Search results for 'attack monster'.
98 products found. Showing 27-39 in 10 groups sorted by relevance.
27. PwlTool
If, while entering a password, you ask Windows to save it, Windows saves a password in a PWL file. PwlTool uses brute-force attack (fastest!) or dictionary search to recover a password. DetailsDownload trial (Demo: 770 KB) Buy now ($40.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: LastBit Software
Tauscan is a powerful Trojan Horse detection and removal engine capable of detecting every known type of backdoor that can threaten your system. It works unobtrusively in the background to prevent attack and uses minimal system resources.
This is the software program you must have on a bootable disk or CD at any time if you care about your data safety and wish to be fully armed and ready for any personal, hard- or software failure, virus attack or hacker's intrusive destruction.
DetailsDownload trial (Full version: 7.6 MB) Buy now ($29.99) Find similar
Platform: Windows 3.1x, Windows 95, MS DOS, Unix / Linux, OS/2, Novell Netware, BeOS, Platform independent, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Acronis, Inc.
30. Easy Resume Creator Pro
Easy Resume Creator Pro will help you create a resume and cover letters that match your current career level, background and career objectives, and deliver those to multitudes of employers seeking just the qualifications you possess. The trial version of the program carries the following search modules only: Dice, Monster, Monster Canada, and Spherion. DetailsDownload trialBuy now ($34.95) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Sarm Software
CallerIP monitors activity on open ports, which are often not protected by firewalls, on your computer so you can identify hackers before damage is done. CallerIP scans the ports on your system and alerts you to active and open' backdoors' which can provide unauthorized access to launch harmful attacks or steal confidential information.
34. F-22 Raptor: Predator of the Sky Screensaver
Unlike any fighter before it, the F-22 is designed to allow its pilot to attack... with abandonment at never before achieved angles of attack. Armament: One M61A2 20 millimeter multibarrel cannon; internal stations can carry AIM-9 infrared (heat seeking) air-to-air missiles and AIM-120 radar-guided air-to-air missiles or 1,000 pound Joint Direct Attack Munitions (JDAMS); external stations can carry additional stores. DetailsDownload trialBuy now ($8.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Cyber Artists Studios
36. TORNADO! Screensaver
TORNADO! They can be small funnels of twirling wind across the plains or they can be massive monsters trampling anything and everything in their path. DetailsDownload trialBuy now ($8.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Cyber Artists Studios
38. BIS Antidecompiler(tm)
The BIS Antidecompiler(tm) is a development environment for building secure Java applications and components protected from reverse engineering, recompiling, and other hackers attacks. DetailsDownload trialBuy now ($250.00) Find similar
Platform: Windows 95, Unix / Linux, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: BIS Guard & Co.
The book deals with the most popular and probably the most monumental form of the Hung Gar Kung Fu style. The Tiger's extremely tough, fierce and lightning-fast attack are balanced against and supplemented by the softer and smoother techniques of the Crane.
DetailsBuy now ($29.95) Find similar
Platform: Works on any operating system that has a program to view PDF files.
Vendor: Shaolin Kung Fu Online Library