The Best 2735 Security Alternatives

  • Proxyswitcher.net icon

    Proxyswitcher.net

    Proxy Switcher is an application to easily automate actions based on your current network connection

  • Easy-Hide-IP icon

    Easy-Hide-IP

    Easy Hide IP is advanced IP changer, bypass virtually any form of censorship or internet traffic blocking imposed on you by your ISP, your company, or third parties....

  • Throttled Pro icon

    Throttled Pro

    Throttled Pro optimizes your internet connection and provides QoS (Quality of Service) to Mac OS X. It provides both ACK packet prioritization and PRIQ priority...

  • SharkSSL icon

    SharkSSL

    The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication....

  • SecureBlackbox icon

    SecureBlackbox

    SecureBlackbox is a library (suite of components and classes) for software developers that allows them to provide secure data transfer and storage, digital signing and verification, encryption and compression (please refer to EldoS website...

  • eScan Internet Security Suite icon

    eScan Internet Security Suite

    eScan Internet Security solution designed for home and small office users is a comprehensive Anti-Virus and Content Security Solution that provides complete protection to your computers against objectionable content and security threats...

  • Demeter icon

    Demeter

    Imagine if you will, a Cocoa-based browser that has the ability to connect to all of your favorite social networks. The ability to quickly find your favorite bookmark...

  • Risingware Browser icon

    Risingware Browser

    Risingware Browser, a multi-process web browser based on Trident (IE) layout engine, is fairly light and fast in terms of speed. When we speak of "speed", we...

  • HouseCall icon

    HouseCall

    HouseCall is a free virus scanner offered by Trend Micro, which checks whether a computer has been infected by viruses, spyware, or other malware. HouseCall performs...

  • IndieAuth icon

    IndieAuth

    IndieAuth is a way to use your own domain name to sign in to websites. It works by linking your website to authentication providers such as Twitter or Google, then...

  • Twitter connect icon

    Twitter connect

    Place a button on your site or application which allows Twitter users to enjoy the benefits of a registered user account in as little as one click. Works on websites...

  • Facebook Connect icon

    Facebook Connect

    Facebook Connect is a set of APIs from Facebook that enable Facebook members to log onto third-party websites, applications, mobile devices and gaming systems with their...

  • CDRoller icon

    CDRoller

    Use CDRoller to recover, retrieve, rescue and fix files and data from CD, DVD, Blu-Ray discs, hard and flash drives, memory cards, mini dvd camcorders, etc.

  • Recover Disc icon

    Recover Disc

    Recover Disc 2.0 is an easy-to-use program that helps you extract data from scratched, damaged, defective or incorrectly burned CD, DVD and Blu-ray discs when regular...

  • CrococryptMirror icon

    CrococryptMirror

    Crococrypt is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading)....

  • Batch File Encryptor icon

    Batch File Encryptor

    Encrypt and decrypt whole files or their parts using AES, 3-DES, RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic...

  • SSL Enforcer icon

    SSL Enforcer

    SSL Enforcer - Force SSL/TLS encryption for any browser or app. Block all unsecure connections. Today any network activity involves a number of requests to the web....

  • Nexpose icon

    Nexpose

    Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.

  • Pyruse icon

    Pyruse

    Light-weight and extra-configurable peruser of systemd journal logs: ban IP, send immediate email, daily report… all based on a single JSON configuration file.

  • HeatShield icon

    HeatShield

    HeatShield is a network firewall management service and SSH brute force blocker for Linux servers.