|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
1. | Aloaha PDF Suite 2.1.264 (aloaha.com) | ||
high costs - Communicate across operating systems - Maintain security for confidential material - Preserve content integrity – keep fonts, images and layout intact - Letterhead or Watermark imposition - direct Image 2 PDF Conversion - batch prints your existing PDF - batch converts, signes your files into PDF - hotfolder support for autoprint, autosign, batchsign and PDF | |||
Updated: 3, 2006 | Rating: 435 | Author: Aloaha Software | Size: 8789 kb | Commercial Go to category: System Utilities > Printer Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
Converter program include 40/128 bits PDF encryption, advanced PDF security options, page size and page orientation support, resolution mode, compression mode, etc. Not only conversion to PDF is supported. ABC Amber Text Converter is the award-winning, powerful batch tool to convert documents to PDF, HTML, CHM, RTF, HLP, TXT (ANSI and Unicode), DOC, XLS, MCW, WRI, WPD, WK4, WPS | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
5. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WQ1 files at a time. Important note: Corel QuattroPro does not need to be | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
6. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WK1 files at a time. Important note: Lotus 1-2-3 does not need to be installed. Partial Features List: - reads WK1 files (does not require Lotus 1-2-3 to be | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
7. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important note: Adobe Acrobat doesn't need to be installed. Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
8. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
9. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
10. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
11. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
13. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS Excel does not need to be installed. Partial Features List: - reads XLS files (does not require MS Excel to be | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
15. | Capturix VideoSpy 3.02.1817 (capturix.com) | ||
system is now available for your PC. Capturix VideoSpy is a complete software that combines video surveillance and domotics. Supports any video for windows device (like USB Webcam or Tv Tuner card) and network cameras or video servers. With this software you can record all video activity with a programmed schedule, insert data in picture, work as a motion detector, record | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexandre Simoes | Size: 9442 kb | Commercial Go to category: Audio & Multimedia > Video Tools Similar programs | |||
16. | BigSender 3.72 (CraigRichards.com) | ||
searching, browsing, editing and removing multiple records, login security for as many administrators as you want, each with their own access privileges, seamless integration with your site's look and feel, "above and beyond" customer support included, and many other must-have features, discover why professionals like you rely on BigSender. Manage and use your contact lists more | |||
Updated: 2, 2006 | Rating: 0 | Author: Craig Richards Design | Size: 1385 kb | Commercial Go to category: Business > PIMS & Calendars Similar programs | |||
17. | Password Manager XP 2.1.322 (cp-lab.com) | ||
Manager XP is a convenient software application for storing passwords, access codes, social security and credit card numbers and other valuable information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | BB EAP 5.38 (bbsys.com) | ||
on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final resolution/or declined help, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
19. | ABC Amber CSV Converter 2.03 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of CSV files at a time. As all "ABC Amber" products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads CSV (comma-separated), TXT | |||
Updated: 2, 2006 | Rating: 1563 | Author: ProcessText Group | Size: 1279 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
20. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 397 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
21. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 120 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
22. | Casino Las Vegas - $400 FREE! 2006 V (best-on-line-casinos.com) | ||
Casino Las Vegas software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Casino Las Vegasare being processed by | |||
Updated: 2, 2006 | Rating: 42 | Author: Jack Black | Size: 245 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
23. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
24. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
users understand the danger that each spyware threat poses to online security. And to ensure you have the most advanced spyware protection available, Webroot upgrades Spy Sweeper up to four times a year, and provides those upgrades absolutely FREE. With new user interface enhancements, Spy Sweeper has never been easier to use. Backed by FREE expert customer support, it’s reliable | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
25. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
26. | MagicTweak 3.20 (magictweak.com) | ||
