وجه: شما فقط نياز داريد که اين برنامه را بر روی کامپيوتر خود نصب کنيد و برای استفاده از امکانات آن نيازی نيست که فايل يا چيزی بر روی کامپيوتر طرف مقابل نصب شود | ||||||||||||||||||||||||||||||||||||||||
امکانات بسيار پيشرفته اين نرم افزار | ||||||||||||||||||||||||||||||||||||||||
امکان ديدن وب کم هر کسی بدون اجازه و بدون اينکه طرف مقابل متوجه شود | ◄ | |||||||||||||||||||||||||||||||||||||||
امکان گوش کردن صدای هر کسی از ميکروفون بدون اجازه و بدون اينکه طرف مقابل متوجه شود | ◄ | |||||||||||||||||||||||||||||||||||||||
امکان ارسال پيغام از ياهو مسنجر به هر شماره موبايل در ايران بطور کاملاً رايگان | ◄ | |||||||||||||||||||||||||||||||||||||||
امکان ضبط خودکار و اتوماتيک تصاوير وب کم و صدا از ديگر کاربران ياهو بر روی کامپيوتر شما | ◄ | |||||||||||||||||||||||||||||||||||||||
امکان دنلود تمام عکس های موجود در کامپيوتر طرف مقابل در هنگام چت بدون اينکه طرف مقابل متوجه شود | ◄ | |||||||||||||||||||||||||||||||||||||||
ديدن اينکه چه کسانی برای طرف مقابل ايميل ارسال کرده اند و طرف مقابل برای چه کسانی ايميل فرستاده است | ◄ | |||||||||||||||||||||||||||||||||||||||
خواندن تيتر يا موضوع ايميل هائی که طرف مقابل برای ديگران ارسال کرده و يا ديگران به او ارسال کرده اند | ◄ | |||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||
اخيراً برخی ها به ما ايميل ميزنند و ميگويند که فايل ها ويروسی است .توضيح اينکه چون اين برنامه از تکنيک تونل برای ديدن و باز کردن وب کم طرف مقابل استفاده ميکند ممکن است برنامه آنتی ويروس شما مانع از اجرای آن شود و به اشتباه آن را جفو معرفی کند. با خاموش کردن برنامه آنتی ويروس خود ميتوانيد براحتی از برنامه استفاده کنيد.اين برنامه به هيچ وجه مشکلی برای کامپيوتر شما بوجود نخواهد آورد | ||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||
کسانی که اين برنامه را بر روی کامپيوتر خود نصب کرده باشند ديگران نميتوانند توسط همين برنامه وب کم و يا ديگر چيز های آنها را ببينند مثلاً اگر کسی بخواهد وب کم آنها را بدون اجازه ببيند اين برنامه بلافاصله شما را آگاه ميکند که کسی ميخواهد وب کم شما را ببيند دقت داشته باشيد که توسط اين برنامه نميتوانيد نام کاربری و رمز عبور ديگران را ببينيد |
Saturday, February 9, 2008
at
8:05 PM
|
5
comments
Posted by
mcloein
Sunday, February 3, 2008
at
1:37 PM
|
0
comments
Steganos Security Suite 2008 v10.0.1.4346
Steganos Security Suite - Premium security to ensure your privacy. Includes market-leading encryption, AntiSpyware and AntiTheft protection. Steganos Security Suite combines ten powerful tools for protecting your privacy: Steganos Safe protects your sensitive data - it serves as your encrypted hard disk. You open the safe with a password, USB stick or your ActiveSync-capable SmartPhone: via Bluetooth or even wireless. Steganos Security Suite's excellent collection of heavy-duty encryption and Internet cleanup tools is best suited to small business and corporations. Includes solid encryption algorithms; lets you store sensitive files easily and safely; shreds private documents and removes all traces of Web activity.
