|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
1. | PDF to Text (pdf2text) SDK-COM 3.0 (globalpdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 48 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
2. | TreePad Business Edition 7.2 (treepad.com) | ||
intuitive and versatile, including: Password-protection and high-security Encryption, Spell Checker (20+ langs.), Thesaurus, multi-Lingual Editions, Photo Album, Website Generation with dynamic tree, image-converter, Presentation mode, documentation-, shortcuts-, hyperlinks-, addresses-, passwords and | |||
Updated: 2, 2006 | Rating: 25 | Author: Henk Hagedoorn | Size: 4074 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
3. | TreePad SAFE 7.1.4 (treepad.com) | ||
Manager (PIM) and database, password protected, with high-security 256bit TwoFish encryption, Word Processor, Web site Generation on the fly, photo album, shortcuts-, notes-, hyperlinks-, addresses-, and collections-Organizer, Documentation Tool, and much more! Widely imitated, TreePad is an Award winning, highly intuitive, powerful application, yet awesomely small: runs also | |||
Updated: 9, 2005 | Rating: 0 | Author: Henk Hagedoorn | Size: 3833 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
4. | Air Messenger LAN Server 6.7.6 (internetsoftwaresolutions.org) | ||
investment for companies that run a large sales force or dispatch centers. All sales people or dispatchers can send pages through one network computer without the need to supply each computer with a phone line or modem. The Air Messenger Server can maintain company wide group and user lists which can be broken down to departments, detailed message and transfer logs, and | |||
Updated: 2, 2006 | Rating: 64 | Author: Steve Hardt | Size: 26042 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
5. | BB EAP 5.38 (bbsys.com) | ||
referrals. User action tracking based on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
6. | CryptoHeaven for Mac OS X 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1920 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | My Notes Center 1.4.3 (mynotescenter.com) | ||
necessary information and how to manage the data stored. My Notes Center is an e-organizer and personal information manager jam-packed with features like an overstuffed sandwich. It stores personal notes, e-mails, web links, phone numbers, addresses, even credit card numbers safely and securely. Use | |||
Updated: 2, 2006 | Rating: 0 | Author: Dmitry Bobrik | Size: 1873 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
8. | PDF-Analyzer 2.5 (is-soft.de) | ||
topic affiliation and page layout or also pagecount of a file over security-relevant things such as data compression and copying permission or also encryption strength and password use up to the file attributes! You can see own inserted notes or if there's xml-content (rdf) or javascript inside!Textextraction and xml-export included! If you want more please order the extended | |||
Updated: 9, 2005 | Rating: 0 | Author: Ingo Schmoekel | Size: 1076 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
9. | Procedure Charter Professional PLUS! 6.02 (devware.com.au) | ||
out FlowBiz Net Publisher. If you need a database solution with security and search with an on-line coach, check out Enterprise. An advanced flow charter that extends beyond static graphical flow charters. Simple to use intuitive quick draw pallet and auto placement of figures and lines. Detailed description and who does what, spell checking, report designer and field | |||
Updated: 2, 2006 | Rating: 0 | Author: Brent Brian | Size: 11785 kb | Demo Go to category: Business > Other Similar programs | |||
10. | Procedure Charter Professional PLUS! 6.02 (devware.com.au) | ||
out FlowBiz Net Publisher. If you need a database solution with security and search with an on-line coach, check out Enterprise. An advanced flow charter that extends beyond static graphical flow charters. Simple to use intuitive quick draw pallet and auto placement of figures and lines. Detailed description and who does what, spell checking, report designer and field | |||
Updated: 2, 2006 | Rating: 0 | Author: Brent Brian | Size: 11785 kb | Demo Go to category: Business > Other Similar programs | |||
11. | rapidHELP 2.1 (broadgun.de) | ||
a new ticket, the software automatically displays that customer’s history, at the same time providing a knowledge base that contains all customer information concerning hotline contracts, support issues and the hardware and software used. Multitasking support The system is multitasking compliant in every respect. Integral Absence Manager The Absence Manager controls the | |||
Updated: 9, 2005 | Rating: 0 | Author: rapidHELP Software Hermes & Nolden GbR | Size: 46080 kb | Demo Go to category: System Utilities > Other Similar programs | |||
12. | ShopAssist Point Of Sale System 4.92 (users.iafrica.com) | ||
Cashier Statistics. Over three hundred reports and charts. Security Five levels of password protection for its various modules and functions. Audit trail of all transactions. Integrated data backup and recovery. Network Up to two hundred terminals per server. Multi-Store Inter-Branch Transfers. Consolidated Sales, Consolidated Stockholding, Branch Orders. Tools | |||
Updated: 2, 2006 | Rating: 16 | Author: Ivan Smith | Size: 16796 kb | Shareware Go to category: Business > Other Similar programs | |||
13. | DataObjects.NET 3.7 (x-tensive.com) | ||
relations, automatically updates database schema, provides NTFS-like security system, supports queries, full-text search, multilinguality, versioning, .NET Remoting and much more. DataObjects.NET is object-to-database persistence layer for .NET. It transparently handles persistence of your classes | |||
Updated: 2, 2006 | Rating: 82 | Size: 20744 kb | Freeware Go to category: Development > Other Similar programs | |||
14. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how that’s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 3, 2005 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Go to category: Development > Other Similar programs | |||
15. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
