ShareAlarm 2.2 freeware

... and is easy to use.The program have firewall system that allows to block any unwanted connection to your shared resources. ...

Author Nsasoft LLC.
Released 2005-10-10
Filesize 444 kB
Downloads 1547
OS Windows 2000, Windows XP, Windows 2003
Installation No Install Support
Keywords network tool, network software, net tools, network monitoring, hacking, port scan, network utils, network security, port scanner, intrusion detection, event log, computer security, enterprise security, information security, internet scanner, security software, freeware, shareware
Users' rating
(12 rating)
ShareAlarmAccess ControlWindows 2000, Windows XP, Windows 2003
ShareAlarm - system information Freeware Download Notice

ShareAlarm Free Download - we do not host any ShareAlarm torrent files or links of ShareAlarm on rapidshare.com, depositfiles.com, megaupload.com etc. All ShareAlarm download links are direct ShareAlarm download from publisher site or their selected mirrors.

ShareAlarm freeware - The Latest User Reviews
ShareAlarm freeware - The Latest Versions History
2.2 Oct 10, 2005 Minor Update Unspecified updates, enhancements, fixes

Most popular Access Control freeware downloads

ShareAlarm

2.2 freeware download

... and is easy to use.The program have firewall system that allows to block any unwanted connection to your shared resources. ...

Wujie

19.02 freeware download

... together with the GIFT (a dynamic node-proxy anti-jamming system); * requires no installation or change in system setting; UltraSurf’s Chinese name, Wujie – meaning ... in Chinese. UltraSurf is a robust anti-censorship system evolved from the lasting battle between GFW and ...

KeepLock

1.2.2 freeware download

... free security app. You can lock important apps, system settings, and even your gallery. You can also ... making in-app purchases by accident, or deleting important information. If anyone were to try to unlock your ...

Activity and Authentication Analyzer

1.64.0.10 freeware download

... called in brief “statistics”, as the method of information (intelligence data) collection is applied either for the preliminary exploring or when the access to information (posted message, telephone talk) is impossible or unwanted. ...