home *** CD-ROM | disk | FTP | other *** search
/ Gold Medal Software 2 / Gold Medal Software Volume 2 (Gold Medal) (1994).iso / allfiles / dir51 < prev    next >
File List  |  1994-03-17  |  13KB  |  177 lines

  1. Filename       Size      Date    Description of File Contents
  2. ============ ========  ========  ============================================
  3. 30A04.ARJ       99703  02-16-94  Norton Anti-Virus 3.0 update for February
  4.                                | Files: 3  02-01-94...02-01-94  New: 3
  5. BLACBOX.ARJ     22075  10-06-93  Black Box 1.1 [BLACBOX] (Algos Software; $10)
  6.                                | is a file encryption program. No lengthy
  7.                                | description is necessary. When encrypting a
  8.                                | file you do not have to specify output. The
  9.                                | file will get encrypted but the name will not
  10.                                | change. Black Box "remembers" which files
  11.                                | have been encrypted by a tag attached to each
  12.                                | encrypted file.
  13. BULL_210.ARJ    30415  12-01-93  Fprot-210 Virus Bulletin
  14.                                | Files: 2  11-17-93...11-17-93  New: 2
  15. CRYPSHAK.ARJ   178662  08-14-93  Shakespeare Cryptographic Programs 2.4: This
  16.                                | is an introduction to an ingenious and
  17.                                | creative cipher system to be found in the
  18.                                | works of William Shakespeare. It was invented
  19.                                | by his contemporary, Francis Bacon. Author:
  20.                                | Penn Leary.
  21. DRKR03C.ARJ     53821  02-11-94  DR KRYPTON: ver 0.39 ($10 to $100) - Uses one
  22.                                | to ten (security level varies) personal
  23.                                | encryption numbers to encrypt\decrypt your
  24.                                | file.  Each number is between point
  25.                                | 000000000000000000000000000000000000000000001
  26.                                | and 3402823000000000000000000000000000000.
  27.                                | In American English, that's between one plus
  28.                                | quattuodecillionth and three hundred plus
  29.                                | undecillion.  No record is kept of your
  30.                                | numbers.  The original file is overwritten.
  31. FAKEOUT2.ARJ    51813  09-18-93  .-------------------------.
  32.                                | |   *- FaKeOuT v2.0 -*    |
  33.                                | | Keep out other people   |
  34.                                | |  from entering your PC  |
  35.                                | |   with this nifty util! |
  36.                                | `-------------------------'
  37.                                | Files: 7  09-03-93...09-05-93  New: 3
  38. FE12.ARJ        10586  02-11-94  ############# Fast Encrypt 1.2 ##############
  39.                                | New version of the best Encryption program!
  40.                                | Includes full command line support.  Written
  41.                                | totally in 386 Assembler (VERY FAST!).  Uses
  42.                                | 128 bit keys making it extremely secure.
  43.                                | 386/486 ONLY.  Includes full documentation.
  44. FP_211.ARJ     444958  02-17-94  F-PROT version 2.11 - February 1994
  45.                                | The F-PROT anti-virus package contains a
  46.                                | virus scanner combined with a disinfection
  47.                                | program, as well as a resident monitoring
  48.                                | program for intercepting known viruses.
  49.                                | This program is free of charge for private
  50.                                | users, but others are required to register
  51.                                | or obtain the 'Professional' version - see
  52. FSTCRYP1.ARJ    12569  10-19-93  Fast Encrypt 1.0 Excellent new
  53.                                | Encryption/Decryption system. Much better
  54.                                | than DES or RSA. Uses 128 bit key, extremely
  55.                                | secure. Very fast, was written entirely in
  56.                                | 386 Assembler. Full 32 bit, 386/486 ONLY.
  57.                                | Includes documentation.
  58.                                | Last revision date in archive: 10-02-1993.
  59. FXREP310.ARJ    82102  09-17-93  FxREPEAT 3.10: automates virus scanning with
  60.                                | Frisk Software's F-PROT program; very useful
  61.                                | on LANs; scanning is accomplished using a
  62.                                | user-defined date or time interval; Datachip
  63. HACK9309.ARJ   106129  09-17-93  The Hack Report for September, 1993.
  64.                                | A monthly list of potentially dangerous files
  65.                                | including hacks, hoaxes, Trojan Horses, and
  66.                                | pirated commercial files found posted for
  67.                                | download on BBS systems worldwide.
  68.                                | Files: 13  09-12-93...09-12-93  New: 8
  69. INVRC501.ARJ   508588  08-26-93  InVircible Anti-Virus, Version 5.01
  70.                                | (January 30, 1993).  This anti-virus
  71.                                | software is much more sophisticated and
  72.                                | effective than any other anti-virus
  73.                                | product available or anticipated.  It is
  74.                                | the only anti-virus package able to state
  75.                                | that every single virus in the three known
  76.                                | virus classes (Boot Sector, FAT/Directory,
  77.                                | Executables) has been to date detected and
  78.                                | removed -- a track record that dates back
  79.                                | to the Autumn of 1990!  InVircible
  80.                                | implements Adaptive Expert System (AES)
  81.                                | technology that is uncanny in the ability
  82.                                | to absolutely detect viruses and then
  83.                                | completely and exactly restore the
  84.                                | infected executables, and doing this
  85.                                | without needing to "know" or "name" the
  86.                                | infecting virus.
