Spy Killer is an award-winning spyware, malware, and adware detector, remover, and shield, now with a new and more stylish interface, and new instant kill real-time spyware eliminator, auto signature update and scanning scheduler features. Spy Killer also includes a stealth feature which allows you to use its features while keeping it hidden from other users of your PC. The spyware and adware scan detects and eliminates thousands of hidden programs. Spy Killer scans entire PC including memory, Windows registry, and all drives, allowing you to choose which of these you would like to scan. Spy Killer's shield feature prevents certain spyware and adware from being installed on your PC. This unique feature works even while Spy Killer is running silently in the background in stealth mode. Also includes a hijack prevention scanner and an advanced popup blocker. Protect your privacy today. Stop snoopers dead in their tracks with Spy Killer.
Entry LE Test the security and robustness of your servers, via remote brute-force attack. Entry is compatible with WWW Basic Authentication, FTP, and POP3 email protocols, HTTP proxy servers, and all popular wordlist formats.
PAL PC SPY PAL PC Spy Protects, Controls and Monitors everything that happens on your PC and online.
Free Picture Finder Free Picture Finder is an image finder and image downloader,
It uses internal image searcher and picture downloader to search and download pic on web.
Searching is executed by using keywords, The search possibilities are endless.
Proxy+ Proxy+ is a firewall, proxy, and mail server designed to give the complete solution of shared access to the Internet from a LAN. This version is free for 3 users. Versions for 5, 10, and unlimited users are also available.
Internet Form Hunter Internet Form Hunter is an easy to use Internet Browser with built-in IE core. In addition to providing web navigation function, FormHunter focus on the functions to help daily repetitious tasks such as check email, logon website, submit information.
Internet Secure Tunneling Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.