16. | OpenSSL 0.9.7c (download.componentspot.com) | ||
take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
17. | SecureBlackbox (ActiveX/DLL) 4.2 (secureblackbox.com) | ||
edition) is the comprehensive component collection for Internet security. SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you | |||
Updated: 2, 2006 | Rating: 0 | Author: EldoS Corporation | Size: 4127 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
18. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
(VCL edition) is the comprehensive component collection for Internet security. Unlike other components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
19. | SecureCode 2.0 (aidsoft.com) | ||
based on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.The | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
20. | EasyHues Pro 2.1 (easytools.com) | ||
EasyHues Pro, a program that lets you create color schemes and explore the world of colors. You can create your random color schemes from among 16 million colors with EasyHues Pro. Use the HEX value or the RGB value of the colors in your favorite image editing program. Are you fascinated about colors? Are | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 324608 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
21. | HT WebCam 3.0 (honestech-us.com) | ||
honestech's Video Security 1.0 System keep a watchful eye on your office, house, pool or parking garage - truly, any place you want to monitor. It captures and saves every triggered event that occurs, even while you are away. Once recorded, surveillance videos are stored for later replay. In addition, advanced scheduling makes regular monitoring easy and automatic. You can | |||
Updated: 9, 2005 | Rating: 42 | Author: Hyunjae Im | Size: 4861 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
22. | Active Scripting Fast Disable 1.5 (sparkleware.com) | ||
Explorer's Active Scripting "feature" is responsible for popup windows, scrolling status bar text, security holes, and other annoyances. Unfortunately, some websites require this technology for basic navigation, so permanently disabling Active Scripting is an impractical solution. The "Enable/Disable Active Scripting" option is normally buried deep in the Windows Control | |||
Updated: 2, 2006 | Rating: 149 | Author: Chris Marshall | Size: 580 kb | Shareware Go to category: Network & Internet > Ad Blockers Similar programs | |||
23. | Advanced Content Management 1.0 (advcomm.net) | ||
provided you have translators available. For administration and security purpose you can assign roles as Designers, Translators, Moderators and Administrators to your site. You can write site content in a web-based editor. No need to install and configure any software on your computer. It is designed for the non-technical user. Advanced CMS is ideal for websites having large volume | |||
Updated: 3, 2005 | Rating: 0 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
24. | Advanced Store Builder 2.02 (advcomm.net) | ||
your own store with ease at Advanced Portal. Store's front end designed in XML/XSLT base so that you can upload your own XSLs to change the front end what ever style you want. Also all designing control is provided at the admin section from where you can control the default XSL with ease. Admin section is provided to control whole functionality of EStore. Main Features are given | |||
Updated: 3, 2005 | Rating: 42 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
25. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
26. | ArtistScope CD 2.0 (artistscope.com) | ||
similar to a mini web server and run from anywhere, from the user's hard-drive or CD. Almost anything that you can run on your web site can be run on ArtistScope CD. With a few link modifications to your existing web site, it could be run from CD or downloaded to the end user to run on their computer | |||
Updated: 9, 2005 | Rating: 101 | Author: William Kent | Size: 3943 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
27. | Atelier Web Ports Traffic Analyzer 2.32 (atelierweb.com) | ||
* Real-time mapping of ports to processes (applications and services)! * History since boot-time of all TCP, UDP and RAW ports open through Winsock and respective mapping to processes! * Log since boot-time of data sent and received (up to 500 MB) by above ports! * Sophisticated archiving feature allowing | |||
Updated: 9, 2005 | Rating: 16 | Author: Jose Pascoa | Size: 4497 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
28. | CryptoHeaven 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 43 | Author: Marcin Kurzawa | Size: 10413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | CryptoHeaven for Java(tm) 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1940 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | Fastream NETFile FTP/Web Server 8.2.1 (fastream.com) | ||
959, 1579, 2389, mlst, ftpmd5 with optional FXP disabling for extra security and anti-hammering for FTP hack prevention Bandwidth limits for web domains at user granularity with separate settings for upload and download Virtual File System (VFS) feature for serving all network drives from a single IP | |||
Updated: 3, 2006 | Rating: 111 | Author: Gorkem Ates | Size: 3633 kb | Freeware Go to category: Servers > FTP Servers Similar programs | |||
31. | Form Mail: eMail Form Processor Pro 3.2 (mitridat.com) | ||
per invocation. Environment Settings (i.e. current time, user's host name etc.) may be included in the templates. Can check that entered data matches a particular format - i.e. all digits, a syntactically correct e-mail address, letters only, etc. Security measures include you being able to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Koldirkaev | Size: 130 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
32. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
files layout. You can use one or more passwords.Many additional security options are available. For more information visit http://www.htmlguardian.org http://www.htmlguardian.org. HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
33. | IglooFTP PRO 3.9 (iglooftp.com) | ||