This encryption software enables users to securely store data and hide it from public view. It also allows them to send encrypted e-mails that require a password for the recipient to open it. Private data can also be hidden behind a picture or sound file. The software's Portable Safe enables users to encrypt data onto a CD or DVD, and then decrypt it on any other PC or laptop. Additionally, Steganos Security Suite 8 helps users manage their vast number of passwords and pin numbers and eliminate ones that might easily be found out. Finally, it deletes traces of PC and Internet usage and eliminates unwanted remnants of data from the hard drive.
F E A T U R E S:
- NEW! Safe Size 4 times bigger. Every Safe contains now up to 256 GB! Install as many secure hard drives you need in real time with 256 Bit AES.
- NEW! Steganos PicPass. Remember a sequence of images to open your Safe.
- NEW! Outlook Safe. Protect E-Mails, Contacts, Calendars, and Tasks from Outlook in your Safe Access only possible with your password.
- NEW! iPod® as key to your hard drive or as Portable Safe. Use your iPod® to open your Safe or use it as Safe when you are en route. - NEW! Mobile Password Manager. Have your passwords always with you of course encrypted: Thanks to the Password Manager on your Pocket PC. Including synchronization tool for your computer: This way, new and updated passwords are automatically transferred to your Pocket-PC.
- NEW! E-Mail Encryption. Create self-decrypting e-mails: now you can send whole folders via e-mail.
- NEW! Hotkey-Support. Open and close the Safe with practical shortcuts.
- NEW! Private Favorites. Now you can save images as well in your password protected list of favorites.
- AntiTheft Protection. In case your laptop gets stolen, Steagnos AntiTheft can provide you with information that may serve to recuperate your computer.
- Internet Trace Destructor. Destroys surf- and work traces. Including Cookie Administration and XP protection.
- Shredder. Destroys sensitive data irrevocably. Also includes the DeepSpace Shredder.
- Hide and Seek: Steganography. Hide sensitive data in pictures and music.
Download:
Mirror:
Mirror:
Password UnRAR: www.softarchive.net
Posted by
mcloein
Jetico Personal Firewall v2.0.1.2
Jetico Personal Firewall software provides you with security against hackers who try to access your PC when you are connected to the Internet. Having inherited the Open architecture principles from BestCrypt, Jetico Personal Firewall allows you to construct a strong yet accurate security policy and provides clear control over your network
connections.
Jetico Personal Firewall uses multiple level filtering scheme to provide highest protection level.
Flexible configuration
Jetico Personal Firewall is unique rule based firewall on the market. Its open confuguration does not contain hidden rules and dependencies. You can inspect or modify every bit of configuration.
Total control
In addition to real-time statistics, Jetico Personal Firewall displays real-time rules activity information. Logging subsystem allows user to trace down any firewall event.
New features in Jetico Personal Firewall v.2
>> System-related
- Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon.
- Native support for Windows XP Fast User Switching and Terminal Services.
- Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group.
- Windows XP Service Pack 2 Security Center support.
>> User interface
- Improved rule editing interface.
- New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified.
- Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window.
- Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
>> Configuration
- New XML-based open configuration file format. Detailed documentation is available upon request.
- The new version maintains single protected firewall configuration for all users.
- Simplified controls for configuration.
- New hash handling scheme. Separate table for hash checking.
- Each firewall filtering layer has own root table.
- New automatic variables (per-connection) for local connections are supported.
>> Firewall rules
- Rules support lists of parameters where possible.
- IP rules support IP address ranges.
- Low level protocol rules support filtering by MAC address.
- Application rules have events for direct and indirect access to network. Indirect access details are also available.
- New module for hash checking created.
- Application, Process attack and Hash checking rules support wildcards in file paths.
11-December-2007 | v.2.0.1.2.
Vista SP1 and Windows Server 2008 support.
Jetico Personal Firewall v.1 hook detector added to 32-bit version.
Sending message to another application detected. "Breakout" tests passed.
ARP stateful filter parameters can be changed via registry now.
Problems with network connections after installation on Vista systems fixed.
Hook detector hangup on SMP Vista systems fixed.
PFN_LIST_CORRUPT blue screen on Vista systems fixed.
