The Best 2735 Security Alternatives

  • Active@ Data Studio icon

    Active@ Data Studio

    Active@ Data Studio (Live CD) contains a set of both desktop applications and a bootable image for booting up any system into a DOS or Windows environment.

  • HackADay icon

    HackADay

    Hackaday.io is a platform for people who like to build things.

  • IVPN.net icon

    IVPN.net

    IVPN is a commercial VPN service focused on multihop VPN connections and that does not log any data relating to their customers activities.

  • Winpooch Watchdog icon

    Winpooch Watchdog

    Winpooch is a watchdog for Windows (2000, XP, 2003, but only 32-bits). It detects modifications in your system, so as to detect a trojan or a spyware installation. It also includes a real-time anti-virus.

  • SecureAPlus icon

    SecureAPlus

    SecureAPlus is a free solution that protects you from malware & viruses, 100% of the time. You get powerful application whitelisting, 10+ anti-viruses in the cloud with UAV, and a reliable offline AV combined. Download it free today.

  • FamilyShield icon

    FamilyShield

    FamilyShield, powered by OpenDNS, blocks adult websites from home computers for free, with no software to install.

  • Dipiscan icon

    Dipiscan

    Dipiscan is a free IP scanner that allows you to remotely retrieve information about machines on your network using a clear and ergonomic interface (as well as a command-line mode) .

  • The Journal icon

    The Journal

    Whatever your journaling or writing needs, The Journal gives you unmatched convenience, flexibility, and security.

  • VDE: Virtual Distributed Ethernet icon

    VDE: Virtual Distributed Ethernet

    VDE is an ethernet compliant virtual network that can be spawned over a set of physical computer over the Internet. VDE is part of virtualsquare project.

  • Trinity Rescue Kit icon

    Trinity Rescue Kit

    Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. Since version 3.

  • VPN.ac icon

    VPN.ac

    A serious service developed and provided since 2012 by a Romanian security company.

  • n2n icon

    n2n

    n2n is a layer-two peer-to-peer virtual private network (VPN) which allows users to exploit features typical of P2P applications at network instead of application level.

  • Onion.guide icon

    Onion.guide

    Using this gateway you can securely access any .onion or .i2p hidden service without a Tor Browser or I2P installation.

  • Wordfence icon

    Wordfence

    The Wordfence WordPress security plugin provides free enterprise-class WordPress security, protecting your website from hacks and malware.

  • Immunity CANVAS icon

    Immunity CANVAS

    Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.

  • CamDesk icon

    CamDesk

    CamDesk is a free, open source, desktop webcam widget, that was created as home surveillance application. Although others have used it for demonstrations even with CamStudio, and QuickTime Player for screen casting.

  • Norton Power Eraser icon

    Norton Power Eraser

    Norton Power Eraser Eliminates deeply embedded and difficult to remove crimeware that traditional virus scanning doesn't always detect.

  • VirSCAN icon

    VirSCAN

    VirSCAN.org is a FREE on-line scan service, which checks uploaded files for malware, using antivirus engines, indicated in the VirSCAN list.

  • BeEF icon

    BeEF

    BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.