|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
1. | PDF to Text (pdf2text) SDK-COM 3.0 (globalpdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 48 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
2. | TreePad Business Edition 7.2 (treepad.com) | ||
intuitive and versatile, including: Password-protection and high-security Encryption, Spell Checker (20+ langs.), Thesaurus, multi-Lingual Editions, Photo Album, Website Generation with dynamic tree, image-converter, Presentation mode, documentation-, shortcuts-, hyperlinks-, addresses-, passwords and | |||
Updated: 2, 2006 | Rating: 25 | Author: Henk Hagedoorn | Size: 4074 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
3. | TreePad SAFE 7.1.4 (treepad.com) | ||
Manager (PIM) and database, password protected, with high-security 256bit TwoFish encryption, Word Processor, Web site Generation on the fly, photo album, shortcuts-, notes-, hyperlinks-, addresses-, and collections-Organizer, Documentation Tool, and much more! Widely imitated, TreePad is an Award winning, highly intuitive, powerful application, yet awesomely small: runs also | |||
Updated: 9, 2005 | Rating: 0 | Author: Henk Hagedoorn | Size: 3833 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
4. | BB EAP 5.38 (bbsys.com) | ||
referrals. User action tracking based on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
5. | CryptoHeaven for Mac OS X 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1920 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | My Notes Center 1.4.3 (mynotescenter.com) | ||
necessary information and how to manage the data stored. My Notes Center is an e-organizer and personal information manager jam-packed with features like an overstuffed sandwich. It stores personal notes, e-mails, web links, phone numbers, addresses, even credit card numbers safely and securely. Use | |||
Updated: 2, 2006 | Rating: 0 | Author: Dmitry Bobrik | Size: 1873 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
7. | ShopAssist Point Of Sale System 4.92 (users.iafrica.com) | ||
Cashier Statistics. Over three hundred reports and charts. Security Five levels of password protection for its various modules and functions. Audit trail of all transactions. Integrated data backup and recovery. Network Up to two hundred terminals per server. Multi-Store Inter-Branch Transfers. Consolidated Sales, Consolidated Stockholding, Branch Orders. Tools | |||
Updated: 2, 2006 | Rating: 16 | Author: Ivan Smith | Size: 16796 kb | Shareware Go to category: Business > Other Similar programs | |||
8. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how that’s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 3, 2005 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Go to category: Development > Other Similar programs | |||
9. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
10. | SecureCode 2.0 (aidsoft.com) | ||
based on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.The | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
11. | EasyHues Pro 2.1 (easytools.com) | ||
EasyHues Pro, a program that lets you create color schemes and explore the world of colors. You can create your random color schemes from among 16 million colors with EasyHues Pro. Use the HEX value or the RGB value of the colors in your favorite image editing program. Are you fascinated about colors? Are | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 324608 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
12. | HT WebCam 3.0 (honestech-us.com) | ||
honestech's Video Security 1.0 System keep a watchful eye on your office, house, pool or parking garage - truly, any place you want to monitor. It captures and saves every triggered event that occurs, even while you are away. Once recorded, surveillance videos are stored for later replay. In addition, advanced scheduling makes regular monitoring easy and automatic. You can | |||
Updated: 9, 2005 | Rating: 42 | Author: Hyunjae Im | Size: 4861 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
13. | Active Scripting Fast Disable 1.5 (sparkleware.com) | ||
Explorer's Active Scripting "feature" is responsible for popup windows, scrolling status bar text, security holes, and other annoyances. Unfortunately, some websites require this technology for basic navigation, so permanently disabling Active Scripting is an impractical solution. The "Enable/Disable Active Scripting" option is normally buried deep in the Windows Control | |||
Updated: 2, 2006 | Rating: 149 | Author: Chris Marshall | Size: 580 kb | Shareware Go to category: Network & Internet > Ad Blockers Similar programs | |||
14. | Advanced Content Management 1.0 (advcomm.net) | ||
provided you have translators available. For administration and security purpose you can assign roles as Designers, Translators, Moderators and Administrators to your site. You can write site content in a web-based editor. No need to install and configure any software on your computer. It is designed for the non-technical user. Advanced CMS is ideal for websites having large volume | |||
Updated: 3, 2005 | Rating: 0 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
15. | Advanced Store Builder 2.02 (advcomm.net) | ||
your own store with ease at Advanced Portal. Store's front end designed in XML/XSLT base so that you can upload your own XSLs to change the front end what ever style you want. Also all designing control is provided at the admin section from where you can control the default XSL with ease. Admin section is provided to control whole functionality of EStore. Main Features are given | |||
Updated: 3, 2005 | Rating: 42 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
16. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
17. | ArtistScope CD 2.0 (artistscope.com) | ||
similar to a mini web server and run from anywhere, from the user's hard-drive or CD. Almost anything that you can run on your web site can be run on ArtistScope CD. With a few link modifications to your existing web site, it could be run from CD or downloaded to the end user to run on their computer | |||
Updated: 9, 2005 | Rating: 101 | Author: William Kent | Size: 3943 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
18. | Atelier Web Ports Traffic Analyzer 2.32 (atelierweb.com) | ||
