CC-CAM is an alarm system based on movement detection. It can send to you the photos of the intruder on your cell phone by email. CC-CAM records the pictures on hard drive send them to your email address or on your web site. The threshold of detection adjusts itself automatically. The live-cam mode allows you to watch the picture of your webcam on
Free download of CC-CAM alarm system 1.4.6, size
Security Center is network security software for real-time intrusion detection IDS and prevention IPS that helps to protect networks from potential intruders, unauthorized connections and malicious activities.
Security Center can be connected in any network either it is switched or hubs network without the need of remote agents or
Free download of Security Center Lite 2.3, size
MultiCam is an alarm system that could handle many cameras at the same time. It has its own HTTP server that allows for internet or a mobile phone, to see the camera in real time, remote system and view all photos taken during intrusions. MultiCam saves images or videos of the intruders on hard disk. He has an audible alarm and sending photos by
Free download of MultiCam Alarm 1.1.4, size
Professional Video Surveillance Software With Support For Multiple IP and USB Cameras.
Security Monitor Pro is the perfect solution for complex security problems. It can monitor and record from up to 32 IP cameras simultaneously, create continuous video recordings, and preview multiple cameras in a single window. Each camera has its own
Free download of Security Monitor Pro 5.12, size
A family of fun and easy print-project software that brings out the creativity in you. The Cards & Calendars Bundle bundle contains Print Creations Quarter Fold Greeting Card, Print Creations Half Fold Greeting Card, Print Creations Slimline Card, and Print Creations Photo Calendar!
Main Features :
- Personalized Text : Add
Free download of ArcSoft Print Creations - Calendar 184.108.40.206, size
By encrypting messages before they leave your computer to the Internet, SimpLite-MSN prevents eavesdroppers from reading your MSN Messenger conversations. As the original successor of Simp 1.0, SimpLite-MSN benefits from state of the art algorithms to secure your messages, whilst maintaining an intuitive interface.
Freeware download of SimpLite-MSN 2 5, size
Visualize images audio / video of your live webcams anywhere and at any time on your mobile phone.
You can receive messages of alarm SMS on your mobile phone, or by e-mail (with video) at a motion detection in the field of vision of the webcam to schedule you have chosen. You can see pictures of the live webcam or the sequence recorded
Freeware download of 3GVisio 220.127.116.11, size
It is a graphical user interface for PHREEQC-2, the popular aqueous geochemical modelling code by David Parkhurst and Tony Appelo. It was developped to add an easy-to-learn, intuitive graphical user interface (GUI) to PHREEQC. Since it was originally released in 1999 it has become widely-used for both teaching and research.
Freeware download of PHREEQC for Windows 2 17, size
IBM® Tivoli® Management Framework provides the tools for managing large numbers of remote locations or devices.
An open and comprehensive foundation for network computing management, it simplifies your most complex network computing challenges.
- Shields administrators from platform-specific details of
Freeware download of Tivoli Management Framework 4. 1. 2001, size
Advanced Privacy Protector allows the user to customize the cleaning of the sensitive information from User Track History. The disk space can be saved and the important private details can be eliminated by Application Logs.
Advanced Privacy Protector cleans all the unwanted files. This saves lot of precious disk space, and clutter and
Free download of Systweak Advanced Privacy Protector 1.0, size
SimpLite-Jabber is a program that can encrypt the messages you send through the Internet. Every time you send messages using Jabber/Google Talk, they are sent in text form. This means that some people can read your conversations. SimpLite-Jabber uses the latest available algorithms to encrypt your messages, providing you with total security. All
Freeware download of SimpLite-Jabber 2 5, size
idappcom's Traffic IQ Basic solution has been specifically designed for use by security vendors and their sales engineers to accurately demonstrate the technical capabilities of their products and devices in a controlled, reliable and predictable manor.
Freeware download of Karalon - Traffic IQ Basic 1.0.223, size
Look 'n' Stop is an average personal firewall software.
Look 'n' Stop Firewall 2.07 is your defense against malicious internet trafic and program.
With a firewall installed, you can filter the network traffic (Internet and LAN), specifying what ports and/or programs could have access to the Internet.
Free download of Look 'n' Stop 2 7, size
Web Server Defacement and Server Security Issues - Eliminate them with StorageCraft ShadowServer StorageCraft ShadowServer provides high availability for servers so that downtime and the associated costs are held to a minimum. ShadowServer provides a full system recovery in as fast as it takes to reboot. ShadowServer is your first line of defense,
Free download of ShadowServer 2 5, size
Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format. Set Cryptex to
Free download of Cryptex - 1 TB Vault 2, size
ThreatSentry Windows Web server Host intrusion Prevention software defends IIS against new and progressive attack techniques, protects network weak points, overcomes lapses in patch management, and reinforces regulatory compliance. An ISAPI filter hosted in MMC, ThreatSentry compares server requests to a knowledgebase and an evolving system
Free download of ThreatSentry x64 18.104.22.168, size
AutoScan-Network is an application designed to explore and to manage your network. Entire subnets can be scanned simultaneously without human intervention. The objective of the program is to post the list of all equipment connected to the network. A list of ports preset is scanned for each equipment. * Fast multithreaded scanning * Automatic
Freeware download of AutoScan-Network 1.50, size
Cyberarms intrusion Detection is a handy and reliable application designed to detect intrusion attempts and block them.
Cyberarms intrusion Detection uses the Windows event log for security analysis and denies the access to hackers on a very low system level.
Free download of Cyberarms Intrusion Detection 2.0.321, size
OSSEC is a full platform to monitor and control your systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful and open source solution.
OSSEC HIDS performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting
Free download of OSSEC HIDS 2.6, size
The enhanced Mitigation Experience Toolkit (EMET) was developed to help prevent hackers from gaining access to your system.
Software vulnerabilities and exploits have become an everyday part of life. Virtually every product has to deal with them and consequently, users are faced with a stream of security updates. For users who get
Free download of Enhanced Mitigation Experience Toolkit 3.0, size
Intrusion Web Results
Collaborative agents for intrusion detection and countermeasures in networked computing systems.
The PDS series of firewall security appliances are hardened Linux platforms with open Intel® architecture that enable a variety of security software such as intrusion detection and VPN/firewall...
The maker of SecureNet Pro, a commercial Network Intrusion Detection (NIDS) product suite.
Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage principles.
Bibliography, computer codes, directory of researchers, and other information resources related to salt water intrusion into coastal groundwater aquifers.
A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and...