...
Platforms: Windows
License: Freeware | Size: 1.03 MB | Download (93): SpamWeasel Download |
NOTHING beats having a good anti virus program installed but even these fail sometimes! SOFTWIN provides you with a powerful set of Virus Cleaning Tools, designed to detect and remove viruses that infected your system. These applications are also valuable because of their size, making them easily...
Platforms: Windows
License: Freeware | Size: 100 KB | Download (1245): Free Virus/Worm/Trojan Removal Tools Download |
Process Terminator is an application to view and kill running processes on your Windows PC. Information such as CPU allocation and memory usage are readily available on the program's simple to navigate user interface. Caution should be used when 'killing' certain processes as some are necessary...
Platforms: Windows
License: Freeware | Size: 820 KB | Download (506): Process Terminator Download |
File Assassin is a program that`s able to delete malignant files (material known and identified as malware) from your system, using for this advanced techniques to load and download diverse modules, close remote controllers, and finish processes that could block the deletion of a file.Once...
Platforms: Windows
License: Freeware | Size: 1024 B | Download (4180): File Assassin Download |
IceSword comes to defend you and remove from your computer with its sword all the horrible and unwanted rootkits. IceSwrod isn`t a prevention tool that advises you when it detects something dangerous or a suspect element, but it is a curative and disinfecting instrument in case you already have...
Platforms: Windows
License: Freeware | Size: 2 KB | Download (143): IceSword Download |
As you use your computer, you install many programs there. But to find all this software it is very difficult and constraining. Some executables are even hidden in files that you don't suspect its existence. Programs Viewer cured this deficiency by immediately listing all the files on your...
Platforms: Windows
License: Freeware | Size: 1.42 MB | Download (475): Programs Viewer Download |
PostScript::MailLabels are modules for creating PostScript files of mailing address labels. Flexible enough to tackle other printing tasks, basically anything requiring a set fields be printed on a regular grid. Also creates PostScript(tm) code for calibrating and testing mailing label...
Platforms: *nix
License: Freeware | Size: 41.98 KB | Download (95): PostScript::MailLabels Download |
The goal of RUMT is to check the memory of a computer over a long period of time and almost-real load conditions without having to interrupt the services. RUMT exploits the possibility of some Unix kernels to selectivly disable some memory areas while still accessing them through the /dev/mem...
Platforms: *nix
License: Freeware | Size: 15.36 KB | Download (105): Running Unix Memory Test Download |
netjail provides an user-space solution for prohibiting a process from accessing the network. Netjail is a user-space mechanism for restricting the socket connection attempts that a process makes. This makes it very useful for studying and/or foiling spyware and other software that has covert...
Platforms: *nix
License: Freeware | Size: 9.22 KB | Download (90): netjail Download |
IO::Interactive is a Perl module with utilities for interactive I/O. SYNOPSIS use IO::Interactive qw(is_interactive interactive busy); if ( is_interactive() ) { print "Running interactivelyn"; } # or... print {interactive} "Running interactivelyn"; $fh = busy {...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (88): IO::Interactive Download |
Klaxon is a simple detector od scanning booted from inetd. Instead of actually executing anything, it returns a benign error to the caller, and syslogs the calling host, username, and name of attempted service access. Its also extremely useful for detecting portscanner attacks like those...
Platforms: *nix
License: Freeware | Size: 11.26 KB | Download (96): Klaxon Download |
Scheme2Js is a Scheme to Javascript compiler. While some effort has been spent on being as close as possible to R5rs, we concentrated mainly on efficiency. Usually Scheme2Js produces Javascript code, that is comparable to hand-written code. In order to achieve this performance, Scheme2Js is not...
Platforms: *nix
License: Freeware | Size: 78.85 KB | Download (96): Scheme2Js Download |