designed to optimize and personalize Microsoft Windows. This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no longer any need to dig through the registry looking for that specific setting (from Start Menu,Desktop,IE skin,System Icon to System | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
27. | KGB Free Key Logger 1.93 (refog.com) | ||
KGB Key Logger is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
28. | KGB Spy 3.93 (refog.com) | ||
Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 60 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
30. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 0 | Author: Dengcheng Xia | Size: 1544 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
31. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set transitions to display them, add labels. You can also add popular | |||
Updated: 2, 2006 | Rating: 42 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
32. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 42 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
33. | MDaemon 8.1.4 (files.altn.com) | ||
, Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs. MDaemon features include top-notch antispam security features; seamless integration with AntiVirus for MDaemon plug-in; built-in groupware functionalities for sharing folders, tasks, contacts, and | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
34. | MDaemon 8.1.4 (altn.com) | ||
, Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs. MDaemon features include top-notch antispam security features; seamless integration with AntiVirus for MDaemon plug-in; built-in groupware functionalities for sharing folders, tasks, contacts, and | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
35. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
be True? Check it out! All-round, Computer and Internet Monitoring software tool. It allows companies and individuals to track the use of PCs easily and invisibly. It logs screenshots, keystrokes, BOTH sides of a CHAT conversation. With Network (LAN) and email | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
36. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a program you can't afford to be without. Designed for 32-bit Microsoft Windows systems, Port Explorer supports Windows 95, 98, 98 SE, ME, NT4, 2K, and XP, and also has a built-in dynamic language support system (supported languages include English, Dutch | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
37. | Ad Nuker Popup Blocker & Spam Filter 4.6.0.0 (adnuker.com) | ||
onto your PC, Filtering spam mail with 5 different levels of security, You can determine spam words so that when such words are found in your mail, the mail is considered as spam, Lets you determine a Friend List & Blocked List that contains a list of people from which you don't want to receive any mails. We've arrived to rid the Internet of these annoying ads forever and give | |||
Updated: 2, 2006 | Rating: 0 | Author: Ad Nuker | Size: 2668 kb | Freeware Similar programs | |||
38. | Smart Pix Manager 8.05 (xequte.com) | ||
can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in encrypted zips. Databases can be shared across a network and support for off-line sources is included (e.g. prompting for the correct CD-ROM). Features include: Wide Format Support, including all common Images, Sounds, Videos, Text, Office | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
39. | HTML Guard 2.32 (aw-soft.com) | ||
you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to copying and modification of your HTML code, images and text by others thus protecting your copyright. While not offering absolute security, the combination of | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
40. | Cryptocx v6 6.1.3 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
41. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
42. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
43. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
44. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
45. | EMS MySQL Manager 3.6 (ems-hitech.com) | ||
objects; * Advanced data manipulation tools; * Powerful security management; * Excellent visual and text tools for query building; * Impressive data export and import capabilities; * Completely remade Visual Database Designer; * Easy-to-use wizards performing MySQL services. EMS SQL Manager for MySQL is a powerful tool for MySQL Server administration and | |||
Updated: 2, 2006 | Rating: 1145 | Author: EMS Software Development | Size: 15145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
46. | EMS PostgreSQL Manager 3.4 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing PostgreSQL maintenance tasks. EMS SQL Manager for PostgreSQL is a powerful graphical tool for PostgreSQL DB Server | |||
Updated: 2, 2006 | Rating: 202 | Author: EMS Software Development | Size: 13640 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
47. | ABC Amber PDF2Image Converter 2.02 (thebeatlesforever.com) | ||
TGA, VST, AFI). You can export all pages or just selected page. The software supports a command line and more than 50 languages. Partial Features List - reads PDF files (doesn't require Adobe Acrobat to be installed); - exports the document to BMP, WMF, EMF, ICO, JPG, GIF, PNG, TIFF, PCX, PCC | |||
Updated: 2, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1292 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
48. | ABC Amber DBF Converter 2.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of DBF files at a time. As all ABC Amber products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads DBF files (dBASE III+, dBASE IV | |||
