|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
501. | Remote Administrator 2.2 (radmin.com) | ||
of all data streams. Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login. Radmin is very secure and reliable | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
502. | Remote Desktop Spy 4.0 (global-spy-software.com) | ||
in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without administrator | |||
Updated: 9, 2005 | Rating: 1872 | Author: Global Spy | Size: 1297 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
503. | RemoteExec 3.07 (isdecisions.com) | ||
RemoteExec® will dramatically minimize, simplify and secure all software and operating system administration tasks (Application and upgrade deployment, script and batch launching…), without disrupting on-going production. FEATURES: - Remote running of program files (.exe, .bat, .cmd…), scripts (.vbs, .js…) and all associated file types (.doc, .wav, .reg, .msi...) | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
504. | Retail Plus 2.0 (sympatico.ca) | ||
Proven Point Of Sale Software Since 1987 Our mission is to make award winning software that delivers the right mix of simplicity, features and price. An automated point of sale system can help you a great deal by saving time on routine tasks, increasing accuracy and controling what happens at the sales counter. But you may have noticed that most POS software | |||
Updated: 9, 2005 | Rating: 0 | Author: Kuno Egger | Size: 6000 kb | Shareware Go to category: Business > Other Similar programs | |||
505. | Retirement Investment Required + 1.2 (benttreesoftware.com) | ||
under Win 95, 98, Me, NT4, XP, & 2000. Have you called the Social Security Hotline (1-800-772-1213) to verify your estimated monthly SS benefit so that you can evaluate the monthly shortfall you may experience? This program calculates the amount of money required to provide a given monthly income at retirement with or without withdrawing capital, which, when added to your Social | |||
Updated: 9, 2005 | Rating: 0 | Author: Carl Hooper | Size: 1212 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
506. | Retirement Savings Planner 2005.6 (torrid-tech.com) | ||
meet your specified retirement income goal. It's that easy. This software works with all types of retirement plans and assets including 401(k), IRA, 403(b), 457, SIMPLE, and any other defined contribution plan. "It is one of the most helpful, and easy to use, pieces of retirement planning software I've seen. Thanks." R. Gibson Retirement Planner makes planning easy by | |||
Updated: 9, 2005 | Rating: 86 | Size: 3195 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
507. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
owner password, and so cannot edit, copy, or print the file. This software was designed by our inhouse team due to a requirement from the publishing department. Often we either produce documents where they have been locked by an individual, and the password has not been set correctly, or we recieve press releases by email, where the publisher has accidentally prevented copy, or | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
508. | RoboNanny 1.2 (softnanny.com) | ||
give you the peace of mind you longed for. What you need is a home security system. RoboNanny will help you make sure your children are always safe, with Internet broadcasting and activity recording. RoboNanny is a computer home security and baby monitoring software. It monitors sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Afonin | Size: 520 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
509. | Royal Dice Casino $150 Free! 2005V (best-on-line-casinos.com) | ||
Royal Dice Casino's software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Royal Dice Casino are being | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
510. | S.O.S.Automation 1.01 (triplebit.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 9, 2005 | Rating: 0 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
511. | S.O.S.Automation 1.01 (sosautomation.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
512. | Safe Express Free 3.4 (netsafesoft.com) | ||
to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
513. | Safe Express Home 4.2 (netsafesoft.com) | ||
of damage to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
514. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
515. | SafeOffice 1.1 (codetek.com) | ||
Studios SafeOffice™ is a security program that allows you to protect your important data from human attackers and malicious software that take advantage of flaws in common internet applications (web browsers, e-mail clients, instant messengers, etc.). SafeOffice is designed to protect you and your data from attacks in as unintrusive a manner as possible; and to allow | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
516. | ScreenLock 9.0 (screenlock.com) | ||
to guess what the answer is. ScreenLock is an excellent PC & file security program providing easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
517. | ScreenLock Pro 2.0.41 (screenlock.com) | ||
PC World's Editor's Pick.! ScreenLock is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make ScreenLock ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to | |||
Updated: 8, 2004 | Rating: 65 | Author: Gregory Nelson | Size: 5254 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
518. | SecExMail Gate 1.2 (bytefusion.com) | ||
