Kaspersky Anti-Virus 6.0 protects against viruses, trojans, Internet-worms, adware and spyware Key Features Antivirus protection Protection for email. Kaspersky Anti-Virus 6.0 scans email traffic for viruses according to the protocol via which it is sent (POP3, IMAP and NNTP for incoming mail and SMTP for outgoing mail) on any mail program, while plug-ins and treatment for viruses in Microsoft Outlook and Microsoft Outlook Express mail databases are offered. Scanning of Internet traffic. All HTTP Internet traffic is scanned for viruses in real-time, ensuring that infected objects are not saved to the computerís hard disk. Protection for file systems. Individual files, catalogues and disks can be designated for antivirus scanning. Users can limit antivirus scanning to critical areas of the operating system and startup objects to ensure that attention is focused on the most vulnerable areas of the system. Proactive protection Control over changes in the file system. With Kaspersky Anti-Virus 6.0 it is possible to compile lists of applications, the component structure of which will be controlled, thus helping to prevent malicious programs from undermining the integrity of the application. Monitors processes in the memory. The product monitors the activity of programs and processes that have been launched in the computerís memory and, at the same time, warns users of any dangerous, suspicious or hidden processes (that is, rootkits), and of unauthorized changes in routine processes. Monitors changes in the operating system registry. The application controls the status of the system registry and notifies users of any suspicious objects or attempts to create hidden keys in the registry. Blocks dangerous macros. Proactive protection affords control over the operation of macros based on Visual Basic for Applications in Microsoft Office documents and blocks dangerous macro-commands from being executed. System restore. The system can be restored after malicious activity. Kaspersky Anti-Virus 6.0 can roll back any changes made to the system by ma
Keywords : antivirus, anti-virus, anti virus, free antivirus, free anti-virus, free anti virus, free antivirus download, free anti-virus download, antivirus download, anti-virus download, anti virus download
Sentry Firewall CD Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.
recover Recover is a utility which automates some steps as described in the Ext2fs-Undeletion howto in order to recover a lost file.
PaiPix Linux PaiPix Linux is a compilation of Free Software, based on KNOPPIX live linux, that is meant to be used in any environment but with special emphasis on science and technologies.
gtk-splitter gtk-splitter can split files into smaller pieces and combine them back together. It can also generate a DOS batch file so that the split files can be combined on DOS/Windows systems. gtk-splitter is good for working around file limitations with floppy disks, email attachments, etc.
LinNeighborhood It's a GUI frontend running over Samba and Smbmount using the Gimp Toolkit. It requires the GTK+ libraries installed on your system. To use internationalization you need GNU gettext on your machine.
Avahi Avahi is a framework for Multicast DNS Service Discovery on Linux. It allows programs to publish and discover services and hosts running on a local network with no specific configuration.
LineControl Server LineControl allows you to remotely control the Internet connection of a Linux masquerading server using multiple clients. It takes care with the number of clients using the connection and decides upon this number whether the connection should be up or down.
Serbert Serbert is a command line utility which performs a Bit Error Rate Test (BERT) on serial lines for Unix and it's variants. It does this by transmitting bytes, and waiting for their uncorrupted return.