Identity Protection is a powerful security suite for protecting your computer and internet identity from hackers. Utilities included can remove adware/spyware, scan your computer for exploits, clear your internet tracks, and secure sensitive data.
Infiltrator Network Security Scanner 2.00 Infiltrator is an intuitive network security scanner that can quickly audit computers
for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal security holes and alert the user.
SpyAnywhere 3.03 SpyAnywhere provides the power to remotely control computer's with SpyAnywhere installed - all from your favorite web-browser! SpyAnywhere allows many powerful controls for remote control, and also allows you to remotely monitor/spy other computers.
Description: Identity Protection is a powerful, easy to use security suite for protecting your computer and internet identity from hackers. Identity Protection features secure utilities to clear your internet and computer histories/activities, securely encrypt files and directories - so only you can access them, scan your computer for adware and spyware infections (and remove them as well), and even scan your computer for possible Windows security exploits and insecure security policies. Identity Protection is powered by a sleek, graphical user interface that gives you point and click access to each useful utility, as well as an easy to understand security rating system that tells you how secure your computer is.
KeyGuard ! Hack Proof Security 2.0.11 Defend your privacy the ultimate way never being victim of hacking or internet security threats Be Hack proof ! for Ever KeyGuard ! Hack Proof Security is the ultimate security
Webroot Desktop Firewall 1.3 From the makers of Spy Sweeper! Two-way protection from Webroot Desktop Firewall keeps your data in and intruders out. Easy to use for novice firewall users & experts can tune it
Hackers Spreading Spyware From Free Personal Web Sites In another new malicious twist, hackers are using free personal Web hosting sites provided by nationally- and internationally-known ISPs to store their malicious code, and to infect users with worms, viruses, and spyware.