implements open standard encryption algorithms to create a seamless security framework to protect the privacy of your corporate email on the public internet. No additional software on the e-mail workstations on your network is required. SecExMail Gate is an email proxy server which encrypts and | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 3024 kb | Demo Go to category: System Utilities > Other Similar programs | |||
519. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail client to pick up e-mail locally. Other users (hackers) cannot read your username / password across | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
520. | Secura Archiver 1.6 (cmfperception.com) | ||
Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
521. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Backup Professional is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
522. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
completely eliminate sensitive data! One of the world's best security and computer hard drives cleansing | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
523. | Secure Files 2.8 (securefiles.net) | ||
Secure Files allows you to hide,protect and encrypt your personal files and folders easily, the protected files will be encrypted and unreadable. With Secure Files, what you need to do is just adding your filesand folders to Securet Files. The files will be encrypted and hidden automatically.If you want | |||
Updated: 8, 2004 | Rating: 0 | Author: Tang Jun | Size: 720 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
524. | Secure Reminder 6.0 (securereminder.com) | ||
Reminder software offers you an easy way to organize important information dates and events on the computer desktop. Secure Reminder is an easy to use daily reminders software that includes reminder, task scheduler, personal information organizer and password generator function. Don't ever forget an important date or event again! You can be reminded with by showing an alarm | |||
Updated: 9, 2005 | Rating: 102 | Author: SecureReminder. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
525. | SecureCode 2.0 (aidsoft.com) | ||
is a new software protection for Borland Delphi or C++ Builder, based on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
526. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
is a new software protection based on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration software, you can use as protection against reverse-engineering or | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
527. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
need not have a copy of the program!. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. SIT 2000 is so simple to use. SIT 2000 is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
528. | SecureWord 1.5 (secureword.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
529. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
530. | Security Folder 2.0 (everstrike.com) | ||
protection. Despite the fact that there are many 3d party data security solutions on the market today, few of them offer an intuitively easy way to protect files and folders on local hard drive from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
531. | Security Folder 2.0 (security-folder.com) | ||
protection. Despite the fact that there are many 3d party data security solutions on the market today, few of them offer an intuitively easy way to protect files and folders on local hard drive from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
532. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
533. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
most advanced & powerful system security software of its type. In just a few mouse-clicks, even your kid can provide total freedom for your PC, from hackers, trojans, keyloggers, spying programs, all hidden & malicious stealth programs!! Features No matter whatever Stealth Algorithm a program is using, it cannot escape from Advanced AntiSpy Mode!! Searches all the | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
534. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
Pro is the complete network monitoring software. It offers IT administrators full control over the IT infrastructure by monitoring all event sources and notifying the occurrence of all critical events for corrective measures to be taken, manually or automatically, thus avoiding any undesired consequences. Sentry Pro Version features customized monitoring objects for servers (MS | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
535. | Server Maintenance Portal 3.2 (absolutedynamics.com) | ||
Asset Management Software that collects hardware and software assets across the network. SMP also works with Microsoft Baseline Security Analyzer to determine the security state of your Windows systems. Integrated with MBSA 2.0. Disk space monitoring and reporting. Easy-to-navigate web pages. Flexible reporting options. Intuitive Active Directory searches | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
536. | ServerMask 2.2 (port80software.com) | ||
clues about its identity. SERVERMASK FROM PORT80 SOFTWARE MODIFIES YOUR WEB SERVER’S "FINGERPRINT" by removing unnecessary HTTP response data, modifying cookie values, and obscuring other response information, thus masking the identity of your server. Advanced options include custom header creation, Apache emulation, response randomization, a Remove Any Header | |||
Updated: 9, 2005 | Rating: 39 | Author: Joe Lima | Size: 888 kb Go to category: Servers > Other Server Applications Similar programs | |||
537. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Center Manager (SCM) – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
538. | Service Center Operator 2.3 (newageit.com) | ||
Center software for service centers and workshops. Service Center represents new generation of management software for service centers. It manages full life cycle of repairing and tuning from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
539. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Core Manager – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
540. | Settings Sentry 1.0 (spyblocker-software.com) | ||
malicous web pages, software and other types of sneakware from changing Internet Explorer settings. Works like a firewall for vulnerable Internet Explorer settings. Settings Sentry Locks your settings preventing them from being tampered with. You can selectively allow or deny any setting instantaneously. Protects your start page and other selected settings. features full logging and | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Kurland | Size: 1216 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
541. | Shift Scheduler Continuous Excel 12 (bizpeponline.com) | ||
The Shift Scheduler will build a roster structure to your specifications, allocate staff automatically, and generate a printable roster, all at the click of a button. It is compact and user friendly allowing you to add staff and shifts (maximum 150) with ease. Default values for continuous shifts mean that | |||
Updated: 9, 2005 | Rating: 148 | Author: David Morcom | Size: 250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
542. | Shift Scheduler Continuous Excel 12 (bizpeponline.com) | ||
The Shift Scheduler will build a roster structure to your specifications, allocate staff automatically, and generate a printable roster, all at the click of a button. It is compact and user friendly allowing you to add staff and shifts (maximum 150) with ease. Default values for continuous shifts mean that | |||
Updated: 9, 2005 | Rating: 0 | Author: David Morcom | Size: 250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
543. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
544. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
bit rate. Simple 1on1 symmetric key entries are used for your email security and file encryption, no Public and Private Keys. The key entries are not partially issued by a Trusted 3rd Party -- you don't have to worry about having to trust any 3rd parties. ShyFile does not use any standardized algorithms but only its own exclusively developed TL6144D algorithm. A File Shredder is | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
545. | SignetSure 1.0 (SignetSure.com) | ||
your program. Scenario Two: You distribute registered software with a datafile that identifies the registered user (e.g. user name, product serial number, et cetera). It is important that users not be able to modify their own registration information, even if someone reverse-engineers your program. SignetSure solves the problems of both these scenarios. SignetSure | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
546. | SIGNS 6.12 (rad2themax.com) | ||
is a feature-rich, customizable software package designed for SERIOUS investigative professionals. From dispatch through incident reporting, case management to extensive administrative reports, S.I.G.N.S. will not only AUTOMATE your work flow, but give you the tools you need to ANALYZE trends so you can do more than react - you can PRO-ACT, because S.I.G.N.S. gives you the data | |||
Updated: 3, 2005 | Rating: 55 | Author: Paul Pleasant | Size: 22648 kb | Demo Go to category: Business > Databases & Tools Similar programs | |||
547. | Silver Inventory System 1.6.2 (executivpro.com) | ||
most powerful report wizard. 15. The system ensures a high level security. Anybody outside can't take advantage of your databases. Silver Inventory System is a complete system for management of sales, purchases and payments. This system is use for creation invoices, sale orders, purchase orders, receiving lists, payment receipts, labels with bar | |||
Updated: 9, 2005 | Rating: 0 | Author: Serge Korsunen | Size: 1266 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
548. | Silver Key 3.3 (filecryption.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel†command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
549. | Silver Key 3.3 (kryptel.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel†command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
550. | Sitekeeper 3.5 (execsoft.com) | ||
easy as clicking your mouse. Automate and centralize your patch and security update management, hardware and software inventory, license compliance tracking, and software installations. No expensive, dedicated hardware or special training required-with Sitekeeper, you can automate your patch and systems management in under an hour. Sitekeeper runs on Windows® XP | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 42997 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
551. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
552. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
lets you charge customers, using all kinds of payment devices. The software uses Internet Explorer as its basis but presents a much simplified interface that even the novice user will understand. Some of the features included: Multiple-window support, multilanguage support, automatic dial-up or network connection, event-logging, download manager, favorites, Web site filtering (with | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