Updated: 2, 2006 | Rating: 387 | Author: ProcessText Group | Size: 1124 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
49. | ABC Amber Access Converter 3.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of MDB files at a time. Partial Features List: - reads MDB (MS Access) files - exports to XLS, CSV, DBF, XML, PDF (does not require Adobe Acrobat to be installed) | |||
Updated: 2, 2006 | Rating: 718 | Author: ProcessText Group | Size: 1145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
50. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
51. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
52. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
53. | NetChatSpy 2.5.0 (home.primus.com.au) | ||
from any computer on a local area network. Undetectable because software installed on only one computer in the network. Can operate in 'Stealth Mode' to record conversations on local computer for added security. Monitor children or employees to ensure on-line safety and appropriate use of Internet. Remotely monitor Instant Messenger conversations from any computer on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Langford | Size: 5655 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
54. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
55. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
lets you charge customers, using all kinds of payment devices. The software uses Internet Explorer as its basis but presents a much simplified interface that even the novice user will understand. Some of the features included: Multiple-window support, multilanguage support, automatic dial-up or network connection, event-logging, download manager, favorites, Web site filtering (with | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
56. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
and money for e-mail transmission. The recipient requires no special software, because iOpus SEA packages decode themselves after the password is entered. If desired, your company logo, a custom message, and a link to your home page can be displayed: the perfect combination of branding and security. In addition, your disclaimer may be displayed: your client has to accept it | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
57. | xSharez scanner 3.0 (tools-for.net) | ||
for both network administrators and users interested in the network security issues. This software will help you to solve one of the most serious problems of all modern computer networks - unauthorized data access using NetBIOS/SMB protocol. What xSharez Scanner can do for you: - Audit B and | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
58. | Universal Shield 4.0 (everstrike.com) | ||
Shield 4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
59. | Remote Administrator 2.2 (radmin.com) | ||
of all data streams. Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login. Radmin is very secure and reliable | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
60. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
61. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
62. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this new solution ensures complete protection against viruses, hackers and other | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
63. | Password Safe and Repository 3.43 (passwordsafe.de) | ||
even offers the possibility of importing from an OCR-Scanner-Software. Thus, troublesome typing of TAN´s is now a thing of the past. One of the many outstanding functions of Password Safe is the possibility of entering your password even automatically in an assigned program as soon as it is launched. Simply record the password entry with the Macro Recorder. When the | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Malchar | Size: 2423 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | Password Spectator Pro 3.10 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
65. | ArchiDoc (3035) (canteco.net) | ||
in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
66. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
67. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
68. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
* Protection against viruses. Includes an award-winning antivirus software. * Easy-to-Install. Install and use in your own language. * Easy-to-Use Virus Protection. * Virus definition databases updated even twice a day. * New! Improved E-mail scanning removes infected attachments automatically. * New! Virus news. Get information about latest threats from F-Secure. Stops even | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
69. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
70. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
LE Ttotally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password protect any file or folder with strong Encryption. It allows you to protect data | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
71. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces: Skinnable Simple Interface - just select what do you | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
73. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
ISDN, DSL or cable connection. Meets your requirements for Internet security & Internet privacy. Shows the currently active connections & the details of these connections. You can shut off any unsafe connection. This program includes four inter locking security services: a firewall, an | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
74. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be available to any one who opens | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | Zilla Anonymous Surfer 3.0.0.3 (ZillaSoft.ws) | ||
Zilla Anonymous surfer stands as a personal proxy which allow you to surf the internet without being traced, advertisement and popups free browsing. it has 3 main categories: 1) Masking Your IP Address: while surfing the internet your IP address is available to each server you visit. so you may be traced | |||
Updated: 9, 2005 | Rating: 252 | Author: Zilla Software | Size: 1282 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
76. | Visendo popConnect 6.0 (ppedv.com) | ||
1 modem or ISDN card for the whole network (also router), more security (store copys of all mails local), everything on a NT server installable ( also WIN95), mailinglist ( resolve mailheader) Free support hotline! MS Exchange Server is not able to collect mails from external POP3 or IMAP4 accounts. popConnect is built to do that. It connects to POP3 or IMAP4 accounts | |||
Updated: 9, 2005 | Rating: 16 | Author: ppedv AG | Size: 2500 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
77. | PopMessenger 1.61 (leadmind.com) | ||
system unreliable in question. Introducing PopMessenger by LeadMind Software, the complete small to large enterprise level instant communication solution that offers full range of instant communication tools that do not require a dedicated server or usage of third party services. PopMessenger | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
78. | NetChatSpy 2.5.0 (home.iprimus.com.au) | ||
from any computer on a local area network. Undetectable because software installed on only one computer in the network. Can operate in 'Stealth Mode' to record conversations on local computer for added security. Monitor children or employees to ensure on-line safety and appropriate use of Internet. Remotely monitor Instant Messenger conversations from any computer on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Langford | Size: 5655 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
79. | Hosting Controller Software 6.1 (hostingcontroller.com) | ||
website into hands of respective owners without compromising any security. In addition to Microsoft products, it supports most third party products that are commonly used by hosting providers as a standard. With its support for nine Email servers, four DNS servers, two FTP servers, four Statistics servers, two database servers, all major payment gateways including Paypal and two | |||
Updated: 9, 2005 | Rating: 0 | Author: Haider Ali | Size: 42 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
80. | 4t Explorer Sweeper 2.0 (4t-niagara.com) | ||
speeds up PC performance, increases free disks space and improves security by clearing the content of various Explorer and Netscape folders. In its "System Tray" mode it runs in system Tray as icons and helps to free up space on your taskbar. In "Invisible" mode application is not possible to see | |||
Updated: 9, 2005 | Rating: 0 | Author: 4t Niagara Software | Size: 943 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
81. | Anti-Spy.Info adware remover 1.6.5 (anti-spy.info) | ||
is your security and personal privacy tool that detects and removes spyware, trojans, keyloggers and adware. It complements your firewall and anti-virus software. The process viewer tells you every hidden function of all dynamic link library, system task and thread process currently active on your computer. Anti-Spy.Info doesn't require runtime modules, doesn't | |||
Updated: 9, 2005 | Rating: 580 | Author: Alex Neuber | Size: 1212 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
82. | Commodorecasino 5.30 (commodore-online-casino.com) | ||
casino run their own proprietary casino software unlike any other on the internet, including some games you won't find anywhere else. Designed with the pleasure of the player in mind, their elegant and user-friendly software offers a full suite of traditional interactive casino games including slots (12 games), video poker (15 games), blackjack, roulette and keno. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Al Cord | Size: 132 kb | Freeware Go to category: Games & Entertainment > Board Similar programs | |||
83. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
84. | rapidHELP 2.1 (broadgun.de) | ||
management). Customer Tickets When you create a new ticket, the software automatically displays that customer’s history, at the same time providing a knowledge base that contains all customer information concerning hotline contracts, support issues and the hardware and software used | |||
Updated: 9, 2005 | Rating: 0 | Author: rapidHELP Software Hermes & Nolden GbR | Size: 46080 kb | Demo Go to category: System Utilities > Other Similar programs | |||
85. | MobiManager for Nokia Phones 1.3 (mobimarketing.com) | ||
valuable data again! Edit and backup your phonebook, view hidden security features, create your own logos and funky ringtones. MobiManager is the easy-to-use software for creating phone logos, ringtones, startup images and screensavers. Use it to backup and restore your phonebook, edit names, send SMS messages and reveal hidden security features. If you use a Nokia | |||
Updated: 9, 2005 | Rating: 138 | Author: Mike Bradley | Size: 779 kb | Demo Go to category: Home & Hobby > Personal Finance Similar programs | |||
86. | go1984 3.0.3.6 (logiware.de) | ||
and problem-free video surveillance and recording. The easy to use software with varied functions at an absolutely competitive price sets a new standard for the software industry. The function range of go1984 contains everything, which is required for professional video surveillance. This includes for example: - Live-Monitoring - Recording (timer controlled, motion | |||
Updated: 9, 2005 | Rating: 1029 | Author: Ralf Kronemeyer | Size: 7443 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
87. | c:JAM - Central Jet Accounts Manager 1.4 (jomdev.de) | ||
(Central Jet Account Manager) is a security- and user account-management tool for organizations that use MS Jet databases such as MS Access and some VB applications. Using a two-paned Explorer-style interface, c:JAM lets you organize workgroups, authorize user access and manage your various datasources. Features include drag-and-drop, context menus, automatic PID and password | |||
Updated: 9, 2005 | Rating: 0 | Author: Johannes Mueller | Size: 2616 kb | Shareware Go to category: Business > Other Similar programs | |||
88. | CafeTimePro -Internet Cafe Software 4.0 (cafetime.com) | ||
the start time, duration and end time are always visible. System Security: Lock down the computer so that only the applications specified by the kiosk administrator are permitted to run. Complete prepay System: Prepaid accounts can be generated in advance for sale to customers. Coin Acceptor Ready: Connect to a coin acceptor mechanism via a COM port. The Timer | |||
Updated: 9, 2005 | Rating: 558 | Author: Rory Keogh | Size: 5982 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
89. | doQuments 2.0.172 (itaz.com) | ||
can be MS Access based or MS SQL Server based. It's powerful security features enable you to control access to documents on a per user basis. doQuments is available in three editions: Standard, Professional and Enterprise. Features of all the three editions are included in the evaluation version. doQuments is a Windows based document management application designed to make it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shiraz Ahmed | Size: 18060 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
90. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
91. | Enable Xp 2.5 (unique-expressions.com) | ||
interface, coupled together with the Microsoft .NET Framework for Security and reliability, achieve just that. The .NET Framework 1.1 from Microsoft is Required And can be downloaded for free. from Microsoft. If you only want to run applications built using the .NET Framework 1.1, download the .NET Framework 1.1 from Microsoft Windows Update. Almost all XP pro systems have it | |||
Updated: 3, 2005 | Rating: 0 | Author: Robert Wagner | Size: 3132 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
92. | Data Destroyer 1.5 (braintwist-studios.com) | ||
contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with Windows | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
bit rate. Simple 1on1 symmetric key entries are used for your email security and file encryption, no Public and Private Keys. The key entries are not partially issued by a Trusted 3rd Party -- you don't have to worry about having to trust any 3rd parties. ShyFile does not use any standardized algorithms but only its own exclusively developed TL6144D algorithm. A File Shredder is | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
95. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your staff, children, spouse or significant other type on your computer when | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
96. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
is the all-round state-of-the-art Computer and Internet recording software, useful at both home and organizational levels. It is an effective monitoring utility which can locate your problem area without being located itself. It tracks all the computer activities and applications, including keyboard strokes, passwords, incoming and outgoing chat conversations, emails, and visited | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
97. | Advanced Security Control 2.1 (protect-me.com) | ||
can be executed and by whom. You can control access to any 32-bit software, such as games, Internet browsers, or anything else depending on the time of day and day of week. Configuration is as simple as setting up login hour restrictions. Just choose a program, define users who should be affected by the rules, and choose when to enable and disable access on a one-week grid. If users | |||
Updated: 8, 2004 | Rating: 0 | Author: Ashot Oganesyan | Size: 1081 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
98. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
within the database can be password-protected, thus providing more security. Strong DES encryption algorithm and double password protection make sure that your confidential information is for your eyes only! PocketSafe also allows you to store information in several different files. It is quite handy to structure all the information you need for your employees, colleagues, kids or | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
99. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
100. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|