Category: Firewalls and Security


AxCrypt 1.7.2867.0


 

Download here – http://www.filehippo.com/download_axcrypt/download/6f48a467c08771288352eeb946893e3f/

Released on – 5th December 2011

AxCrypt is used to share and work with stored documents, and e-mail attachments, in a secure manner.

If your documents reside on a document sharing service, intranet or file server AxCrypt is especially well suited and will usually seamlessly integrate, and make sharing and storing sensitive data as easy as not protecting it.

AxCrypt is great for protecting your documents such as private letters, correspondence, job information, medical information, financial details stored on a local hard disk or network server.

Just right-click any document file and encrypt it with AxCrypt. Viewing and opening for update is just as convenient as before encryption due to AxCrypt’s automatic decryption/open/re-encryption function.

If you use a Key-File on a diskette or USB thumb drive, your files will be encrypted to the highest level of protection as long the Key-File is kept secret.

To encrypt a file, right-click it in Windows Explorer, select ‘AxCrypt > Encrypt’ and enter a pass phrase plus the path to an optional strong key file.

To edit or view an encrypted file – just double-click it.

Advertisements

Event Log Explorer 3.4 beta 2


 

Download here – http://www.filehippo.com/download_eventlogexplorer/download/2997668384deedd838bf826f7231a79b/

Released on – 25th November 2011

Event Log Explorer™ is an effective software solution for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. Event Log Explorer greatly extends standard Windows Event Viewer monitoring functionality and brings many new features.

  • Multiple-document or tabbed-document user interface depending on user preferences.
  • Favorites computers and their logs are grouped into a tree.
  • Event descriptions and binary data are in the log window.
  • Quick Filter feature allows you to filter event log in a couple of mouse clicks.
  • Compatibility with well-known event knowledgebases (EventID.com and Microsoft knowledgebase).
  • Color coding by Event ID.
  • Print and export to different formats.

Nmap 5.51


 

Download here – http://www.filehippo.com/download_nmap/download/66be906065b975ce563c08319b865662/

Released on – 12th February 2011

Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.


 

Download here – http://www.filehippo.com/download_eventlogexplorer/download/00426d29d1ce6144544a7c3a957cdf5e/

Released on – 8th July 2010

Event Log Explorer™ is an effective software solution for viewing, monitoring and analyzing events recorded in Security, System, Application and another logs of Microsoft Windows NT/2000/XP/2003 operating systems. Event Log Explorer greatly extends standard Windows Event Viewer monitoring functionality and brings many new features.

  • Multiple-document or tabbed-document user interface depending on user preferences.
  • Favorites computers and their logs are grouped into a tree.
  • Event descriptions and binary data are in the log window.
  • Quick Filter feature allows you to filter event log in a couple of mouse clicks.
  • Compatibility with well-known event knowledgebases (EventID.com and Microsoft knowledgebase).
  • Color coding by Event ID.
  • Print and export to different formats.

Download here – http://www.filehippo.com/download_mbsa/download/e943bdd87102c6e9afbd744f0c472cbe/

Released on – 9th August 2010

Microsoft Baseline Security Analyzer (MBSA) 2.0 is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.

Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS) and Microsoft Operations Manager (MOM).


 

Download here – http://www.filehippo.com/download_axcrypt/download/e194880ea79198737aa7cc31c49c53e2/

Released on – 23rd September 2011

AxCrypt is used to share and work with stored documents, and e-mail attachments, in a secure manner.

If your documents reside on a document sharing service, intranet or file server AxCrypt is especially well suited and will usually seamlessly integrate, and make sharing and storing sensitive data as easy as not protecting it.

AxCrypt is great for protecting your documents such as private letters, correspondence, job information, medical information, financial details stored on a local hard disk or network server.

Just right-click any document file and encrypt it with AxCrypt. Viewing and opening for update is just as convenient as before encryption due to AxCrypt’s automatic decryption/open/re-encryption function.

If you use a Key-File on a diskette or USB thumb drive, your files will be encrypted to the highest level of protection as long the Key-File is kept secret.

To encrypt a file, right-click it in Windows Explorer, select ‘AxCrypt > Encrypt’ and enter a pass phrase plus the path to an optional strong key file.

To edit or view an encrypted file – just double-click it.


 

Download here – http://www.filehippo.com/download_password_safe/download/3525b50ffd0ac0894f5686e3c37cfba4/

Released on – 1st November 2011

Password Safe allows you to manage your old passwords and to easily and quickly generate, store, organize, retrieve, and use complex new passwords, using password policies that you control. Once stored, your user names and passwords are just a few clicks away.

Using Password Safe you can organize your passwords using your own customizable references – for example, by user ID, category, web site, or location. You can choose to store all your passwords in a single encrypted master password list (an encrypted password database), or use multiple databases to further organize your passwords (work and home, for example). And with its intuitive interface you will be up and running in minutes.


Download here – http://www.filehippo.com/download_comodo/download/ee82aa28c01ec31c0a97aa5216b133f7/

Released on – 21st October 2011

Comodo claim that their firewall is unique in that it passes all known leak tests to ensure the integrity of data entering and exiting your system. Comodo has put firewall through all kinds of sophisticated tests to ensure its firewall powerful enough to ward off these attacks with default settings. No other firewall has had to work this hard.

  • PC Magazine Online’s Editor’s Choice
  • Secures against internal and external attacks
  • Blocks internet access to malicious Trojan programs
  • Safeguards your Personal data against theft
  • Delivers total end-point security for Personal Computers and Networks

Download here – http://www.filehippo.com/download_zonealarm_free/download/b851b9b69652a3a85c4d581067b460d0/

Released on – 11th November 2011

ZoneAlarm Free Firewall blocks hackers from infiltrating your home PC by hiding your computer from unsolicited network traffic. By detecting and preventing intrusions, ZoneAlarm Free Firewall keeps your PC free from viruses that slow down performance, and spyware that steals your personal information, passwords, and financial data.

  • Essential firewall protection
  • Be invisible to others online
  • New interface makes it even easier – smaller size keeps it light
  • Systematically identifies hackers and blocks access attempts
%d bloggers like this: