finds you similar websites
auto-suggest    top sites

May 17th, 2024

11 Popular Sites Like Lifelock

Our robot has examined the internet and found several popular security and identitytheft sites like Lifelock. Come by and explore other websites that complement Lifelock.

Displaying 41 to 50 of 500 alternatives to Lifelock. (Updated: May 17th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Lifelock:
  Identity Theft Prevention – Identity Theft ...
Identity Theft Prevention & Identity Theft Protection. Stop Identity Theft with LifeLock. LifeLock can guarantee identity theft never happens to you.
http://www.lifelock.com/
popularity:
security
identitytheft
identity
privacy
credit
fraud
theft
finance
business
protection
new search by a custom tag signature
  How to Bypass Most Firewall Restrictions and Access the Internet Privately
How to Surf the Internet at Work (or School) Privately (Using SSH and an HTTP Proxy Server) Get ... Copyright 2002-2008 BuzzSurf.com - All rights reserved. ...
similarity:
popularity:
security
firewall
internet
privacy
howto
networking
ssh
proxy
web
hacking
  TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
  Torpark
PlanetLab Node: torpark.nfshost.com.nyud.net. by garrettp - 14 FEB 2009 8:33 AM GMT ... http://torpark.nfshost.com.nyud.net/ © 2008 iterasi. All rights reserved. ...
similarity:
popularity:
security
privacy
anonymous
firefox
software
tor
tools
browser
internet
proxy
  Home | Trusteer
No information avaiable
similarity:
popularity:
security
finance
software
banking
privacy
freeware
bank
infosec
trust
phishing
  Higgins Trust Framework Project Home
No information avaiable
similarity:
popularity:
identity
security
higgins
framework
eclipse
opensource
trust
authentication
software
openid
  Phoenix Labs » PeerGuardian 2
If your question isn't answered in our FAQ, we are always happy to help in our ... Consider donating to help pay for our servers and further the development of ...
similarity:
popularity:
p2p
security
privacy
software
bittorrent
tools
windows
freeware
torrent
network
  How to Really Browse Without Leaving a Trace - Windows - Lifehacker
Think that your browser's private mode keeps your browsing completely private? Not so! More often than not, you're still leaving traces of your browsing ...
similarity:
popularity:
privacy
security
lifehacker
internet
howto
tips
firefox
browsing
browser
software
  Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
  JAP -- ANONYMITY & PRIVACY
Acts as a local proxy between the browser and the insecure Internet. ... JAP (called JonDo in the scope of the new ... WWW: http://anon.inf.tu-dresden.de ...
similarity:
popularity:
privacy
security
proxy
anonymous
internet
software
web
tools
anonymity
free
  OSF DataLossDB | Data Loss News, Statistics, and Research
... with the move to Open Security Foundation's DataLossDB.org, asks for contributions ... contained within the site, please contact curators@datalossdb.org. ...
similarity:
popularity:
security
privacy
statistics
database
research
data
reference
loss
hacks
dataloss
< prev ... 1 2 3 4 5 6 7 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.