|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
1. | CHAOS Generator 2.4 (safechaos.com) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
2. | CHAOS Shredder 3.0 (safechaos.com) | ||
your disk, without the possibility to recover it by any practical software or hardware | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
3. | ABC CHAOS 2.71 (safechaos.com) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 42 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | NewWayService 2.19 (orologic.com) | ||
is the Help Desk software solution designed to maximise your service centre or call centre department. Whatever your industry, NewWayService allows you to easily track and manage calls, issues, jobs, requests or work orders. With its very user-friendly environment, no intense training is needed to learn to use it. Flexible, NewWayService adapts itself to your needs | |||
Updated: 3, 2006 | Rating: 0 | Author: Sales Department | Size: 21313 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
6. | CHAOS Shredder 3.0 (safechaos.net) | ||
your disk, without the possibility to recover it by any practical software or hardware | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
7. | CHAOS Generator 2.4 (safechaos.net) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | ABC CHAOS 2.71 (safechaos.net) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 0 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
10. | NewWayService 2.19 (orologic.com) | ||
is the Help Desk software solution designed to maximise your service centre or call centre department. Whatever your industry, NewWayService allows you to easily track and manage calls, issues, jobs, requests or work orders. With its very user-friendly environment, no intense training is needed to learn to use it. Flexible, NewWayService adapts itself to your needs | |||
Updated: 3, 2006 | Rating: 0 | Author: Sales Department | Size: 21313 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
11. | NewWayService 2.19 (orologic.com) | ||
is the Help Desk software solution designed to maximise your service centre or call centre department. Whatever your industry, NewWayService allows you to easily track and manage calls, issues, jobs, requests or work orders. With its very user-friendly environment, no intense training is needed to learn to use it. Flexible, NewWayService adapts itself to your needs | |||
Updated: 3, 2006 | Rating: 0 | Author: Sales Department | Size: 21313 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | SpyBlocker 9.1 (spyblocker-software.com) | ||
goes one step further. SpyBlocker strips ads out of ad-supported software, disabling the ad module and tracking capabilities without disabling the functionality of the program. Protect your privacy from spyware, advertising, web bugs, scripts, stylesheets, worms, cookies and | |||
Updated: 3, 2006 | Rating: 165 | Author: Paul Kurland | Size: 3808 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
13. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
14. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
Converter program include 40/128 bits PDF encryption, advanced PDF security options, page size and page orientation support, resolution mode, compression mode, etc. Not only conversion to PDF is supported. ABC Amber Text Converter is the award-winning, powerful batch tool to convert documents to PDF, HTML, CHM, RTF, HLP, TXT (ANSI and Unicode), DOC, XLS, MCW, WRI, WPD, WK4, WPS | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
15. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WQ1 files at a time. Important note: Corel QuattroPro does not need to be | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
16. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WK1 files at a time. Important note: Lotus 1-2-3 does not need to be installed. Partial Features List: - reads WK1 files (does not require Lotus 1-2-3 to be | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
17. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
Server is an enterprise class mail server software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based administration, and a wide array of standard | |||
Updated: 3, 2006 | Rating: 322 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
18. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
Server is an enterprise class mail server software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based administration, and a wide array of standard | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
19. | BREAKTRU PAYROLL 2006 10.1.0 (breaktru.com) | ||
the deductions and withholding too much or too little? Payroll 2006 software makes it easy to keep track of your weekly or bi-weekly pay checks. Enter the hours worked as well as overtime, holiday, sick leave, and other pay categories, then Payroll 2006 applies the withholding tax rates for federal | |||
Updated: 3, 2006 | Rating: 0 | Author: David Giordano | Size: 6501 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
20. | BREAKTRU PAYROLL 2006 10.1.0 (breaktru.com) | ||
the deductions and withholding too much or too little? Payroll 2006 software makes it easy to keep track of your weekly or bi-weekly pay checks. Enter the hours worked as well as overtime, holiday, sick leave, and other pay categories, then Payroll 2006 applies the withholding tax rates for federal | |||
Updated: 3, 2006 | Rating: 101 | Author: David Giordano | Size: 6501 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
21. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important note: Adobe Acrobat doesn't need to be installed. Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
26. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
27. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
28. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
Button Sales Totals & Reports, On the Fly Inventory Entry, Password Security, Quotes, Rentals, Inventory Control, Billing, Mailing Lists, Terms, Invoicing, Packing Slips, Automatic Sale Discounts and more. Import and export products, customers list and sales information. Send/Email all | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
29. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
presentation can be easily viewed with any web browser. No special software is required, since 98% of the browsers have the Flash plug-in already installed. When performing the conversion, the size of the output files is reduced with up to 90%, which is till to 3 times better than with other leading | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
30. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
32. | EMS IB Manager 4.1 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Powerful stored procedure debugger; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing InterBase and Firebird services. EMS SQL Manager 2005 for IB/FB is a powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
33. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS Excel does not need to be installed. Partial Features List: - reads XLS files (does not require MS Excel to be | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
34. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | Capturix VideoSpy 3.02.1817 (capturix.com) | ||
system is now available for your PC. Capturix VideoSpy is a complete software that combines video surveillance and domotics. Supports any video for windows device (like USB Webcam or Tv Tuner card) and network cameras or video servers. With this software you can record all video activity with a programmed schedule, insert data in picture, work as a motion detector, record | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexandre Simoes | Size: 9442 kb | Commercial Go to category: Audio & Multimedia > Video Tools Similar programs | |||
36. | Privacy Defender 7.0.2t (synergeticsoft.com) | ||
Vulnerability Profiling and Removing tool-Privacy Defender is a security tool that helps you protect your privacy by removing all evidence of previously downloaded music, video files, images stored in your PC. It gets rid of the data that will remain on your hard drive even after reformatting. Powerful Evidence Eliminator-Privacy Defender protects you from unwanted data becoming | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Anikin | Size: 433 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
37. | BigSender 3.72 (CraigRichards.com) | ||
searching, browsing, editing and removing multiple records, login security for as many administrators as you want, each with their own access privileges, seamless integration with your site's look and feel, "above and beyond" customer support included, and many other must-have features, discover why professionals like you rely on BigSender. Manage and use your contact lists more | |||
Updated: 2, 2006 | Rating: 0 | Author: Craig Richards Design | Size: 1385 kb | Commercial Go to category: Business > PIMS & Calendars Similar programs | |||
38. | OroTimesheet 5.07 (orologic.com) | ||
a very user-friendly interface, OroTimesheet is the time tracking software solution you need to track time by project! Discover today the new way to manage timesheets! OroTimesheet allows you to keep track and manage the time spent on each project by you or your employees. Very flexible, OroTimesheet adapts itself to your needs whether you work for a big corporation or are a | |||
Updated: 2, 2006 | Rating: 0 | Author: Sales Department | Size: 30423 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | Password Manager XP 2.1.322 (cp-lab.com) | ||
Manager XP is a convenient software application for storing passwords, access codes, social security and credit card numbers and other valuable information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
41. | OroTimesheet 5.07 (orologic.com) | ||
a very user-friendly interface, OroTimesheet is the time tracking software solution you need to track time by project! Discover today the new way to manage timesheets! OroTimesheet allows you to keep track and manage the time spent on each project by you or your employees. Very flexible, OroTimesheet adapts itself to your needs whether you work for a big corporation or are a | |||
Updated: 2, 2006 | Rating: 0 | Author: Sales Department | Size: 30423 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | BB EAP 5.38 (bbsys.com) | ||
on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final resolution/or declined help, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
43. | ABC Amber CSV Converter 2.03 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of CSV files at a time. As all "ABC Amber" products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads CSV (comma-separated), TXT | |||
Updated: 2, 2006 | Rating: 1563 | Author: ProcessText Group | Size: 1279 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
44. | IVM Telephone Answering Attendant 3.07 (nch.com.au) | ||
