|
|
|
Security Icon Set is a collection of attractive toolbar and menu icons for security related software.
Security icons come in all popular formats and sizes, so you'll certainly find the one suiting your needs. The icons are delivered in sizes 16x16, 24x24, 32x32, 48x48 and also 256x256 used for Windows Vista. The icons come in two color variants: 256 colors and True Color with semi-transparency. They also have several file formats, such as ICO, PNG, GIF and BMP.
Security Icon Set
Login |
Keyboard |
Signature |
Handshake |
Stamp |
Rectangular stamp |
Secrecy |
Access key |
Key |
Open key |
Save key |
Modify key |
Add key |
Remove key |
Refresh key |
Wrong key |
Valid key |
No key |
Key status |
Delete key |
Apply key |
Temporary key |
Export key |
Import key |
Key copy |
Registration |
Keys |
Car key |
Car keys |
Lock |
Unlock |
Key and lock |
Lock v2 |
Open lock v2 |
Lock v3 |
PGP protection |
Encryption |
Decryption |
Overlay lock |
Local security policy |
Locked notebook |
Locked computer |
Locked printer |
Locked keyboard |
Locked Internet |
Locked CD |
Locked floppy |
Locked hard disk |
Locked USB-drive |
Locked PCMCIA device |
Locked telephone |
Locked smartcard |
Locked device |
Locked sim-card |
Locked EEPROM-chip |
Secured document |
Internet access |
Trinket |
Overlay key |
Secure printer |
Secure PCMCIA device |
Secure device |
Secure smartcard |
Secure sim-card |
Secure EEPROM-chip |
Safecrack |
Safe |
Shield |
Shield and sword |
Shield v2 |
Shield v3 |
Swords |
Shredder |
Bar-code scanner |
Card terminal |
VISA card |
Credit cards |
Personal smartcard |
Smartcard |
Sim-card |
EEPROM-chip |
Bar-code |
Access |
Computer |
Notebook |
Visual commu- nication |
Printer |
Fax |
Phone |
Telephone |
Telephone receiver |
Portable radio transmitter |
Cell phones |
Phone support |
Voice identifi- cation |
Monitor and phone |
Disconnect database |
PC-PDA synchro- nization |
PC-Web synchro- nization |
Data transmission |
Finger-print |
Finger-print scanning |
Finger-print scanner |
Web-camera |
Web-camera v2 |
PCMCIA device |
Computer doctor |
Admin |
User |
Locked user |
User group |
Locked users |
Green user |
User profile |
Programmer |
Hacker |
Key keeper |
Engineer |
Managers |
Security guard |
Spy |
Detective |
Police-officer |
Army officer |
Thief |
Prisoner |
Handcuffs |
Open file |
Open |
Save file |
Writing pencil |
Clear |
Bulldozer |
Help |
Properties |
Attach |
E-mail |
Mail |
Mail box |
Certificate |
List |
Report |
Reports |
Blanks |
Card file |
Event manager |
Yes |
Yes v2 |
Yes v3 |
Add |
Add v2 |
Remove |
Info |
Warning |
Question |
Erase |
Delete |
Delete v2 |
No |
No entry |
Cancel |
Stop |
Turn off |
Red user folder |
User folder |
User folder v2 |
Empty dustbin |
Full dustbin |
First-aid |
Ambulance car |
Tank |
Radio transmitter |
Radio transmitter v2 |
Cable |
Wireless |
Network connection |
Photo earth |
Earth |
Earth v2 |
Globe |
Internet application |
Recycling |
Firewall |
Firewall v2 |
Umbrella |
Spam-filter |
Database |
Data destruction |
Locked database |
Unlocked database |
Database security |
Destruction of documents |
Burning trash can |
Bug |
Radio bug |
Radiation 3d |
Eye |
Ear |
Stethoscope |
Head-phones |
Brain |
Brain probe |
Bones |
Death |
Grave |
Syringe |
Virus |
Four-leafed clover |
Scales |
Open door |
Closed door |
Open barrier |
Barrier |
Shared folder |
Shared folder v2 |
Shared folder v4 |
Locked folder v2 |
Locked folder v4 |
Folder - no entry |
|
Download demo icons
Purchase this icon set for $49.00 now!
You can also buy individual icons to suit your needs. Each icon is $1 when purchased individually. Please contact us with the icon names you wish to purchase and we will process your order immediately. (Note: Minimum purchase is 2 icons.)
Get individual icons now!
Security Icons Can Effectively Function ss Visual Aids
Security icons are used in applications and in software systems that deal with security aspect. These icons range in function such as secure icons, disk icon, handshake icon, unlock icon, etc. and come in various sizes and resolutions to fit your usage pattern. They can be used as 16x16 icons all the way up to 256x256 size (different sizes).
Security Icon set is a collection of intuitive and attractive toolbar and menu icons related to security related software application systems.
These secure icons come in different formats and sizes. The icons are in sizes 16x16, 32x32, 48x48, 256x256 etc. The 256x256 icons are used with Windows Vista. The 16x16 icons can be used in various other applications and software programs. The secure icons also come in two color variants: 256 colors and true color with semi transparency.
There are various icons that are available in the security icons set to denote key security-oriented concepts, such as open key, access key, add key, modify key, remove key, key copy, apply key, delete key, sim card, data destruction, open door, closed door, locked folder, etc.
The disk icon is used to represent a secure disk in the context of security icon sets. The disk icon can be shown to be active, in which case it means the application is writing to the disk and that the user should wait, and also, it is possible that the disk icon can be shown as inactive implying that the application is not currently accessing the disk.
The 16x16 icons can convey and indicate meaning clearly. They may also imply abstract or deeper concepts. These icons are unique in every aspect and are an aid to the visual understanding of the users in question for the security software or system being developed or used.
The handshake icon used in security context is used to denote some transaction that is just getting started and in the initial stages of conversation between two computer entities. The handshake icon thus signifies that communication has started, in the context of the software system in question. Thus it is an important system icon.
Similarly, the unlock icon is used to denote that the security key is open in order to allow access to the user or entity in question. The unlock icon can be used to also signify that the application or resource is unprotected.
Thus these security related icons are effectively used to convey security-related meanings and concepts.
|
Copyright © 2000-2022 Aha-Soft. All rights reserved.
|
|
Individual stock Icons
You can buy individual ready-made icons to suit your needs. Each icon is $1 when purchased individually.
Get stock icons now!
IconLover is our pick. It allows you to design and edit all kinds of graphics required in the software development cycle, including icons, static and animated cursors and interface elements - all these graphics can now be designed in a single application.
Business Icon Set will make your software and web products look more modern and attractive. File formats included into the set are Windows icons, GIF and PNG images.
ArtIcons Pro is an advanced icon-specific utility for Windows. It supports ICO, BMP, PNG, GIF, PSD, XPM, XBM, WBMP, CUR and ANI image formats and allows you to manage icon libraries.
ArtCursors allows you to find, create, edit, import and export cursors and manage cursor libraries. It supports static and animated cursors.
Any to Icon converts icons and cursors into BMP, JPG, PNG, GIF, ICO, CUR and other formats. This wizard can find icons and make images for use on Web pages.
|
|
|
|