Files | ||||
File Name | Rating | Downloads | ||
![]() |
Microsoft Process Monitor v3.50 Microsoft Process Monitor v3.50 Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit. Overview of Process Monitor Capabilities Process Monitor includes powerful monitoring and filtering capabilities, including: More data captured for operation input and output parameters Non-destructive filters allow you to set filters without losing data Capture of thread stacks for each operation make it possible in many cases to identify the root cause of an operation Reliable capture of process details, including image path, command line, user and session ID Configurable and moveable columns for any event property Filters can be set for any data field, including fields not configured as columns Advanced logging architecture scales to tens of millions of captured events and gigabytes of log data Process tree tool shows relationship of all processes referenced in a trace Native log format preserves all data for loading in a different Process Monitor instance Process tooltip for easy viewing of process image information Detail tooltip allows convenient access to formatted data that doesn't fit in the column Cancellable search Boot time logging of all operations The best way to become familiar ... |
![]() |
2,788 | May 05, 2019 Microsoft Corp. ![]() |
![]() |
Password Safe v3.50 32bit Password Safe v3.50 32bit How many passwords do you have to secure? Start your safe and simplified digital life Free open source software Installation in minutes on Vista, 7, 8 and 10 Designed by renowned security technologist Bruce Schneier Over 4 million downloads Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work). Click here to visit the author's website. |
![]() |
749 | Oct 09, 2019 Bruce Schneier ![]() |
![]() |
Password Safe v3.50 64bit Password Safe v3.50 64bit How many passwords do you have to secure? Start your safe and simplified digital life Free open source software Installation in minutes on Vista, 7, 8 and 10 Designed by renowned security technologist Bruce Schneier Over 4 million downloads Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work). Click here to visit the author's website. |
![]() |
2,864 | Oct 09, 2019 Bruce Schneier ![]() |
Showing rows 1 to 3 of 3 | Showing Page 1 of 1 | 1 |
Copyright (c) 2019