553. | Smart Pix Manager 8.05 (xequte.com) | ||
can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in encrypted zips. Databases can be shared across a network and support for off-line sources is included (e.g. prompting for the correct CD-ROM). Features include: Wide Format Support, including all common Images, Sounds, Videos, Text, Office | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
554. | SmartLaunch 3.6 (smartlaunch.net) | ||
is the market leading management software for cyber cafes. On the basis of real-life experience and several thousand licenses sold worldwide, Smartlaunch 3.5 is the perfect solution for the operations of any professional cyber cafe. Smartlaunch helps you handle customer billing, security issues, financial and statistical reports, computer utilities and much more | |||
Updated: 9, 2005 | Rating: 0 | Size: 18000 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
555. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. Log data is converted to text format, and delivered to a remote Snare Server, or to a remote Syslog | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
556. | Snare Micro Server 1.2 (intersectalliance.com) | ||
and Intelligence organisations to meet elements of local and federal security requirements, such as: * ACSI 33 * GLBA (Gramm-Leach-Bliley Act) * Sarbanes Oxley (SOX) * C2 / CAPP * DCID 6/3 * DIAM 50-4 * DDS-2600-5502-87 Chapter 4 * NISPOM Chapter 8 * HIPAA * California Senate Bill 1386 * USA Patriot Act * British Standard | |||
Updated: 9, 2005 | Rating: 0 | Author: InterSect Alliance | Size: 439 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
557. | Snoop 1.1 (yoursnoop.com) | ||
Snoop makes it easy to monitor PC and Internet activity on your work or home computer or even from a remote location. Now you can record everything your children, employees and/or spouse do on their PC and have a report delivered to an e-mail address, anywhere and as frequently as every day. Once installed on | |||
Updated: 3, 2005 | Rating: 0 | Author: Snoop Internet Security | Size: 1390 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
558. | Snoop 1.1 (yoursnoop.com) | ||
Snoop makes it easy to monitor PC and Internet activity on your work or home computer or even from a remote location. Now you can record everything your children, employees and/or spouse do on their PC and have a report delivered to an e-mail address, anywhere and as frequently as every day. Once installed on | |||
Updated: 3, 2005 | Rating: 0 | Author: Snoop Internet Security | Size: 1390 kb | Freeware Similar programs | |||
559. | SnoopTrap 3.0.2 (snooptrap.com) | ||
to guess what the answer is. SnoopTrap is an excellent PC & file security program providing easy, yet secure access to your private data while denying other's attempts to access your computer. Optional | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 5405 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
560. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network. SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable | |||
Updated: 2, 2006 | Rating: 40 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
561. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network. SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
562. | SoftPerfect Network Scanner 2.7 (softperfect.com) | ||
both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on a network (including system and hidden). In addition, it allows you to mount shared resources as network drives | |||
Updated: 2, 2006 | Rating: 48 | Size: 670 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
563. | Software Catalog 2.0.2 (cidenterprises.com) | ||
Software Catalog is a Windows utility designed to help keep your applications up-to-date. With the latest features and most current bug-fixes installed on your computer, you can ensure that you're using the most stable, feature-rich versions of all of the programs that you've purchased. As an | |||
Updated: 2, 2006 | Rating: 0 | Author: Ethan Rappaport | Size: 2204 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
564. | SoftwareShield System 2.4.10.17 (softwareshield.com) | ||
System is a full featured licensing and copy-protection system for software developers who create Windows applications on the x86 platform. The SoftwareShield System allows you to make copy-protected, demo, trial, pay-per-use, leased and many other versions of your software. License Models | |||
Updated: 9, 2005 | Rating: 0 | Author: Zack Wickes | Size: 9037 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
565. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
is a highly configurable and extremely efficient e-mail scanning software solution which can be tailored specifically to your system to remove the unsolicited e-mail. Spam Alarm utilizes our innovative multilevel filtering, statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
566. | SPAM Shredder 3.1 (safechaos.com) | ||
emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control under incoming emails, thus helping to save your time and money! Applying the SPAM Shredder allows to determine up to 99.9% of spam emails. SPAM Shredder is a | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
567. | SpamChoke for Windows 1.1 (spamchoke.com) | ||