Memory leak during uninstallation on Vista systems fixed.
Stability at high load improved.
Policy combobox behavior fixed.
Configuration template updated.
Jetico Personal Firewall operating systems support
Windows Vista
Windows Vista x64 edition
Windows Server 2003
Windows Server 2003 x64 edition
Windows XP
Windows XP x64 edition
Windows 2000
Pass: www.softarchive.net
Posted by
mcloein
ID Firewall v1.2
ID Firewall is a high-priority security program responsible for your computer’s real-time protection against hackers. It blocks access to unauthorized attempts to use your computer, making sure your computer stays safe, free from exposure to internal network attacks, as well as external Internet ones.
-- Monitors program running-attempts
-- Denies access to unauthorized programs
-- Filters at a low level the traffic
-- Reports detailed logging network activity
-- Manages the bandwidth for an application
-- Monitors program running-attempts
-- Denies access to unauthorized programs
-- Filters at a low level the traffic
-- Reports detailed logging network activity
-- Manages the bandwidth for an application
Detailed features:
ID Firewall is a specialized firewall application designed to ensure safe and controlled network access as well as acting as a checkpoint against attacks from outside and inside your computer.
-- Monitors attempts of all applications trying to run on your computer and filters them according to defined user access rules. You can choose which programs have authorization to run and decide which ones to block.
-- Prevents execution of unauthorized programs. Every attempt to start a program is intercepted and checked by ID Firewall against a user-defined set of rules and permission to run is requested for any program not on that list. Also, a warning sign to run a program shows up in case of an unidentified publisher.
-- Denies access to a series of files, including registry key access, for unauthorized users. Also, real time monitoring of file access ensures better protection by keeping an accurate record of users.
-- Monitors the process list, showing you exact data regarding programs and applications that use the processor. You can use this feature to deny access or to stop suspicious programs from running on your computer thus keeping it safe from any damage or from information loss.
-- Prevents loading of DLLs by running processes. Every attempt to load a DLL or any other type of library file is intercepted and checked for permission, ensuring deeper protection against viruses, Trojans and other spyware and adware.
-- Manages the bandwidth a certain application.
-- Displays detailed network activity logging and keeps record of all network events. In case of a threat, the user can use an emergency button to stop all network transfer by blocking access to a possible hacker.
-- Filters the network traffic based on a customizable content filtering option. Files containing unsolicited corrupt information can be detected by checking for certain keywords in their content and viruses or Trojans can be blocked once detected.
-- Protects against exploits, Trojans and backdoors, by the use of a low level network traffic filter available in the Advanced Network Guard section.
System Requirements:
Windows 98, Windows NT, Windows 2000, Windows XP, Windows Vista
300 Mhz processor
3 MB hard drive space
128 MB RAM
Supports Internet Explorer
Posted by
mcloein
Agnitum Outpost Security Suite Pro 2008 v6.0.2220.223.0446 Multilangue - 30,6 MB
After months of hard work, Agnitum releases a public beta of its first-ever comprehensive security product to protect home and small office users against the entire range of modern threats. With Outpost Security Suite Pro, you'll enjoy:
- Safe Internet presence behind the best-of-breed personal firewall
- Integrity of your personal data by having the Host Protection module preemptively block unauthorized program activity.
- 360-degree protection against all forms of malware
- Protection that is immune to unauthorized termination
- Personalized, easily adoptable anti-spam for Outlook and Outlook Express users
- Easy installation and auto-configuration for novice users
Please help us improve our product while it's still in the works.
Jump right in and participate in an open testing of the upcoming Outpost Security Suite Pro.
Download: (Size: 30,6 MB)
Posted by
mcloein
Ashampoo FireWall PRO is like a trusty watchdog standing guard at the entrance to your property. It is always alert and checks everything going in and out of your computer, keeping out unwanted intruders and preventing unauthorized access to the Internet from your computer. And despite its impressive power it is so simple to use – in Easy Mode you just click and go for full protection
pass rar:www.softarchive.net
Posted by
mcloein