icon

Search Results for "test your computer security"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Zemana AntiLogger screenshot

icon Zemana AntiLogger

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Zemana AntiLogger protects your system from keyloggers and other malware with the intent to steal your personal information. Rather than relying on signature updates to recognize known malware, the program uses proacti... more Category: Misc. Security Tools

Malware Defender screenshot

icon Malware Defender

  • Our Rating: stars
  • User Rating: 4 (1)
  • Popularity: 33

Malware Defender is a hands-on HIPS (Host Intrusion Prevention System) for advanced users. It enables you to create rules that can help you protect your computer from malware, Trojans, spyware and other threats. The pro... more Category: Misc. Security Tools

Identity Cloaker screenshot

icon Identity Cloaker

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Identity Cloaker is an Internet Privacy and Anonymity Protection Service that enables you to hide your real IP address through a network of private anonymous proxy servers located in different countries. For additional ... more Category: Misc. Security Tools

The Tube screenshot

icon The Tube

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 44

The Tube is a SSH Tunneling tool that makes it easy to set up one or more secure tunnel connections between a SSH server and a remote TCP host. The program can auto-configure the proxy settings for... more Category: Misc. Security Tools

Rohos Logon Key screenshot

icon Rohos Logon Key

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Rohos Logon Key enables you to log into your computer by inserting a USB key instead of typing your password. The program will place a security token on your USB drive and add an additional `Login by USB` option to the ... more Category: Misc. Security Tools

east-tec Eraser screenshot

icon east-tec Eraser

  • Our Rating: stars
  • User Rating: 4 (3)
  • Popularity: 44

East-Tec Eraser is designed to completely eliminate sensitive data from your computer. It goes beyond U.S. Department of Defense security standards, wiping the files beyond recovery, scrambling name and dates and removi... more Category: Internet Tracks Cleanup

AVG PC TuneUP screenshot

icon AVG PC TuneUP

  • Our Rating: stars
  • User Rating: 5 (15)
  • Popularity: 77

AVG PC TuneUP (formerly TuneUp Utilities) optimizes the performance of your computer, corrects problems and helps you to customize your system to suit your needs. It combines important aspects of system configuration, s... more Category: All-In-One Tools

webcamXP PRO screenshot

icon webcamXP PRO

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 55

webcamXP PRO allows you run one or more live streaming webcams without having to set up a web server on your computer. In addition, it offers motion detection with optional alerts, allowing you to monitor your home whil... more Category: Web Cam Tools

MessenPass screenshot

icon MessenPass

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 11

MessenPass allows you to recover your password(s) from a wide variety of popular Instant Messenger programs, including MSN/Live Messenger, Windows Messenger, Yahoo Messenger (Versions 5.x and 6.x), ICQ Lite 4.x/5.x/2003... more Category: Password Recovery

O&O SafeErase screenshot

icon O&O SafeErase

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

O&O SafeErase is a secure file deletion tool that integrates into the Windows Explorer right-click menu, and allows you to delete files beyond the possibility of recovery. It offers 4 security levels, ranging from r... more Category: Misc. Utilities

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10


Need more search power? Search our site with Google! See results for test your computer security