is an install-and-forget antispam software that works automatically to ensure that your inbox will be free of spam emails. SpamChoke for Windows supports all email clients like MS-Outlook, Outlook Express, Eudora, etc. SpamChoke automatically detects the email program and configures the email accounts to filter spam emails. SpamChoke reduces up to 90% of your spam emails | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 1164 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
568. | Spare Parts Management (MS Access 2000) 2.18 (inteproc.com) | ||
Parts Management is software designed for the management of spare parts, typically in a manufacturing or production enterprise. It includes requisition, purchasing and inventory functions and a host of enquiries, reports and tools for specific control of spare parts. An accounting interface allows all transactions with financial impact to be integrated to external accounting systems | |||
Updated: 9, 2005 | Rating: 98 | Author: Sean Walsh | Size: 7928 kb | Commercial Go to category: Business > Other Similar programs | |||
569. | Spare Parts Management (MS Access XP) 2.18 (inteproc.com) | ||
Parts Management is software designed for the management of spare parts, typically in a manufacturing or production enterprise. It includes requisition, purchasing and inventory functions and a host of enquiries, reports and tools for specific control of spare parts. An accounting interface allows all transactions with financial impact to be integrated to external accounting systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Sean Walsh | Size: 8102 kb | Commercial Go to category: Business > Other Similar programs | |||
570. | SpeedUpMyPC 2.04 (lidownloads.com) | ||
award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources including hardware, system settings and internet usage to operate at peak performance at all times. Your PC will instantly become faster, cleaner and more stable. Even with the latest | |||
Updated: 9, 2005 | Rating: 101 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: System Utilities > Benchmarking Similar programs | |||
571. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split files by | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
572. | Spy Killer 5.0 (spy-killer.com) | ||
and adware detection, removal, and prevention internet system security shield. Advanced features include instant kill and blocking. Free software trial version available to | |||
Updated: 2, 2006 | Rating: 48 | Author: Maxion Software | Size: 764826 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
573. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
574. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
575. | SpyBlocker 9.1 (spyblocker-software.com) | ||
goes one step further. SpyBlocker strips ads out of ad-supported software, disabling the ad module and tracking capabilities without disabling the functionality of the program. Protect your privacy from spyware, advertising, web bugs, scripts, stylesheets, worms, cookies and | |||
Updated: 3, 2006 | Rating: 165 | Author: Paul Kurland | Size: 3808 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
576. | SpyCapture 1.4.5 (tsm-soft.com) | ||
it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the keystrokes in all of the Windows environment, as long as the user use the keyboard, it will capture all. 3. Capture all screen shots, as long as the user use the monitor and mouse, it will capture | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
577. | SpyMyPC 2.0 (benutec.com) | ||
large corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Stop Computer Espionage (Monitor your employee and management systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
578. | SpyMyPC PRO 1.9 (benutec.com) | ||
PRO is award-winning, highly flexible, all-round desktop security monitoring solution, the best choice if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, Internet connections, passwords and chat conversations. SpyMyPC PRO also includes advanced stealth mode features to prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
579. | SpyPC 7.0 (xelerate.biz) | ||
YOUR hands. Kids are smart, and will surpass the simple surf control software that is included on your PC. Spy PC not only offers you rigorous access control to the Internet, it also effectively restricts access to certain parts of the PC. With its stealth surveillance functions, you can see what your | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
580. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
and access to corporate resources over the Internet. It brings security to a PC and a company Lan/Wan or Intranet. SSHPro was implemented as an extension DLL. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to SSHPro without sacrificing any of existing functionality. Furthermore, SSHPro has been developed entirely outside of the USA, and can | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
581. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
and access to corporate resources over the Internet. It brings security to a PC and a company Lan/Wan or Intranet. SSHPro was implemented as an extension DLL. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to SSHPro without sacrificing any of existing functionality. Furthermore, SSHPro has been developed entirely outside of the USA, and can | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
582. | StaffCop 1.9.5 (staffcop.com) | ||
large corporations, where the issue of labor efficiency and better security problem is acute.??We are positive: with our system, just about any manager can get a better assessments of how their employees spend their time at work and thus cut the overhead costs and raise the company's net profit | |||