through the Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1), and Stanford SRP protocols, MD4/MD5 encrypted passwords, persistent downloads, scheduled transfers, advanced FTP operations, server-to-server transfers, full transfer resume, Remote Directory Caching, URL clipboard monitoring, enhanced Firewall support, Drag & Drop, and more. Award winning FTP Client | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Marc Jacquet | Size: 2240 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
34. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 322 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
35. | Message Parse 3.12 (cypressnet.com) | ||
An email processing utility, that provides an easy, and effective way to transfer data from email to other applications. MsgParse exports data from your email messages to user defined customized flat files, that can be used to import to other applications such as database and spreadsheet programs. This is a | |||
Updated: 2, 2006 | Rating: 0 | Author: James Hall | Size: 5231 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
36. | Nici Picture Downloader 2.10 (nicisoft.com) | ||
Stop others from accidentally accessing your pictures with Nici's security and privacy features. Nici uses a proprietary HTTP downloading engine which can simultaneously download from up to 10 different pages, and does not pollute your system's cache, cookie and history folders. Nici automatically finds, downloads and organizes free pictures and movies from the web | |||
Updated: 9, 2005 | Rating: 614 | Author: Chris Inga | Size: 3608 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
37. | Norton AntiVirus Professional 2004 (nct.symantecstore.com) | ||
Norton AntiVirus 2004 Professional is the world’s most trusted antivirus solution†with advanced protection. It combines award-winning virus defense with tools to help you recover important files and securely delete sensitive information. And it comes with a license for two computers, so it’s perfect for home offices. Norton AntiVirus detects and removes | |||
Updated: 9, 2005 | Rating: 24 | Author: Jennifer Leonard | Size: 27977 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
38. | Norton Internet Security 2003 (nct.symantecstore.com) | ||
Norton Internet Security 2003 provides essential protection from viruses, hackers, and privacy threats. This easy-to-use, integrated suite includes full versions of Norton AntiVirus and Norton Personal Firewall to defend your PC against the most common Internet dangers. Norton AntiVirus, the world’s most trusted antivirus solution*, removes infections | |||
Updated: 9, 2005 | Rating: 94 | Author: Jennifer Leonard | Size: 766 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | NoTrax 1.4 (heidi.ie) | ||
NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. NoTrax comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does not run Spyware, JavaScript or ActiveX. NoTrax is the Anonymous Browser that leaves No Evidence of Internet activity on your Computer. No writing to Registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Garrett Trant | Size: 2221 kb | Commercial Go to category: Security & Privacy > Other Similar programs | |||
40. | Omniquad Personal Firewall 1.1 (omniquad.com) | ||
Personal Firewall is a personal security system to protect your computers from unauthorised access over the LAN and / Internet. Personal Firewall is a software application used to protect a single Internet-connected computer from intruders. Personal firewall protection is especially useful for users with "always-on" connections such as DSL or Cable modem. Such connections use | |||
Updated: 9, 2005 | Rating: 42 | Author: Daniel Sobstel | Size: 4126 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
41. | PocoMail 4.0 (pocomail.com) | ||
A powerful email program that does not compromise your privacy or security. The streamlined interface never gets in your way, with many unique features that allow you to conquer your mailbox: fast searches, full-page preview, Bayesian | |||
Updated: 2, 2006 | Rating: 0 | Author: Slaven Radic | Size: 3836 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
42. | Robo-FTP 2.1.0 (robo-ftp.com) | ||
PGP encryption/decryption to maintain the highest level of data security. Robo-FTP also supports integrated zip archive management, sending and receiving e-mail messages (no separate e-mail client required), single command local-server synchronization, capability to compare local and server files by date, time, and size, and to write messages to the NT event log, and a COM/OLE | |||
Updated: 9, 2005 | Rating: 0 | Author: David Keenan | Size: 8757 kb | Commercial Go to category: Network & Internet > FTP Clients Similar programs | |||
43. | VisNetic MailServer 8.3.5 (deerfield.com) | ||
easy-to-use administration console with unmatched mail server security, speed, and scalability. VisNetic Mail Server features support for Sender Policy Framework (SPF) and Spam URI Realtime Blocklists (SURBL). Instant Anti Spam is a complete spam filtering solution built into VisNetic Mail Server. Instant Anti Spam combines the most effective anti spam technologies into one | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
44. | Visual Web Task 4.0 (lencom.com) | ||
You can teach your spider how to negotiate logins , proxies and security pages to download and extract what You need - files , emails , search results. One spider can invoke another and this let You create a spider to meet ANY complication level. The tool is completely visual and there is no need to be a programmer to use it. The product uses Internet explorer as web engine so | |||
Updated: 9, 2005 | Rating: 62 | Author: Vlad Melamed | Size: 4000 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
45. | The Shredder 1.00 (zeromassengine.com) | ||
risky nature, is a useful program that can increase your personal security by eliminating sensitive files. This program was experimental and intended to lay the foundation for file shredding techniques I have since used in many other programs. File shredder - destroys files. BE CAREFUL WITH THIS APPLICATION! It can permanently destroy files on your hard | |||