~ Dial in computer control or information (eg. Dial in to test security alarm or to restart server). ~ Many more telephone related applications. Features ~ Multiple telephone line support (1 - 64 lines simultaneously). ~ Caller ID logging (even if no message is left) and optional on-screen caller ID flash display. ~ Call key select menus and ability for caller to enter | |||
Updated: 2, 2006 | Rating: 986 | Author: NCH Swift Sound | Size: 474 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
45. | Password Maintenance 2.07 (softdd.com) | ||
and even store your data on USB or diskette for better | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 535 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
46. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
at the specified time intervals. Internet Cleaner is a trial software, you can download and evaluate it free of charge for the period of 30 days. Remove all traces of your computer activity (including recently visited sites, browser cache and cookies, Start menu history, documents history etc.) and free the hard drive space by erasing the Scandisk file fragments and emptying the | |||
Updated: 2, 2006 | Rating: 107 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
47. | Complete Cleanup 4.83 (softdd.com) | ||
cleanups which you would like to add to the cleanup list. This software will also improve the performance and disk reading speed of your pc. Simply run the self-extracting file to install. (Runs on all Windows systems). Protect your internet privacy, clean up all the garbage data on your pc, and improve your pc | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
48. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
at the specified time intervals. Internet Cleaner is a trial software, you can download and evaluate it free of charge for the period of 30 days. Remove all traces of your computer activity (including recently visited sites, browser cache and cookies, Start menu history, documents history etc.) and free the hard drive space by erasing the Scandisk file fragments and emptying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
49. | ezProxy 2.7.1 (lavasoftware.net) | ||
Explorer, Eudora, Icq/AIM, FTP programs, RealAudio and any other software that supports proxy connections (most of them do these days). ezProxy offers several advanced features including bandwidth balancing, remote control and a password protected user interface. You can specify rules for all users or define custom rules and restrictions for individual users. Rules can be saved as | |||
Updated: 2, 2006 | Rating: 42 | Author: Hu Wei | Size: 2029 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
50. | Advanced Password Generator 2.87 (segobit.com) | ||
Advanced Password Generator is a Windows based application designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password | |||
Updated: 2, 2006 | Rating: 16 | Author: Segobit Software Segobit Software | Size: 177 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
51. | VisualRoute 2006 10.0h (visualware.com) | ||
of IP addresses and Web servers on a global map--key information for security purposes to help identify network intruders and Internet abusers. VisualRoute also features an email tracking for troubleshooting email problems, domain and network Whois information for quick problem or abuse reporting | |||
Updated: 2, 2006 | Rating: 0 | Size: 5249 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
52. | AntiSpy 4.4.2 (omniquad.com) | ||
monitoring and broadcasting your computer activities pose serious security and privacy issues. Most of these spywares are installed without your permission on your computer. AntiSpy scans system memory, registry, hard, and removable drives for a variety of spywares like annoying ad-wares, data-mining scum-ware, key-loggers, trojans, premium number dialers, browser hijackers | |||
Updated: 2, 2006 | Rating: 39 | Author: Daniel Sobstel | Size: 10164 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
53. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 397 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
54. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 120 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
55. | DBDocumentor 4.00 (pikauba.com) | ||
what other objects. The cross referencing extends to procedure and security usage, clearly showing which procedures are used where, and under what security context. These capabilities make DBDocumentor ideal for those wishing to learn the structure of a given database, or simply to document the database for future reference. Extended capabilities include declarative | |||
Updated: 2, 2006 | Rating: 0 | Author: Tim Mackey | Size: 3660 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
56. | Registry Cleaner - RegFix Mantra 2.1 (pcmantra.com) | ||
due course of time, Windows Registry gets effected due to newer software installations, uninstallation, Adwares, spywares, Trojans, viruses etc. These changes generate inconsistencies in the Windows registry. The inconsistencies may be of varied nature like Empty keys, false uninstall information, missing cross references etc. These inconsistencies results in degrading PC performance | |||
Updated: 2, 2006 | Rating: 115 | Author: PC Mantra | Size: 986 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
57. | APS Accounting & Stock Control 1.1.6.0 (advanced.servehttp.com) | ||
combines powerful multilingual accounting software and stock (inventory) control features with deferent types of transactions such as Cost Centers, General Vouchers, Reciept & Payment Vouchers and wide range of reports such as general ledger, profit and loss, trial balance, statement of accounting | |||
