corporate high-performance SMTP server. The program has security and anti-spam features. From Ixis Research, Ltd. Easy Desktop Keeper 1.8 This is an utility you can use to prevent users from changing your desktop items such as icons, files, folders and wallpaper. You can also save you desktop layouts to files and easily get your desktop items back to their original positions just with a click of mouse. Switching between layouts is also possible. From Ixis Research, Ltd. File & Folder Protector 2.5 File and Folder Protector is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/2000/XP at Windows kernel level. An easy-to-use user interface alows you to allocate access to your files and folders between users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that this program will never lose your data, as may happen if you use other file- and folder- protecting software. PC Lockup 2.1 It is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. An allowed time schedule and duration can be defined for each user to restrict access to your PC in definite hours. PC LockUp also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security. This program is very easy to use. Public PC Desktop 3.3 Create and manage a secure locked up kiosk workstation for internet cafe, information terminals, public libraries, hotel and airport terminals and so on. This program is ideal for places where a lot of people will be using the computer and the owner of the workstations does not want to have the hassles of reinstalling the environment From Ixis Research, Ltd. Security Administrator 10.5 Password-protected security utility for Windows. Restrict access to Control Panel, disable Start Menu items, hide drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows, disable running applications, and secure Internet Explorer. From Ixis Research, Ltd. Download: Code: http://www.megaupload.com/?d=0II0GBY1 Enjoy! Password Recovery Utilities AIO Included: 1.) LostPassword Passware Kit v8.0.2514 Enterprise Edition 2.) ActMon Password Recovery XP 4.03 3.) Accent Office Password Recovery 2.5.0.48 4.) Easy Password Recovery 2.01 5.) Accent Word Password Recovery 6.) ElcomSoft Distributed Password Recovery v1.674 7.) Visual Zip Password Recovery Processor v6.2 8.) MSN and Google Talk Password Recovery v1.5 9.) PDF Password Remover v2.5.05312006 10.) KRyLack Password Recovery v2.11.03 11.) MS Access Password Recovery v1.01 12.) FTP Password Recovery Master 1.02 13.) Advanced Office Password Recovery ver.3.12 14.) Advanced RAR Password Recovery 15.) MS Outlook Express Password Recovery 16.) LostPassword Passware Kit v8.0 Portable Download Links: ((31MB)) Code: http://rapidshare.com/files/26891935/AD_P_R.rar Mirror Code: http://www.mediafire.com/?8wl5jjl3jkh mirrors http://depositfiles.com/files/790771 or http://www.filefactory.com/file/dc468e Security Tool AIO 2007 May (34 in 1)by Cyber Godfather Download: Code: http://rapidshare.com/files/33825688/AIO_security_tool__2007__34_in_1_cyberw arez.rar.html Pass: www.cyberwarez.info Security Tools 2 AIO by canalman Quote: This AIO i made for people who want to protect/clean their pc from all sorts of un- deleteable malware/spyware/dialers/phishing garbage etc I tried to combined 19 useful tools that will help you do the job. There are many anti-spyware scanners (free/AIO) so i left them out. SOME PROGRAMS ARE FOR THE MORE EXPERIENCED USERS so use it only if you know what youre doing! A-squared Anti-Dialer No chance for the Dialer rip off! Protect your PC with a-squared Anti-Dialer from manipulated dial up connections, which can cause a phone bill of several hundred dollars quickly. a-squared Anti-Dialer provides a complete defense against Dialers. Scan all files on your harddisks for Dialer behavior using the Dialer scanner. The integrated background guard protects the PC from new infections. As soon as a potential Dialer creates or manipulates a dial up connection, the a-squared Anti- Dialer will alert it. AirSnare is another tool to add to your Wireless Intrusion Detection Toolbox. AirSnare will alert you to unfriendly MAC addresses on your network and will also alert you to DHCP requests taking place. If AirSnare detects an unfriendly MAC address you have the option of tracking the MAC address's access to IP addresses and ports or by launching Ethereal upon a detection. Anti-Keylogger Elite (AKE) is a utility designed to detect keyloggers and give you the power to Prevent Or Allow the keylogger to function. AKE can prevent known and unknown keyloggers from infiltrating your computer Logging everything you type on your keyboard and see on screen. FileASSASSIN can delete locked files on your system. It uses advanced techniques to unload modules, close remote handles, and terminate processes to allow the optional removal of the file. I Hate Keyloggers will prevent your typing from being recorded by malicious software such as key loggers, spyware, remote administration tools. The software will disable hook- based keyloggers so the keyloggers will not be able to capture your keystrokes. This way you can type sensitive information (passwords, email, credit card number, etc) with confidence. The log file of the key logger will be empty (your keystrokes are not recorded). Keylogger Detector is easy-to-use tool to detect most types of keylogger and kill them. It is the first product of its kind in the world that based on windows HOOK technique, and does not reply on signature matching, so it can detect various types of keylogger possibly included in any commercial, shareware, freeware products, as well as in Trojan horses, viruses of very different operation principles. PhishGuard is a service that detects and rapidly disables Internet "phishing" or "spoofing" attacks designed to steal critical financial data. PhishGuard works with all popular browsers on Microsoft Windows computers.Phishing attacks use fraudulent websites and emails that mimic well-known organizations in order to trick unsuspecting Internet users. A simple login or account number entry screen becomes a sophisticated trap. By assuming you are dealing with a trusted party, you can reveal financial information including credit card numbers, bank accounts, passwords, and social security numbers to the "bad guys". This type of attack is very difficult for the typical person to detect, as the scammer’s emails and websites mimic the exact style and graphics of the spoofed company, and appear genuine. Sensitive financial information disclosed to scammers is used to make fraudulent financial transactions and to enable long-term identity theft. Privacy Vault 2007 Lock down and hide sensitive data on you machine. Privacy Vault allows you to store pins, passwords, financial information, videos and media or just about anything else in a hidden and encrypted location. Once locked down, only your password can unlock the vault! RootkitRevealer is an advanced rootkit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects all persistent rootkits published at www.rootkit.com, including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). If you use it to identify the presence of a rootkit please let us know! . account number entry screen becomes a sophisticated trap. By assuming you are dealing with a trusted party, you can reveal financial information including credit card numbers, bank accounts, passwords,