Security
58 hubs total
In this category:
Scan For Viruses
A virus is a computer application able to copy itself and infect one o...
Porn Blocker
Parents typically want to make sure that their kids do not stumble acr...
Remove Autorun.inf Virus
Autorun.inf virus typically spreads via removable devices and it runs ...
Virus Definitions
Once installed, anti-malware applications have to be regularly updated...
Portable Antivirus
Most users keep their most valuable and important files and folders on...
Free Antivirus
It's common sense to equip a computer with a powerful anti-malware...
Removal Tools
Computer viruses are computer applications that can multiply themselve...
Block Flash
While for online marketers everywhere, Flash components provide an eas...
Cookies Cleaner
Unlike the tasty kind of cookies we all know and love, HTTP cookies ar...
Steganography Tools
Steganography is the science of embedding text messages or files withi...
Parental Controls
Parental controls allow parents to protect their children when they ar...
USB Encryption Tools
For many users, USB drives are the go-to method of transferring data b...
Checksum Verifiers
A checksum is a value that is used to verify the integrity of a file a...
Spam Blocker
E-mail spam defines unsolicited emails that are sent to numerous recei...
Free Firewall
Firewalls were created to help users protect themselves against unauth...
Spyware Remover
Spyware is a special type of malware that works in the background, wit...
Password Decryptors
Password decryptors are specialized security utilities that will enabl...
Virtual Private Network
Virtual private networks, also known as VPNs, are networks based on&nb...
Rescue Disks
Malware attacks can have a hugely negative impact on your system, from...
Password Unlockers
Anything can be password-protected, such as private documents, photos ...
Encrypt File
Encryption refers to the process of transforming data using a special ...
Disk Cleaners
These applications are specialized cleaning utilities that are me...
Proxy Servers
Proxy servers are servers which function as intermediaries for re...
Trojan Remover
Taking their name after the famous horse of the Greek mythology, Troja...
Lock Folder
In order to be able to lock a folder that contains confidential or pri...
USB Security Tools
There are lots of people who store their data on a portable Flash driv...
Internet Security Suites
These applications typically offer users everything they require for s...
Anti-phishing Protection
Phishing is a rather new technique of trying to obtain personal inform...
Detect Rootkit
A rootkit is a tool designed to gain administrator-level control ...
Computer Lockdown
Whenever users leave their computers, even for short periods of time, ...
Create Restore Points
Sometimes when working on a Windows computer, things can go terribly w...
Detect Invisible Yahoo! Users
These applications will help users find out if their Yahoo! Messenger&...