MiTAC Announced the First 64-Bit ARM® Processor-Based Servers – 7 Star Server System During Computex 2013
(June 4th 2013, Taipei, Taiwan)-MiTAC International Corp. (MiTAC), a leading ICT manufacturing company, is pleased to announce its new...
Sandboxie adds full 64-bit protection, improves compatibility
Sandboxie 4.02 is the latest edition of the powerful shareware sandbox, which allows you to run programs in an isolated environment...
Update for Windows 8 for x64-based Systems (KB2851998)
Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the...
Latest Everything Desktop Search beta build introduces 64-bit version
The desktop search engine Everything has been around since 2008. It may come as a surprise that the most recent stable version of the...
New boot firmware a step toward 64-bit Windows RT
A standards organization has created a boot environment for tablets and PCs that could potentially run a 64-bit version of Windows RT.
How to Install VMware vSphere vCenter Server 5.1.0b on Windows Server 2003 R2 X64 SP2
In this video we will install VMware vSphere vCenter Server 5.1.0b using the Simple Install method on Windows Server 2003 R2 X64 SP2
x64 Assembly and C++ Tutorial 61: AVX Negate 128bpp Image
Big thank you to all who've sent in Imogen plugins, they're excellent, Keep em' coming folks! This tutorial we'll look at some of the...
x64 Assembly and C++ Tutorial 60: C++ Negate 128bpp Image
In this tute we'll look at coding a C++ algorithm to negate a 128bpp image. This will be a benchmark to beat for the ASM versions we'll...
Kali Linux 64bit In VMware - Installation Walkthrough / How-to
The purpose of this video is to demonstrate a basic installation of Kali Linux from Offensive Security in a new Virtual Machine guest...
Installing the Java Plugin for 64bit Firefox on CentOS 6.4
Today, I had to install the Java plugin for 64bit Firefox on CentOS 6.4. The procedure wasn’t too bad, but it wasn’t exactly...
Linux x64 Assembly Tutorial 4: Passing Parameters and Coding
In this tute we'll get to coding some little ASM algorithms. First we have to look at how parameters will be passed from C++.
Linux x64 Assembly Tutorial 2: Bits, Bytes and Registers
Today we'll look at integer data types, bits, bytes, words and all that. We'll also look at the general purpose register set. I didn't...
64-bit Security Software, 64-bit Antivirus and 64-bit Firewall
New version! - avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.
New version! - Internet Lock is an access control and password protection software for your internet connections and programs. By using Internet Lock, you can password protect any program from accessing internet, you also can prevent any program from accessing internet.
Meet 9-Lab Removal Tool: it's a software that is completely free with no hidden charges and unexpected offers to invest additional funds. Today there are many security programs that play the game of actually tricking users into purchasing their licenses. They often offer to run a so-called “free scan”, and users are thus being attracted with the word “free”.
New version! - Comodo Internet Security 2012 offers 360° protection against internal and external threats by combining a powerful Antivirus protection, an enterprise class packet filtering firewall, and an advanced host intrusion prevention system called Defense+.
New version! - A network-connected application should not be supposed completely safe if it can be connected from and to any point of a network and/or the internet. Only rare the applications are to be allowed to connect to anywhere. A web browser should not be limited to connect the internet in ordinary circumstances. However, there are situations in which even the web browser should be limited in its connection ability (parental control etc).
This set of tools is a similar to TrueCrypt, RTC allows you to protect and secure your files on secure drive(s) and manipulate it in regular way using any software including Windows Explorer. Using a simple wizard, you create drive / mount it in one click / use Shell extension and more.
New version! CryptoExpert protects your files and folders with a password, securely encrypting data with either the industry-standard AES-256 algorithm or your choice of encryption method. Implementing numerous innovations along with fast on-the-fly operation, CryptoExpert provides higher security, better reliability and easier usability than the transparent NTFS encryption system implemented in the Windows built-in Encrypted File System.
New version! - Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activity and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment.
New version! - VSEncryptor is an easy to use file and text encryption program. You can encrypt any file or text you choose. To access the file (or text) again, you would need access to the password that was used while encrypting.
New version! - BestCrypt Traveller software allows the user quickly accessing encrypted container files created by BestCrypt software. BestCrypt Traveller starts working without installation of the software. The user runs a single executable file (BCTraveller.exe), standard BestCrypt icon appears in Windows system tray where from the user can run commands to mount or dismount container file and create new encrypted container.
New version! - KeyScrambler is a leading anti-keylogging software program. It defeats existing and new keyloggers by encrypting keystrokes at the keyboard driver level and decrypting them in the destination application, leaving keyloggers with entirely indecipherable keys to record.
Ad-Aware Antivirus is a security solution that allows you to combat stealthy online threats and the latest advancements by cyber criminals. Ad-Aware Antivirus protects you from malware that secretly takes control of your computer, resulting in aggressive advertising pop-ups, sluggish computer activity and even identity theft through stolen private information.
New version! - VSUsbLogon allows to login Windows in a secure way via USB device, replacing the password based Windows login. You don’t need to remember and type your Windows password (but your system is still password protected). Users can be automatically logged into Windows as they insert the USB flash drive into the USB port. VSUsbLogon allows you to use PIN code to login Windows when USB device has been connected.
New version! - Avira AntiVir Premium reliably protects you against all threats from viruses, worms, trojans, rootkits, phishings, adware, spyware, bots, and dangerous “drive-by” downloads. Best detection rates and top-class security with several updates every day.
New version! - Kerio WinRoute Firewall is no longer just a network firewall. New features added in versions 6.x and 7.0 make the software a complex tool combining features for local network security, remote network access as well as user Internet access control and monitoring. The name Kerio Control is derived from the user access control feature.
Page 2 of 11
|64bit Windows 7|
|64bit Windows 8|