- 1,251 categories
- 40,829 scripts
- Spam Blocker works with any POP3 email account. It checks your HTML and Text email and removes spam right from the mail server so you never see it in your regular inbox. Then you can review the suspicious emails in Spam Blocker and choose to keep the...
- Our Anonymous Surfing Toolbar allows you to surf the web freely && provides you with a fake IP address, country of origin etc, thus enabling you to protect your privacy and against hijackers. Our IP toolbar also protects you against website o...
- Scam Sensor is a Microsoft Office Outlook add-in that examines every e-mail message you read and
notifies you if the message is a phishing scam. It does not use any online databases of fraud e-mails or forged hyperlinks. Instead, the program uses a...
- Spam Reader is an MS Outlook plugin that extends Outlook functionality with a Bayesian spam filter. There is no need to run an external program. Spam Reader fully integrates into MS Outlook. Spam Reader analyzes each message when you receive it and p...
- Set up a VPN server in less than 1 minute. Free client software. iPig creates a secure &"tunnel&" that protects your inbound and outbound communications (Email, Web, IM, VOIP, calls, FTP, etc.) at any Wi-Fi hotspot or wired network....
- Free Secure Tunnel Service for use with Kiwi Syslog Daemon (or compatible). It receives, compresses, and securely transports syslog messages from distributed network devices to a Kiwi Syslog Daemon. With Kiwi Secure Tunnel it is possible to securely ...
- This tool let you verify an email address and check its validity. To validate an address it verifies the format, check for forbidden characters, make sure the domain name is valid, and verify that the user and mailbox really exist. This is the most c...
- IM Lock is a powerful Instant Message Blocking software for home, education, and business. Fast setup in under a minute. block messenger, block im, block Internet Explorer, block MSN Messenger, block Yahoo Messenger, block chat, block download, blo...
- Don''t give away sensitive information with the old computers that you or your company resells, donates or removes from operation. Deleting all files, formatting the hard disk or using FDISK is not enough to stop people to restore information us...
- iPig creates a secure &"tunnel&" that protects your communications (Email, Web, IM, VOIP, calls, FTP, etc.) at any Wi-Fi hotspot or wired network. iPig works with any kind of Internet connection (Wifi, WLAN, wired ethernet). NO conf...
Page: