|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
1. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
2. | ABC Amber Access Converter 3.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of MDB files at a time. Partial Features List: - reads MDB (MS Access) files - exports to XLS, CSV, DBF, XML, PDF (does not require Adobe Acrobat to be installed) | |||
Updated: 2, 2006 | Rating: 718 | Author: ProcessText Group | Size: 1145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
3. | ABC Amber CSV Converter 2.03 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of CSV files at a time. As all "ABC Amber" products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads CSV (comma-separated), TXT | |||
Updated: 2, 2006 | Rating: 1563 | Author: ProcessText Group | Size: 1279 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
4. | ABC Amber DBF Converter 2.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of DBF files at a time. As all ABC Amber products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads DBF files (dBASE III+, dBASE IV | |||
Updated: 2, 2006 | Rating: 387 | Author: ProcessText Group | Size: 1124 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
5. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS Excel does not need to be installed. Partial Features List: - reads XLS files (does not require MS Excel to be | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
6. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WK1 files at a time. Important note: Lotus 1-2-3 does not need to be installed. Partial Features List: - reads WK1 files (does not require Lotus 1-2-3 to be | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
7. | ABC Amber PDF2Image Converter 2.02 (thebeatlesforever.com) | ||
TGA, VST, AFI). You can export all pages or just selected page. The software supports a command line and more than 50 languages. Partial Features List - reads PDF files (doesn't require Adobe Acrobat to be installed); - exports the document to BMP, WMF, EMF, ICO, JPG, GIF, PNG, TIFF, PCX, PCC | |||
Updated: 2, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1292 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
8. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important note: Adobe Acrobat doesn't need to be installed. Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
9. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WQ1 files at a time. Important note: Corel QuattroPro does not need to be | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
10. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
Converter program include 40/128 bits PDF encryption, advanced PDF security options, page size and page orientation support, resolution mode, compression mode, etc. Not only conversion to PDF is supported. ABC Amber Text Converter is the award-winning, powerful batch tool to convert documents to PDF, HTML, CHM, RTF, HLP, TXT (ANSI and Unicode), DOC, XLS, MCW, WRI, WPD, WK4, WPS | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
11. | BB EAP 5.38 (bbsys.com) | ||
on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final resolution/or declined help, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
12. | c:JAM - Central Jet Accounts Manager 1.4 (jomdev.de) | ||
(Central Jet Account Manager) is a security- and user account-management tool for organizations that use MS Jet databases such as MS Access and some VB applications. Using a two-paned Explorer-style interface, c:JAM lets you organize workgroups, authorize user access and manage your various datasources. Features include drag-and-drop, context menus, automatic PID and password | |||
Updated: 9, 2005 | Rating: 0 | Author: Johannes Mueller | Size: 2616 kb | Shareware Go to category: Business > Other Similar programs | |||
13. | CafeTimePro -Internet Cafe Software 4.0 (cafetime.com) | ||
the start time, duration and end time are always visible. System Security: Lock down the computer so that only the applications specified by the kiosk administrator are permitted to run. Complete prepay System: Prepaid accounts can be generated in advance for sale to customers. Coin Acceptor Ready: Connect to a coin acceptor mechanism via a COM port. The Timer | |||
Updated: 9, 2005 | Rating: 558 | Author: Rory Keogh | Size: 5982 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
14. | doQuments 2.0.172 (itaz.com) | ||
can be MS Access based or MS SQL Server based. It's powerful security features enable you to control access to documents on a per user basis. doQuments is available in three editions: Standard, Professional and Enterprise. Features of all the three editions are included in the evaluation version. doQuments is a Windows based document management application designed to make it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shiraz Ahmed | Size: 18060 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
15. | EMS MySQL Manager 3.6 (ems-hitech.com) | ||
objects; * Advanced data manipulation tools; * Powerful security management; * Excellent visual and text tools for query building; * Impressive data export and import capabilities; * Completely remade Visual Database Designer; * Easy-to-use wizards performing MySQL services. EMS SQL Manager for MySQL is a powerful tool for MySQL Server administration and | |||
Updated: 2, 2006 | Rating: 1145 | Author: EMS Software Development | Size: 15145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
16. | EMS PostgreSQL Manager 3.4 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing PostgreSQL maintenance tasks. EMS SQL Manager for PostgreSQL is a powerful graphical tool for PostgreSQL DB Server | |||
Updated: 2, 2006 | Rating: 202 | Author: EMS Software Development | Size: 13640 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
17. | go1984 3.0.3.6 (logiware.de) | ||
and problem-free video surveillance and recording. The easy to use software with varied functions at an absolutely competitive price sets a new standard for the software industry. The function range of go1984 contains everything, which is required for professional video surveillance. This includes for example: - Live-Monitoring - Recording (timer controlled, motion | |||
Updated: 9, 2005 | Rating: 1029 | Author: Ralf Kronemeyer | Size: 7443 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
18. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
19. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
20. | HTML Guard 2.32 (aw-soft.com) | ||
you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to copying and modification of your HTML code, images and text by others thus protecting your copyright. While not offering absolute security, the combination of | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
21. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
22. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | Smart Pix Manager 8.05 (xequte.com) | ||
can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in encrypted zips. Databases can be shared across a network and support for off-line sources is included (e.g. prompting for the correct CD-ROM). Features include: Wide Format Support, including all common Images, Sounds, Videos, Text, Office | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | 4t Explorer Sweeper 2.0 (4t-niagara.com) | ||
speeds up PC performance, increases free disks space and improves security by clearing the content of various Explorer and Netscape folders. In its "System Tray" mode it runs in system Tray as icons and helps to free up space on your taskbar. In "Invisible" mode application is not possible to see | |||
Updated: 9, 2005 | Rating: 0 | Author: 4t Niagara Software | Size: 943 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
26. | Anti-Spy.Info adware remover 1.6.5 (anti-spy.info) | ||
is your security and personal privacy tool that detects and removes spyware, trojans, keyloggers and adware. It complements your firewall and anti-virus software. The process viewer tells you every hidden function of all dynamic link library, system task and thread process currently active on your computer. Anti-Spy.Info doesn't require runtime modules, doesn't | |||
Updated: 9, 2005 | Rating: 580 | Author: Alex Neuber | Size: 1212 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
27. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 397 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
28. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a program you can't afford to be without. Designed for 32-bit Microsoft Windows systems, Port Explorer supports Windows 95, 98, 98 SE, ME, NT4, 2K, and XP, and also has a built-in dynamic language support system (supported languages include English, Dutch | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
29. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
be True? Check it out! All-round, Computer and Internet Monitoring software tool. It allows companies and individuals to track the use of PCs easily and invisibly. It logs screenshots, keystrokes, BOTH sides of a CHAT conversation. With Network (LAN) and email | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
30. | Visendo popConnect 6.0 (ppedv.com) | ||
1 modem or ISDN card for the whole network (also router), more security (store copys of all mails local), everything on a NT server installable ( also WIN95), mailinglist ( resolve mailheader) Free support hotline! MS Exchange Server is not able to collect mails from external POP3 or IMAP4 accounts. popConnect is built to do that. It connects to POP3 or IMAP4 accounts | |||
Updated: 9, 2005 | Rating: 16 | Author: ppedv AG | Size: 2500 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
31. | PopMessenger 1.61 (leadmind.com) | ||
system unreliable in question. Introducing PopMessenger by LeadMind Software, the complete small to large enterprise level instant communication solution that offers full range of instant communication tools that do not require a dedicated server or usage of third party services. PopMessenger | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
32. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
bit rate. Simple 1on1 symmetric key entries are used for your email security and file encryption, no Public and Private Keys. The key entries are not partially issued by a Trusted 3rd Party -- you don't have to worry about having to trust any 3rd parties. ShyFile does not use any standardized algorithms but only its own exclusively developed TL6144D algorithm. A File Shredder is | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
33. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
ISDN, DSL or cable connection. Meets your requirements for Internet security & Internet privacy. Shows the currently active connections & the details of these connections. You can shut off any unsafe connection. This program includes four inter locking security services: a firewall, an | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
34. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be available to any one who opens | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Advanced Security Control 2.1 (protect-me.com) | ||
can be executed and by whom. You can control access to any 32-bit software, such as games, Internet browsers, or anything else depending on the time of day and day of week. Configuration is as simple as setting up login hour restrictions. Just choose a program, define users who should be affected by the rules, and choose when to enable and disable access on a one-week grid. If users | |||
Updated: 8, 2004 | Rating: 0 | Author: Ashot Oganesyan | Size: 1081 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
36. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces: Skinnable Simple Interface - just select what do you | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
37. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
38. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
39. | KGB Spy 3.93 (refog.com) | ||
Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | ArchiDoc (3035) (canteco.net) | ||
in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
41. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
42. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this new solution ensures complete protection against viruses, hackers and other | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
43. | Password Manager XP 2.1.322 (cp-lab.com) | ||
Manager XP is a convenient software application for storing passwords, access codes, social security and credit card numbers and other valuable information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | Password Safe and Repository 3.43 (passwordsafe.de) | ||
even offers the possibility of importing from an OCR-Scanner-Software. Thus, troublesome typing of TAN´s is now a thing of the past. One of the many outstanding functions of Password Safe is the possibility of entering your password even automatically in an assigned program as soon as it is launched. Simply record the password entry with the Macro Recorder. When the | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Malchar | Size: 2423 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | Password Spectator Pro 3.10 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
46. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Remote Administrator 2.2 (radmin.com) | ||
of all data streams. Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login. Radmin is very secure and reliable | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
48. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
49. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
50. | Universal Shield 4.0 (everstrike.com) | ||
Shield 4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
51. | WIDO Logbook 1.3 (home.t-online.de) | ||
1.0 from 10.02.2003 Copyright © Witold Domogala http://www.wido-software.de Email: [email protected] --------------------------------------------- 'WIDO Logbook' consists of 2 programs: 1. LogbookService.exe 2. LogbookReports.exe REGISTRATION. WIDO Logbook is shareware and may be | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
53. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
54. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
55. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
56. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
57. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
58. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 120 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
59. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
60. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
61. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set transitions to display them, add labels. You can also add popular | |||
Updated: 2, 2006 | Rating: 42 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
62. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 42 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
63. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 0 | Author: Dengcheng Xia | Size: 1544 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
64. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 60 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
65. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
66. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
67. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
68. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
69. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
70. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|