* Real-time mapping of ports to processes (applications and services)! * History since boot-time of all TCP, UDP and RAW ports open through Winsock and respective mapping to processes! * Log since boot-time of data sent and received (up to 500 MB) by above ports! * Sophisticated archiving feature allowing | |||
Updated: 9, 2005 | Rating: 16 | Author: Jose Pascoa | Size: 4497 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
19. | CryptoHeaven 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 43 | Author: Marcin Kurzawa | Size: 10413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | CryptoHeaven for Java(tm) 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcin Kurzawa | Size: 1940 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
21. | Form Mail: eMail Form Processor Pro 3.2 (mitridat.com) | ||
per invocation. Environment Settings (i.e. current time, user's host name etc.) may be included in the templates. Can check that entered data matches a particular format - i.e. all digits, a syntactically correct e-mail address, letters only, etc. Security measures include you being able to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Koldirkaev | Size: 130 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
22. | IglooFTP PRO 3.9 (iglooftp.com) | ||
through the Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1), and Stanford SRP protocols, MD4/MD5 encrypted passwords, persistent downloads, scheduled transfers, advanced FTP operations, server-to-server transfers, full transfer resume, Remote Directory Caching, URL clipboard monitoring, enhanced Firewall support, Drag & Drop, and more. Award winning FTP Client | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Marc Jacquet | Size: 2240 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
23. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 322 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
24. | Message Parse 3.12 (cypressnet.com) | ||
An email processing utility, that provides an easy, and effective way to transfer data from email to other applications. MsgParse exports data from your email messages to user defined customized flat files, that can be used to import to other applications such as database and spreadsheet programs. This is a | |||
Updated: 2, 2006 | Rating: 0 | Author: James Hall | Size: 5231 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
25. | Nici Picture Downloader 2.10 (nicisoft.com) | ||
Stop others from accidentally accessing your pictures with Nici's security and privacy features. Nici uses a proprietary HTTP downloading engine which can simultaneously download from up to 10 different pages, and does not pollute your system's cache, cookie and history folders. Nici automatically finds, downloads and organizes free pictures and movies from the web | |||
Updated: 9, 2005 | Rating: 614 | Author: Chris Inga | Size: 3608 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
26. | Norton AntiVirus Professional 2004 (nct.symantecstore.com) | ||
Norton AntiVirus 2004 Professional is the world’s most trusted antivirus solution†with advanced protection. It combines award-winning virus defense with tools to help you recover important files and securely delete sensitive information. And it comes with a license for two computers, so it’s perfect for home offices. Norton AntiVirus detects and removes | |||
Updated: 9, 2005 | Rating: 24 | Author: Jennifer Leonard | Size: 27977 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
27. | Norton Internet Security 2003 (nct.symantecstore.com) | ||
Norton Internet Security 2003 provides essential protection from viruses, hackers, and privacy threats. This easy-to-use, integrated suite includes full versions of Norton AntiVirus and Norton Personal Firewall to defend your PC against the most common Internet dangers. Norton AntiVirus, the world’s most trusted antivirus solution*, removes infections | |||
Updated: 9, 2005 | Rating: 94 | Author: Jennifer Leonard | Size: 766 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | PocoMail 4.0 (pocomail.com) | ||
A powerful email program that does not compromise your privacy or security. The streamlined interface never gets in your way, with many unique features that allow you to conquer your mailbox: fast searches, full-page preview, Bayesian | |||
Updated: 2, 2006 | Rating: 0 | Author: Slaven Radic | Size: 3836 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
29. | VisNetic MailServer 8.3.5 (deerfield.com) | ||
easy-to-use administration console with unmatched mail server security, speed, and scalability. VisNetic Mail Server features support for Sender Policy Framework (SPF) and Spam URI Realtime Blocklists (SURBL). Instant Anti Spam is a complete spam filtering solution built into VisNetic Mail Server. Instant Anti Spam combines the most effective anti spam technologies into one | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
30. | Visual Web Task 4.0 (lencom.com) | ||
You can teach your spider how to negotiate logins , proxies and security pages to download and extract what You need - files , emails , search results. One spider can invoke another and this let You create a spider to meet ANY complication level. The tool is completely visual and there is no need to be a programmer to use it. The product uses Internet explorer as web engine so | |||
Updated: 9, 2005 | Rating: 62 | Author: Vlad Melamed | Size: 4000 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
31. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
33. | Advanced Desktop Shield 1.63 (softstack.com) | ||
Desktop Shield - security utility is a must for public access PCs located in school or university labs, Internet cafes, libraries and other public places where you need to stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. With Advanced Desktop Shield you can backup, restore and manage | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
36. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
any feature of avast!, prepare and run tasks, store and check task's results. On Access Scanner - special providers to protect: the most of available E-mail clients, Instant Messaging - ICQ, Miranda etc., Network traffic - Intrusion Setection - lightweight firewall, P2P protection for | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
37. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
38. | CSJami Minicom Pro 5.4.0.0 (csjami.netfirms.com) | ||
*Remote Modem *Scheduler *TimeCenter *Wake On Lan WOL *>128 bit security Password protected and optimised for easy use. TCP-IP and IPX enabled, 4,8, 16 bit color selection and multithreaded. Transit routing. Easily take control of remote PCs with Minicom over LAN dial-up or Internet connections. Screen file manager and finder Time Center audio and video routers shutdown | |||
Updated: 2, 2006 | Rating: 42 | Author: CSJami CSJami | Size: 5006 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
39. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
ProcessGuard is a groundbreaking security system first released late in 2003 that protects Windows processes from attacks by other spyware processes, services, drivers, and other forms of executing code on your system. ProcessGuard also stops applications from executing without the users consent, stops malicious worms and trojans from being executed silently in the background, as | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
40. | DigiSecret 2.0 (tamos.com) | ||
being intercepted. DigiSecret also includes Message Encryption Center that allows you to encrypt/decrypt plain text messages and send them via e-mail. DigiSecret also takes care of permanently erasing files or folders that you wish to remove. The files are deleted and overwritten several times to eliminate every possibility of recovering the information. DigiSecret was | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
41. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Ness is security software to password protect and lock folders against unwanted access. Lock Ness will both secure your folders against accidental deletion and prevent other users from copying them. The folder can be locked or unlocked simply by right-clicking on it within Windows Explorer. The folder remains protected should your PC be rebooted into Windows Safe Mode, DOS or another | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
Password Expert is a security software program that lets you restrict access to the folders that contain your sensitive data. Secure your documents to prevent people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
44. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
and normal access to all your folders and the files within. There's no need to un-hide each file or folder individually. And Magic Folders is totally transparent. No one need know your invisible folders/files even exist. If you wish you can establish 5 different accounts so everyone using your computer can create their own invisible folders that only they have access to. Keep | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
46. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
47. | Panda Titanium 2006 Antivirus + Spyware 5.00.00 (pandasoftware.com) | ||
guarantee your security, it offers a double layer of protection against unknown viruses and intruders thanks to its TruPrevent Technologies. It also protects you from hackers, phishing and other online fraud. Ongoing antivirus protection for your computer, thanks to its greater detection and elimination efficiency for all types of viruses and its automatic, daily | |||
Updated: 2, 2006 | Rating: 220 | Author: Panda Software | Size: 33972 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
48. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
increase system performance. Improve Internet performance, and web security. Provide convenient tools to tune up and ease your computer use. PCXL also provides special security features to protect your system. Available in standard and professional suite editions. Features include: -brand new redesigned interface -brand new SmartJupiter optimization engine -thousands of | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
49. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
50. | PECompact 2.75 (bitsum.com) | ||
make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC plug-ins. Custom loaders (decompression) stubs and API hook plugins are also able to be utilized. Advanced configuration includes selection of resource types that | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
51. | PowerZip 7.06 (powerzip.biz) | ||
documents with PowerZip - an easy to use file compression & security program. PowerZip Compression / Extraction Wizards make working with archives (such as Zip files) easy while providing an array of advanced features. The Wizards are quick to use because they have only a small number of steps; some steps can be switched of if not needed, others can be skipped to use default | |||
Updated: 9, 2005 | Rating: 124 | Author: Dimitri Ternovski | Size: 1920 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
52. | Protect Folder 98 3.0 (everstrike.com) | ||
Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the file or folder that you | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
53. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | Search and Recover 3.0d (iolo.com) | ||
calendars, contacts, notes, and tasks in MS Outlook - Bonus security features allow you to quickly and securely delete ANY existing file or folder on your system, keeping private data away from other recovery tools and thereby out of unwanted hands. - Eliminates the need to go to backups when data is accidentally lost - Create and work with emergency disk images Create an exact | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
56. | Super Password Guard 3.1 (topaim.net) | ||
accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you accidentally forget your master password, the hint will help you to recall it. 3. Make custom categories/subcategories to divide your accounts into logical | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
57. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
58. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
59. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is ideal for monitoring convenience stores, gas stations, day care centers, retirement facilities, hospitals, laboratories, commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
61. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
and up-to-date protection against emerging spyware. Spy Sweeper’s advanced removal engine deletes the toughest spyware programs - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats - which are specifically designed to avoid detection and removal. This | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
62. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and log-ins | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
63. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | ZCuretIT 1.2.4.1 (zcureit.com) | ||
have done everything you can to protect your data. For you it's as easy as selecting the file, entering the password, selecting the output destination, and pressing a button to create a self-extracting and self-decrypting executeable. For the recipient, it's as easy as entering the password, pressing the Open button, and the the application automatically opens up in the | |||
Updated: 8, 2004 | Rating: 0 | Author: Ken Myers | Size: 892 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
65. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
66. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how thatâ??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
67. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
68. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
69. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
70. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
71. | Norton Internet Security 2004 (nct.symantecstore.com) | ||
Norton Internet Security 2004 provides essential protection from viruses, hackers, and privacy threats. Powerful yet easy to use, this award-winning suite now includes advanced spam-fighting software. Viruses are a daily threat, so Norton Internet Security gives you the world’s most trusted antivirus solution. Norton AntiVirus removes viruses from email | |||
Updated: 9, 2005 | Rating: 47 | Author: Jennifer Leonard | Size: 35100 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | PocoMail 4.0 (pocomail.com) | ||
A powerful email program that does not compromise your privacy or security. The streamlined interface never gets in your way, with many unique features that allow you to conquer your mailbox: fast searches, full-page preview, Bayesian | |||
Updated: 2, 2006 | Rating: 0 | Author: Slaven Radic | Size: 3836 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
73. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
75. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
76. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
77. | WatchetBurn! 2.72 (watchetsoft.co.uk) | ||
can choose to modify the SQL yourself. We've specialised in data security for blue chip companies for 20 years. One banking client said 'Your software's boring - it just works !' We take that as a compliment. Now introducing WatchetBurn! - powerful, secure, simple Windows software for the programmer, home and office user. Runs under Windows 9x and later. Supports all | |||
Updated: 3, 2005 | Rating: 0 | Author: Colin Balkham | Size: 5711 kb | Shareware Similar programs | |||
78. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
79. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
80. | wodSSH 2.3.7.0 (weonlydo.com) | ||
It also supports blocking and non-blocking operations, thus it's suitable for many environments, such as ASP. Using WaitFor and Execute methods, it will behave just like expect command known from UNIX systems. When you're unsure when to send actual command, wodSSH may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
81. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
for response, and just disconnect. And all of it fully automated. It's suitable for many environments, such as ASPx. When you're unsure when to send actual command, wodSSH.NET may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent command | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
82. | APS Accounting & Stock Control 1.1.6.0 (advanced.servehttp.com) | ||
control features with deferent types of transactions such as Cost Centers, General Vouchers, Reciept & Payment Vouchers and wide range of reports such as general ledger, profit and loss, trial balance, statement of accounting, Taccounts and balance sheet and a complete Stock Control features such Item | |||
Updated: 2, 2006 | Rating: 42 | Author: yasser almohanna | Size: 24700 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
83. | Cornolius Database Application 1.4.300 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card. Cornolius Database Application is a stand-alone multi-user program for building databases. It enables you to build databases based on primary-foreign key stucture. It is equipped with a database wizard to help you build your databases with | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 12093 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
84. | m9P Phonebook2 2.1 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. This phonebook manager provides you with an easy way to store and retrieve your contacts information. m9P Phonebook2 can handle multiple phonebook databases and is capable of exporting a database to a web form for use on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 11348 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
85. | m9P Database 1.2 (mental9Production.com) | ||
by a password and by users' privileges which enhances database security. This program has also built-in transactional support, allowing the user to roll back the database to a previous state. m9P Database has a variety of useful and unique features. Among these are the ability to export a database for use on a Web site and logging of all database activities to a file. This | |||
Updated: 9, 2005 | Rating: 51 | Author: Khaled Aboulhosn | Size: 12566 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
86. | m9P Zipper X 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. Special Offer: click Buy Now button on this site to buy the software directly from RegNow and receive 30% discount! m9P Zipper X is a simple file compression (zipping) & decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4423 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
87. | m9P Zipper XT 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. m9P Zipper XT is a user-friendly heavy-duty file compression (zipping) and decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the [.zip] format. m9P Zipper XT outputs very small zipped | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4326 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|