Updated: 9, 2005 | Rating: 88 | Author: Corby Johanneson | Size: 319 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
46. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | Advanced Desktop Shield 1.63 (softstack.com) | ||
Desktop Shield - security utility is a must for public access PCs located in school or university labs, Internet cafes, libraries and other public places where you need to stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. With Advanced Desktop Shield you can backup, restore and manage | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
51. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
any feature of avast!, prepare and run tasks, store and check task's results. On Access Scanner - special providers to protect: the most of available E-mail clients, Instant Messaging - ICQ, Miranda etc., Network traffic - Intrusion Setection - lightweight firewall, P2P protection for | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
52. | BackRex Expert Backup 2.5 (backsettings.com) | ||
face it! We all live in the age of Information Technologies. Day after day we become more and more dependent on information. Not only our financial data and job-related information moved from paper to computer, our day planners, diaries, address books and even calendars are now all-digital. The process of our life relies heavily on machines that are tireless and accurate in | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
53. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | CSJami Minicom Pro 5.4.0.0 (csjami.netfirms.com) | ||
*Remote Modem *Scheduler *TimeCenter *Wake On Lan WOL *>128 bit security Password protected and optimised for easy use. TCP-IP and IPX enabled, 4,8, 16 bit color selection and multithreaded. Transit routing. Easily take control of remote PCs with Minicom over LAN dial-up or Internet connections. Screen file manager and finder Time Center audio and video routers shutdown | |||
Updated: 2, 2006 | Rating: 42 | Author: CSJami CSJami | Size: 5006 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
55. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
ProcessGuard is a groundbreaking security system first released late in 2003 that protects Windows processes from attacks by other spyware processes, services, drivers, and other forms of executing code on your system. ProcessGuard also stops applications from executing without the users consent, stops malicious worms and trojans from being executed silently in the background, as | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
56. | DigiSecret 2.0 (tamos.com) | ||
being intercepted. DigiSecret also includes Message Encryption Center that allows you to encrypt/decrypt plain text messages and send them via e-mail. DigiSecret also takes care of permanently erasing files or folders that you wish to remove. The files are deleted and overwritten several times to eliminate every possibility of recovering the information. DigiSecret was | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
Center Manager (ESCM) – software for service centers and workshops. ESCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
58. | FileMap by BB 4.0.4 (dogkennels.net) | ||
become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
59. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Ness is security software to password protect and lock folders against unwanted access. Lock Ness will both secure your folders against accidental deletion and prevent other users from copying them. The folder can be locked or unlocked simply by right-clicking on it within Windows Explorer. The folder remains protected should your PC be rebooted into Windows Safe Mode, DOS or another | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
Password Expert is a security software program that lets you restrict access to the folders that contain your sensitive data. Secure your documents to prevent people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
61. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
62. | Lock Folder 5.0 (realclicks.com) | ||
Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
63. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
64. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
and normal access to all your folders and the files within. There's no need to un-hide each file or folder individually. And Magic Folders is totally transparent. No one need know your invisible folders/files even exist. If you wish you can establish 5 different accounts so everyone using your computer can create their own invisible folders that only they have access to. Keep | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
65. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
66. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
67. | Online Services Center 2.3 (itlaurel.com) | ||
Services Center (OSC) software for service centers and workshops. OSC represents new generation of management software for service centers. It manages full life cycle of repairing and tuning from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of | |||
Updated: 8, 2004 | Rating: 0 | Author: Janice Petros | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
68. | Panda Titanium 2006 Antivirus + Spyware 5.00.00 (pandasoftware.com) | ||
guarantee your security, it offers a double layer of protection against unknown viruses and intruders thanks to its TruPrevent Technologies. It also protects you from hackers, phishing and other online fraud. Ongoing antivirus protection for your computer, thanks to its greater detection and elimination efficiency for all types of viruses and its automatic, daily | |||
Updated: 2, 2006 | Rating: 220 | Author: Panda Software | Size: 33972 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
69. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
increase system performance. Improve Internet performance, and web security. Provide convenient tools to tune up and ease your computer use. PCXL also provides special security features to protect your system. Available in standard and professional suite editions. Features include: -brand new redesigned interface -brand new SmartJupiter optimization engine -thousands of | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
70. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
71. | PECompact 2.75 (bitsum.com) | ||
make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC plug-ins. Custom loaders (decompression) stubs and API hook plugins are also able to be utilized. Advanced configuration includes selection of resource types that | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
72. | PowerZip 7.06 (powerzip.biz) | ||
documents with PowerZip - an easy to use file compression & security program. PowerZip Compression / Extraction Wizards make working with archives (such as Zip files) easy while providing an array of advanced features. The Wizards are quick to use because they have only a small number of steps; some steps can be switched of if not needed, others can be skipped to use default | |||
Updated: 9, 2005 | Rating: 124 | Author: Dimitri Ternovski | Size: 1920 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
73. | Protect Folder 98 3.0 (everstrike.com) | ||
Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the file or folder that you | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
74. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
Especially designed for the recovery of content from PDF files that have been locked, either where you have forgotten the user password, and so cannot even open the file to read it, or if you have just forgotten the owner password, and so cannot edit, copy, or print the file. This software was designed by | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
75. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
77. | Search and Recover 3.0d (iolo.com) | ||
calendars, contacts, notes, and tasks in MS Outlook - Bonus security features allow you to quickly and securely delete ANY existing file or folder on your system, keeping private data away from other recovery tools and thereby out of unwanted hands. - Eliminates the need to go to backups when data is accidentally lost - Create and work with emergency disk images Create an exact | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
78. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Center Manager (SCM) – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
79. | Service Center Operator 2.3 (newageit.com) | ||
Center software for service centers and workshops. Service Center represents new generation of management software for service centers. It manages full life cycle of repairing and tuning from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
80. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Core Manager – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
81. | Super Password Guard 3.1 (topaim.net) | ||
accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you accidentally forget your master password, the hint will help you to recall it. 3. Make custom categories/subcategories to divide your accounts into logical | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
82. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
83. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
84. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | Undelete Server and Professional 4.0 (execsoft.com) | ||
How valuable is the data on your servers and PCs? What if you or your users lost a critical accounting file, a major report, or even digital snapshots of the family? The Windows Recycle Bin doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
86. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is ideal for monitoring convenience stores, gas stations, day care centers, retirement facilities, hospitals, laboratories, commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
87. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
and up-to-date protection against emerging spyware. Spy Sweeper’s advanced removal engine deletes the toughest spyware programs - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats - which are specifically designed to avoid detection and removal. This | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
88. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and log-ins | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
89. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
90. | ZCuretIT 1.2.4.1 (zcureit.com) | ||
have done everything you can to protect your data. For you it's as easy as selecting the file, entering the password, selecting the output destination, and pressing a button to create a self-extracting and self-decrypting executeable. For the recipient, it's as easy as entering the password, pressing the Open button, and the the application automatically opens up in the | |||
Updated: 8, 2004 | Rating: 0 | Author: Ken Myers | Size: 892 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
91. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
edition) is the comprehensive component collection for Internet security. Unlike other components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
92. | Casino Solei 2006 V (best-on-line-casinos.com) | ||
around the globe CasinoSolei.com has established a "Customer Service Center" in San Jose, Costa Rica offering chat, email and toll free phone services to their global clientele. To compliment their experienced team CasinoSolei.com purchased software from industry leaders, Playtech | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
93. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
94. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how thatâ??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
95. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
96. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
97. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
98. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
99. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
files layout. You can use one or more passwords.Many additional security options are available. For more information visit http://www.htmlguardian.org http://www.htmlguardian.org. HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
100. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|