LinkDeny 2.2.2: Advanced Anti-Leeching and Access Control for IIS Web Server security

LinkDeny 2.2.2

deny access to content resources, making LinkDeny a powerful security tool for Microsoft IIS Web site administrators and management. Control your site traffic with confidence with LinkDeny. DETAILED LOGGING and a built-in testing interface insures that you don`t block good traffic. An XML-formatted rules engine makes for easy integration of LinkDeny into existing site backbends and content management systems. LinkDeny comes with PREDEFINED access

hotlinking, time limiting session, bandwidth theft, phish, microsoft, hack, hot link, access control, internet information server, isapi, iis 6


FileGhost 1.0: Lock, hide and protect your files, folders and volumes in various ways.

FileGhost 1.0

FileGhost is the security tool used to protect your files, folders or even whole volumes in various ways. You will be able to securely lock, hide, deny file reading, deny file writing, prevent deleting, copying, moving, renaming and replacing. Additionally you will be able to protect program access to by setting password or completely hide it. FileGhost is excellent supplement for antivirus, firewalls and other anti-malware software.

lock, secure, file, protect, folder, password, drive, file ghost, fileghost, encrypt, prevent


DVD Device Lock 2.99: Hide or disable access to removable devices like CD, DVD, floppy, flash, USB.

DVD Device Lock 2.99

Hide or restrict access to removable media devices such as CD, DVD, floppy, flash and USB drives, and deny access to partitions of your hard disk drives with the program. Stop copying data between removable media and hard disk drives, deny access to removable media, protect your PC against unauthorized software installations and prevent data leaks through removable media.

system, access, data, restrict, device, devices, program, password, software, drives, removable


File Access Helper 8.1.2: A tool can log and deny access to files and registry keys on PC.

File Access Helper 8.1.2

deny access to files and registry keys on PC.You can`trunning/copying/opening/modifying/deleting/finding any document if you select the appropriate button.The operation is that when a program is about to deal with a file or registry,File Access Helper is involved in.It will search the rules.And then it approve or deny the reading/writting operation.At last,the operation is logged in a file. e.g.For example,a virus program is going to infect your

access, private, file, control files access, safety, security, registry keys, deny file access

ID Devices Lock 1.2: ID Devices Lock ensures your data safety.

ID Devices Lock 1.2

ID Devices Lock is a very useful program to have on your computer in order to protect your personal information and prevent unauthorized access. It allows you to prevent any data-collecting via an USB device by denying copying access. Main features includes: denying for copying access of files to any devices, locking USB devices, CD-ROMs and Floppy disks, protecting you computer against attacks, password protecting information and data loss.

internet, lock cdrom, spyware, lock usb, shield, devices lock, antispyware, protect, lock floppy, clean, erase

Snappy Program Lock 1.0.0.747: Snappy Program Lock can Password Protect, Block and Restict Programs or Apps

Snappy Program Lock 1.0.0.747

Snappy Program Lock is a professional security tool for password protecting programs on your computer, laptop or usb drive. Easily add programs to restrict access to by browsing your computer for the exe file or simply drag and drop a shortcut or program to the blocked application list. Not only does it deny access to programs, it also keeps a history log containing application access information. Works with Windows 7, Vista, XP, 2003, 2008.

parental control, restrict program access, password protect programs, program lock, deny access, block programs, limit applications

Documents Multimanager 4.51: A tool can log and deny access to files and registry keys on PC.

Documents Multimanager 4.51

deny access to files and registry keys on PC.You can`trunning/copying/opening/modifying/deleting/finding any document if you select the appropriate button.The operation is that when a program is about to deal with a file or registry,File Access Helper is involved in.It will search the rules.And then it approve or deny the reading/writting operation.At last,the operation is logged in a file. e.g.For example,a virus program is going to infect your

document management software, document manager, flexible search engine, files import export, files keywords search, audio files manage, digital photographs manage

MailEnable Standard 5.51: A powerful email server for Windows Server 2000/2003/2008

MailEnable Standard 5.51

deny access for IP address ranges, pickup event so you can run scripts or executables on an email SMTP authentication, allow/deny email where the sender domain does not resolve, ban on a domain-to-domain basis. MailEnable POP3 Service:- This service provides POP3 access to users mailboxes. Its features are: Supports RFC 1939, supports APOP secure authentication, grant or deny access for IP address ranges. List Server Service. Its features are; Moderated

httpmail, smtp, e mail, mail server, mailenable, web mail, email, email server, pop3, mail enable, mail

WinFortress 2.3: This utility is developed to prevent virus activity before any changes are made.

WinFortress 2.3

deny the registry or file system changes before they are performed. Built on .NET technology WinFortess uses heuristic approach in detecting vulnerable software. Now you can monitor all your system activity and deny any file or registry key/value creation for any program (even for any new virus that is unknown for antivirus for now). You can use WinFortress to detect spyware that are monitoring your PC. Just run AntiSpy and review the log provided

adware, spyware, antispy, utility, antivirus, winfortress

ID Firewall 1.2: ID Firewall is a specialized firewall application.

ID Firewall 1.2

ID Firewall is a high-priority security program responsible for your computer`s real-time protection against hackers. It blocks access to unauthorized attempts to use your computer, making sure your computer stays safe, free from exposure to internal network attacks, as well as external Internet ones. Main features includes: monitoring program running-attempts, denying access to unauthorized programs, filtering at a low level the traffic.

network, spyware, blocks, shield, antispyware, protect, id firewall, erase, security suite, privacy, internet