Updated: 2, 2006 | Rating: 42 | Author: yasser almohanna | Size: 24700 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
58. | Silver Key 3.3 (filecryption.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel” command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
59. | Silver Key 3.3 (kryptel.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel” command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
60. | 4UOnly 1.2.7 (dillobits.com) | ||
XP with a unique feature that saves you time while promoting good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of | |||
Updated: 2, 2006 | Rating: 36 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
61. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
and access to corporate resources over the Internet. It brings security to a PC and a company Lan/Wan or Intranet. SSHPro was implemented as an extension DLL. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to SSHPro without sacrificing any of existing functionality. Furthermore, SSHPro has been developed entirely outside of the USA, and can | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
62. | NFS client and server for windows ProNFS 2.6 (labtam-inc.com) | ||
for windows 95/98/ME/NT/2000/XP/2003 ProNFS. Network File System software with high performance file sharing connectivity capabilities. ProNFS Server can be installed on any Windows 95/98/ME/NT/2000/XP/2003 PC to share your local drives and folders with other networked users, no matter which operating system they are running on their workstations. Only a NFS Client is required on | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 4971 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
63. | Casino Solei 2006 V (best-on-line-casinos.com) | ||
To compliment their experienced team CasinoSolei.com purchased software from industry leaders, Playtech. Playtech's software is considered to be one of the top Internet casino products on the market. Their team, with special experience in the brick and mortar casino industry, bring additional experience and professionalism to Casino's Solei's Internet operations. It is | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
64. | Magic Box Casino - $567 FREE! 2006 V (best-on-line-casinos.com) | ||
Magic Box Casino software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Magic Box Casino are being processed | |||
Updated: 2, 2006 | Rating: 0 | Author: Sally Young | Size: 139 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
65. | Casino Las Vegas - $400 FREE! 2006 V (best-on-line-casinos.com) | ||
Casino Las Vegas software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Casino Las Vegasare being processed by | |||
Updated: 2, 2006 | Rating: 42 | Author: Jack Black | Size: 245 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
66. | MICR Font Set 3.4 (micrfonts.com) | ||
fonts come in Windows TrueType and PostScript formats. Note: Optio software users need our LaserJet PCL version, not the TrueType version. Print your own checks from Windows, using any laser printer! You get our MICR fonts (which include the numbers 0 - 9, On-Us, Transit, Amount, and Dash), a calibration program, and our Secure Fonts used in printing check amounts and payee | |||
Updated: 2, 2006 | Rating: 0 | Author: Gary Elfring | Size: 1166 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
67. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
68. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
69. | WinGuard Pro 2006 Free Edition 6.0 (winguardpro.com) | ||
also encrytption for your files and folders. It offers an all-in-one security solution for your computer. With extra features to lock the boot keys, task keys, software installations and internet access. This is the free edition download, however there is an option to upgrade to Premium | |||
Updated: 2, 2006 | Rating: 48 | Author: WGP Security Solutions | Size: 2454 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
70. | System Mechanic Professional 6.0s (iolo.com) | ||
Mechanic Professional is one award-winning product for all PC security and optimization needs. Use the new PC Repair Wizard to automatically diagnose and fix hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
71. | System Mechanic 6.0s (iolo.com) | ||
hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
72. | SuperCleaner 2.89 (southbaypc.com) | ||
exist), and gives you the option of deleting them. For maximum security, you have the option of erasing files using a file wipe. This prevents someone using "undelete" software from recovering any of your files. SuperCleaner is very powerful, yet easy for beginners to use. Cleans out the garbage from your computer and protects your Internet privacy. It finds and removes | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
73. | SoftPerfect Network Scanner 2.7 (softperfect.com) | ||
both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on a network (including system and hidden). In addition, it allows you to mount shared resources as network drives | |||
Updated: 2, 2006 | Rating: 48 | Size: 670 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
74. | SecureWord 1.5 (secureword.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
75. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
