The Best 2735 Security Alternatives

  • SafeHouse Explorer icon

    SafeHouse Explorer

    ENCRYPTION FOR DISKS & MEMORY STICKS! SafeHouse Explorer is FREE encryption software which we're making available to everyone as a free download in order to...

  • BitStash icon

    BitStash

    BitStash is a graphical interface which makes it easy to create/remove and lock/unlock encrypted volumes. It also have functionality for clearing logs to clear your...

  • Exocet icon

    Exocet

    Exocet creates a Folder on your System. This Folder appears or hides when you use a special for this case formatted USB Storage Key. The Data is encrypted on the System...

  • Conceal icon

    Conceal

    Conceal is an Encryption utility. With Conceal you can encrypt/decrypt your important data files on the system. Encrypt any file type of any size, in an easy and fast...

  • DocWallet icon

    DocWallet

    Your personal document lock box. Securely stored and always at hand. You can finally access your confidential documents from anywhere in the world - securely...

  • Mojo Packets icon

    Mojo Packets

    Mojo Packets™ is web based tool that simplifies trace based analysis and troubleshooting of connectivity/performance issues observed in Wi-Fi (IEEE 802.11) environments.

  • Network Diagnostic Tool icon

    Network Diagnostic Tool

    The Network Diagnostic Tool (NDT) is a client/server program that provides network configuration and performance testing to a users desktop or laptop computer. The...

  • TcpLogView icon

    TcpLogView

    TcpLogView is a simple utility that monitors the opened TCP connections on your system, and adds a new log line every time that a TCP connection is opened or closed.

  • RawCap icon

    RawCap

    RawCap is a free command line sniffer for network activity on Windows. Properties of RawCap: Can sniff any interface that has got an IP address, including...

  • PsPing icon

    PsPing

    PsPing is a command-line utility for measuring network performance. In addition to standard ICMP ping functionality, it can report the latency of connecting to TCP...

  • netstat icon

    netstat

    Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP...

  • MicroOLAP TCPDUMP icon

    MicroOLAP TCPDUMP

    microolap tcpdump is a clone of tcpdump , the most used network sniffer/analyzer for unix, compiled with the original tcpdump code (http://www.tcpdump .

  • Pirni Pro icon

    Pirni Pro

    Pirni Pro is a network security tool designed for iOS, and specifically for iPhone and iPod Touch devices. It is capable of intercepting traffic on a wireless network...

  • qcheck icon

    qcheck

    Qcheck, the network troubleshooting utility from Ixia, quickly checks network response time, throughput, and streaming performance. It even runs anywhere-to-anywhere...

  • Network Security Task Manager icon

    Network Security Task Manager

    Network Security Task Manager detects malware that traditional signature-based security solutions do not recognise. In this way, Network Security Task Manager helps to detect industrial espionage, sabotage and security-critical software.

  • InfBlocker icon

    InfBlocker

    InfBlocker PRO Shield Protects computer against virus coming from removable drives - RCPsoft.net.

  • Preventon Antivirus icon

    Preventon Antivirus

    Discover Preventon’s award-winning free antivirus software, which removes and protects you against the latest strains of viruses, malware, worms, Trojans and more. With...

  • Zillya! Antivirus icon

    Zillya! Antivirus

    Zillya! Antivirus includes a fully installed antivirus with all the needed features.

  • Trust Port icon

    Trust Port

    TrustPort delivers powerful, easy-to-use security software, based on progressive multi-engine antivirus technology and cutting-edge spam filtering. Protection of both...

  • NANO AntiVirus icon

    NANO AntiVirus

    NANO AntiVirus is a powerful and advanced application designed to provide you with security levels that conform to actual threats. The product is very useful. The...