Updated: 2, 2006 | Rating: 0 | Author: StaffCop Software | Size: 2054 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
583. | Sticky Notes Std 5.0 (morun.net) | ||
quickly you can create desktop sticky notes. MoRUN.net Sticky Notes software is developed to make your work with information as convenient as possible. Various sticky note settings including default settings can be modified to your preference. Using the program you can organize sticky notes in groups | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
584. | Stock Predictor 1.1.212 (ashkon.com) | ||
advanced stock charting and investment strategy performance analysis software for financial market information. It allows to display several technical indicators for a single security on the same chart, maintain predefined lists of securities and test your own investment strategies. Stock Predictor has over a dozen built-in technical indicators and over four hundred investment | |||
Updated: 9, 2005 | Rating: 79 | Author: Ashkon Technology | Size: 16821 kb | Shareware Go to category: Business > Investment Tools Similar programs | |||
585. | StormWindow 2000 3.02 (cetussoft.com) | ||
system of a Windows 2000 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 2000 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1285 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
586. | StormWindow 95 4.55 (cetussoft.com) | ||
and system of a Windows 95 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
587. | StormWindow 98 5.14 (cetussoft.com) | ||
and system of a Windows 98 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
588. | StormWindow Me 6.02 (cetussoft.com) | ||
and system of a Windows Me computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
589. | StormWindow NT 2.14 (cetussoft.com) | ||
and system of a Windows NT computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
590. | StormWindow XP 7.01 (cetussoft.com) | ||
and system of a Windows XP computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows XP computer. StormWindow security schemes may be imported from and exported to other computers. StormWindow protections would probably be most useful to a teacher | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1375 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
591. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage and system failures. - Supports NTFS, FAT32 and FAT16 protected disks. - Compatible with MS Windows 95/98/Me/NT/2000/2003/XP. StrongDisk Pro is the most proven and | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
592. | StrongDisk Pro 3.0 (strongdisk.com) | ||
tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage and system failures. - Supports NTFS, FAT32 and FAT16 protected disks. - Compatible with MS Windows 95/98/Me/NT/2000/2003/XP. StrongDisk Pro is the most proven and | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
593. | Studio Surveillance 6.0 (studio86designs.freeserve.co.uk) | ||
Surveillance is designed for use as a continuous video recording software for time-lapse video recording and CCTV surveillance applications. By saving a series of video files which are sequentially overwritten after a set time period continuous recording is possible. If a security breach occurs | |||
Updated: 2, 2006 | Rating: 118 | Author: Rod Bottom | Size: 3430 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
594. | Super Password Guard 3.1 (topaim.net) | ||
information you want, like key codes and serial number of purchased software programs, bank account numbers, credit card numbers, membership numbers, magazine/newspaper subscription dates etc. Storing all your useful information in one place makes it very easy to find it when required and you can also backup all this data at once just by copying single database file. Main features | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
595. | Super Recycle Bin 1.00 (4diskclean.com) | ||
desktop or delete using Explorer Pop-Up . Irrecoverable from any software or hardware tool . Deletion rules conforms to US Department of Defense "clearing and sanitizing standard DoD 5220.22-M" , German, and all other known published government-level data disposal security requirements. When you delete a file in any Windows system you're only informing the operation system | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
596. | SuperCleaner 2.89 (southbaypc.com) | ||
exist), and gives you the option of deleting them. For maximum security, you have the option of erasing files using a file wipe. This prevents someone using "undelete" software from recovering any of your files. SuperCleaner is very powerful, yet easy for beginners to use. Cleans out the garbage from your computer and protects your Internet privacy. It finds and removes | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
597. | System Key Wizard 2.1 (home.wol.co.za) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
598. | System Key Wizard 2.1 (continuumq.com) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
599. | System Mechanic 6.0s (iolo.com) | ||
hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
600. | System Mechanic Professional 6.0s (iolo.com) | ||
Mechanic Professional is one award-winning product for all PC security and optimization needs. Use the new PC Repair Wizard to automatically diagnose and fix hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|