need not have a copy of the program!. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. SIT 2000 is so simple to use. SIT 2000 is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | S.O.S.Automation 1.01 (sosautomation.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
77. | Registrar Registry Manager 4.03 (resplendence.com) | ||
It is safer than Regedit, the native Windows registry editoras this software offers registry backup and restore features as well as multilevel undo. The builtin registry file editor allows you to edit registry files on disk such as those which make up the systems registry image so you can use it to recover and repair broken Windows installations which may be even unbootable due to | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
78. | Program Protector 2.1 (blumentals.net) | ||
Protector is state of art security utility, which allows you to password protect programs. You can password protect any Windows application. This functionality is achieved using a special algorithm which modifies executable file of the application, so that it requires to enter valid password before program can start. Program Protector is very easy to use and does not require any | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | PrivacyWatcher 1.20 (managebytes.com) | ||
of freedom, superior to other similar products! PrivacyWatcher is software that cleans up the history of your computer activity and protects your computer from the unauthorized access. It cleans up the tracks left by Internet Explorer, Windows, Netscape, Mozilla, Opera, MS Office and | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
80. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
81. | PECompact 2.75 (bitsum.com) | ||
smaller than if they had been compressed by modern data compression software such as RAR. This is accomplished by restructuring and pre-processing that make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
82. | PC LockUp 2.185 (softheap.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
83. | Password Saver 2.2.7 (pwdsaver.com) | ||
secure than human-generated ones. This will greatly enhance the security of your sensitive data and accounts. The software includes many pre-defined templates for commonly used records such as Web site and Email accounts so you get started adding data right away. However, you are not just limited to the pre-defined templates or even to just storing records with passwords | |||
Updated: 2, 2006 | Rating: 16 | Author: Eugene Olevsky | Size: 2188 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
84. | Panda Titanium 2006 Antivirus + Spyware 5.00.00 (pandasoftware.com) | ||
guarantee your security, it offers a double layer of protection against unknown viruses and intruders thanks to its TruPrevent Technologies. It also protects you from hackers, phishing and other online fraud. Ongoing antivirus protection for your computer, thanks to its greater detection and elimination efficiency for all types of viruses and its automatic, daily | |||
Updated: 2, 2006 | Rating: 220 | Author: Panda Software | Size: 33972 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
85. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
86. | MagicTweak 3.20 (magictweak.com) | ||
designed to optimize and personalize Microsoft Windows. This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no longer any need to dig through the registry looking for that specific setting (from Start Menu,Desktop,IE skin,System Icon to System | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
87. | Lock My PC 3.4 (fspro.net) | ||
information on our hard drives. We install firewalls and anti-virus software to protect this data from outside intrusions and hijacks. However, according to reports by IT specialists, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
88. | PC LockUp 2.185 (getfreefile.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | KGB Free Key Logger 1.93 (refog.com) | ||
KGB Key Logger is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
90. | KGB Spy 3.93 (refog.com) | ||
Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
91. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
92. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | Hide & Protect any Drives 2.01 (softstack.com) | ||
of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media. Protect Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives. Stop unauthorized software installations and data leak by removable | |||
Updated: 2, 2006 | Rating: 244 | Author: IM Soft | Size: 764 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
94. | File & Folder Protector 2.33 (softheap.com) | ||
Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Evidence Exterminator 2.14 (softstack.com) | ||
you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is stored in various files and in the Windows registry? Did you know that anybody with a minimal computer knowledge including your | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
96. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
97. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
98. | CD-DVD Lock 2.01 (getfreefile.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | CD-DVD Lock 2.01 (softheap.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | Axessh Windows SSH Client 3.2 (labf.com) | ||
(apart from places where people aren't allowed to own cryptographic software). SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet ; cyber hackers stealing passwords and other important information. Axessh brings you | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|