CallerIP monitors activity on open ports, which are often not protected by firewalls, on your computer so you can identify hackers before damage is done. CallerIP scans the ports on your system and alerts you to active and open' backdoors' which can provide unauthorized access to launch harmfulattacks or steal confidential information.
Twister Anti-TrojanVirus is a powerful, advanced, ingenious, easy-to-use Trojan, Virus and Harmful-Program scanner and remover. It can help you to scan and remove Trojan Horse, Backdoor, Virus, Worm, Spyware, Harm, Script Virus, HTML Virus, WebBugs, Unknown Virus, Password Stealer, Keyboard Logger, Hacker Tools, Attack Program, Adware, Suspect Program, and more.
3. RAR Password Recovery
RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRAR (2. The program supports the brute-force attack, dictionary-based attack and dramatically fastest Booost-Up attack. The program is able to resume the previous interrupted attack. DetailsDownload trialBuy now ($29.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Intelore
8. 1st Email Anti-Virus
1st Email Anti-Virus is the only security program that protects from all email threats. It copes with iframe/MIME header/CLSID extension attack, script attacks, ActiveX/Java/Flash attacks, web bugs, fragmented message attack, etc. DetailsDownload trialBuy now ($19.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German
Vendor: ZZEE
9. TweakSEC
TweakSEC is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful system configuration changes. DetailsDownload trial (Demo: 600 KB) Buy now ($14.85) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: Karlis Blumentals
Tauscan is a powerful Trojan Horse detection and removal engine capable of detecting every known type of backdoor that can threaten your system. It works unobtrusively in the background to prevent attack and uses minimal system resources.
11. PwlTool
If, while entering a password, you ask Windows to save it, Windows saves a password in a PWL file. PwlTool uses brute-force attack (fastest!) or dictionary search to recover a password. DetailsDownload trial (Demo: 770 KB) Buy now ($40.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: LastBit Software
Tauscan is a powerful Trojan Horse detection and removal engine capable of detecting every known type of backdoor that can threaten your system. It works unobtrusively in the background to prevent attack and uses minimal system resources.
This is the software program you must have on a bootable disk or CD at any time if you care about your data safety and wish to be fully armed and ready for any personal, hard- or software failure, virus attack or hacker's intrusive destruction.
DetailsDownload trial (Full version: 7.6 MB) Buy now ($29.99) Find similar
Platform: Windows 3.1x, Windows 95, MS DOS, Unix / Linux, OS/2, Novell Netware, BeOS, Platform independent, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Acronis, Inc.
14. F-22 Raptor: Predator of the Sky Screensaver
Unlike any fighter before it, the F-22 is designed to allow its pilot to attack... with abandonment at never before achieved angles of attack. Armament: One M61A2 20 millimeter multibarrel cannon; internal stations can carry AIM-9 infrared (heat seeking) air-to-air missiles and AIM-120 radar-guided air-to-air missiles or 1,000 pound Joint Direct Attack Munitions (JDAMS); external stations can carry additional stores. DetailsDownload trialBuy now ($8.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Cyber Artists Studios