  87.                                | AES technology omits the need to obtain
  88.                                | regular "updates", and it omits the need
  89.                                | to move your executables, and it omits the
  90.                                | need to run a TSR or device driver, and it
  91.                                | omits the need to install a hardware card,
  92.                                | and it omits the need to worry about
  93.                                | whether your anti-virus software "knows"
  94.                                | the specific virus bugging your PC.
  95.                                | Once InVircible secures an executable, you
  96.                                | will absolutely know whether it has been
  97.                                | attacked by a virus.  The Shareware
  98.                                | edition of InVircible is identical to the
  99.                                | full version.  Shareware InVircible gives
  100.                                | the information needed to delete and
  101.                                | replace infected executables.  The full
  102.                                | version adds the option to completely
  103.                                | restore infected executables 99.99+% of
  104.                                | the time (close to being perfect!).  All
  105.                                | restorations are exact, so you can't tell
  106.                                | that a virus infection had occurred!  A
  107.                                | scanner (which AES technology does not
  108.                                | depend on) that doesn't need updating is
  109.                                | included for those common viruses with a
  110.                                | name.  InVircible is effective against
  111.                                | polymorphic, mutating, encrypted, and
  112.                                | compound virus attacks.  If an impeccable
  113.                                | track record dating back to 1990 sounds
  114.                                | better than promises of effectiveness and
  115.                                | perpetual purchases of "updates", then
  116.                                | InVircible is for you.
  117. LXREP302.ARJ    80578  10-02-93  LxREPEAT v3.02 - Automate virus scanning
  118.                                | using Intel's LPScan program (part of the
  119.                                | LANProtect product). Scanning of workstation
  120.                                | drives is accomplished using a LAN Manager's
  121.                                | defined Date or Time interval.  Also can
  122.                                | prevent user aborting LPScan using the <Esc>
  123.                                | or <Ctrl><Brk> keys.  When a virus is found,
  124.                                | an alarm is sounded, a message is displayed
  125.                                | and the keyboard locked.  Easy checkout with
  126.                                | supplied tools.  From DATACHIP.
  127.                                | Files: 7  Oldest: 6/11/93  Newest: 6/11/93
  128. PASS_1.ARJ      56248  09-06-93  Ultimate Password Protection For When You
  129.                                | Boot Up Your System. See Password.Doc For
  130.                                | Complete Information. 01-06-92.08-12-93 New:
  131.                                | . Last revision date in archive: 08-12-1993.
  132. PCV45F.ARJ     218221  10-06-93  PC-Vault v4.5f <ASP> Hard Disk Security Asks
  133.                                | for user name and/or password on boot. No
  134.                                | hard disk access without password even on
  135.                                | floppy boot.  LunchBreak feature blanks
  136.                                | screen/locks keyboard when hot key is
  137.                                | pressed or when keyboard and mouse have been
  138.                                | idle for a user specified time.  Many other
  139.                                | features. Supports an administrator and up
  140.                                | to 12 users.
  141. PGP23A.ARJ     206645  07-28-93  Pretty Good Privacy v2.3A - renowned public
  142.                                | key encryption package - use to secure your
  143.                                | messages.
  144. PGP23SRC.ARJ   509665  07-30-93  Pretty Good Privacy v2.3 - complete source
  145. PIGAS.ARJ      197189  09-30-93  PiGAS SECURITY Version 1.02 <ASP> \
  146.                                | Protect the information in your PC against
  147.                                | unauthorized access. The protected data
  148.                                | becomes totally unavailable even when using
  149.                                | a powerful disk utility or booting from a
  150.                                | diskette. Unlimited number of users. Full
  151.                                | report about authorized/unauthorized activity
  152.                                | in the system. Fast and simple hide/open
  153.                                | operation. No need for the program to be
  154.                                | resident.  From PIGAS Inc. <ASP> $25.
  155. PREXCM31.ARJ    37616  09-02-93  Protect! EXE/COM v.3.1 -  Encrypts & protects
  156.                                | your EXE / COM files, leaving them executable
  157.                                | and making a FILE INTEGRITY CHECK using a CRC
  158.                                | when they run.  Prevents REVERSE ENGINEERING,
  159.                                | HACKING,  and MODIFICATION of programs.  This
  160.                                | new version fixes many  previous bugs & works
  161.                                | more  smoothly.  More stable and  secure than
  162.                                | ever. Req: LZEXE/PKLITE/etc. for compression.
  163. TBAVW610.ARJ   131670  02-11-94  ThunderByte Anti-Virus for Windows Ver 6.10
  164.                                | One of the BEST Virus Detection Systems.
  165.                                | Files: 11  01-28-94...01-28-94  New: 10
  166. TBAVX_61.ARJ    88312  02-16-94  TBAVX for specific CPU's.
  167.                                | Last revision date in archive: 01-10-1994.
  168. TBNL610.ARJ    108111  02-16-94  Dutch language files for TBAV610.
  169.                                | Last revision date in archive: 01-08-1994.
  170. VIREX29.ARJ    164739  08-16-93  Virex version 2.9 virus detect program
  171. VSUMX401.ARJ   812136  02-09-94  PATRICIA HOFFMAN'S VSUM VIRUS INFORMATION
  172.                                | SUMMARY INDEX.  A COMPENDIUM OF HYPERTEXT
  173.                                | INFORMATION ABOUT VIRUSES, THEIR HISTORY,
  174.                                | EFFECTS, CHARACTERISTICS, HOW TO REMOVE, ETC.
  175.                                | UPLOADED BY NORMAN HIRSCH, NH&A, AUTHORIZED
  176.                                | VSUM AGENT.  TO LICENSE VSUM, CONTACT NH&A
  177.