|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
1. | !Remove Access Passwords! 2.0 (e-tech.ca) | ||
Do you like to hack? Do you have a database with user-level security? Want it removed ........click here for details. Here is a software package for you.... And it works!!! Remove Access Software is used by an estimated 10,000 users worldwide. "Remove Access Passwords" removes Database File Passwords in an MDB file. This is what everybody is talking | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Britto | Size: 1515 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
2. | #1 Key logger 2.0 (allthesoft.com) | ||
titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited websites. It logs keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation for most popular chat software, AOL content and visited | |||
Updated: 9, 2005 | Rating: 215 | Author: Herry Kevin | Size: 1048 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
4. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
5. | 007 Spy Software 3.01 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | 1st Email Anti-Virus 4.0 (zzee.com) | ||
Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Slavic | Size: 975 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
8. | 1st Email Anti-Virus 4.0 (zzee.com) | ||
Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Slavic | Size: 975 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
9. | 4t Explorer Sweeper 2.0 (4t-niagara.com) | ||
speeds up PC performance, increases free disks space and improves security by clearing the content of various Explorer and Netscape folders. In its "System Tray" mode it runs in system Tray as icons and helps to free up space on your taskbar. In "Invisible" mode application is not possible to see | |||
Updated: 9, 2005 | Rating: 0 | Author: 4t Niagara Software | Size: 943 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
10. | AB Password Generator 2.33 (ab_software.tripod.com) | ||
at your choice. The list can contain up to 999999 passwords. This software can generate random passwords with length between 1 and 999 characters. You can choose that your generated password to contain letters and/or numbers and/or symbols and/or your predefined text. Your specific text can be add at | |||
Updated: 3, 2005 | Rating: 605 | Author: AB Software | Size: 1572 kb | Shareware Similar programs | |||
11. | AB Screen Locker 3.62 (ab_software.tripod.com) | ||
the desktop icons are hidden too. If the system is restarted, this software will automatically load with Windows and your PC will be locked. The password used to lock and unlock the screen can contain any type of character with any length (but minimum 3). The application is loading very fast and it has a nice, friendly GUI. A small utility that allows you to lock your screen. Any key | |||
Updated: 3, 2005 | Rating: 569 | Author: AB Software | Size: 1510 kb | Shareware Similar programs | |||
12. | ABC Amber Access Converter 3.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of MDB files at a time. Partial Features List: - reads MDB (MS Access) files - exports to XLS, CSV, DBF, XML, PDF (does not require Adobe Acrobat to be installed) | |||
Updated: 2, 2006 | Rating: 718 | Author: ProcessText Group | Size: 1145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
13. | ABC Amber CSV Converter 2.03 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of CSV files at a time. As all "ABC Amber" products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads CSV (comma-separated), TXT | |||
Updated: 2, 2006 | Rating: 1563 | Author: ProcessText Group | Size: 1279 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
14. | ABC Amber DBF Converter 2.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of DBF files at a time. As all ABC Amber products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads DBF files (dBASE III+, dBASE IV | |||
Updated: 2, 2006 | Rating: 387 | Author: ProcessText Group | Size: 1124 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
15. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS Excel does not need to be installed. Partial Features List: - reads XLS files (does not require MS Excel to be | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
16. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WK1 files at a time. Important note: Lotus 1-2-3 does not need to be installed. Partial Features List: - reads WK1 files (does not require Lotus 1-2-3 to be | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
17. | ABC Amber PDF2Image Converter 2.02 (thebeatlesforever.com) | ||
TGA, VST, AFI). You can export all pages or just selected page. The software supports a command line and more than 50 languages. Partial Features List - reads PDF files (doesn't require Adobe Acrobat to be installed); - exports the document to BMP, WMF, EMF, ICO, JPG, GIF, PNG, TIFF, PCX, PCC | |||
Updated: 2, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1292 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
18. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important note: Adobe Acrobat doesn't need to be installed. Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
19. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WQ1 files at a time. Important note: Corel QuattroPro does not need to be | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
20. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
Converter program include 40/128 bits PDF encryption, advanced PDF security options, page size and page orientation support, resolution mode, compression mode, etc. Not only conversion to PDF is supported. ABC Amber Text Converter is the award-winning, powerful batch tool to convert documents to PDF, HTML, CHM, RTF, HLP, TXT (ANSI and Unicode), DOC, XLS, MCW, WRI, WPD, WK4, WPS | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
21. | AbsoluteTelnet 4.01 (celestialsoftware.net) | ||
AbsoluteTelnet provides absolutely the fastest and most accurate software terminal emulations ever built, including VT52, VT100, VT220, VT320, XTERM, QNX, ANSI, and SCO-ANSI. Packed with connectivity options such as Telnet, SSH1, SSH2, dialup, and COM ports, this terminal can connect to practically anything. A tight integration with Windows Explorer gives AbsoluteTelnet a look and | |||
Updated: 2, 2006 | Rating: 90 | Author: Brian Pence | Size: 1486 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
22. | Access Developer Application Architect 1.04 (fcs-software.com) | ||
You can run Code, Forms, Reports or Queries. Our Menu has built in Security features using the Access Security module or you can ignore these features. Program and Data are split. Menu program handles the location of the backend data file. This can be local or networked location. Views allow | |||
Updated: 9, 2005 | Rating: 814 | Author: Howard Powell | Size: 4668 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
23. | Ace ScreenSpy 5.0 (caltroxsoft.com) | ||
ScreenSpy 5.0 is a popular Advanced Security Software to secretly monitor your PC screen, capture and save any Screen or Windows activity that occurs at any time. The Software automatically captures and saves the entire monitor screen, together with any Windows, Applications, Browser windows & images, Web-pages & Web-images etc that are opened by any user as well any | |||
Updated: 9, 2005 | Rating: 0 | Author: Caltrox Software | Size: 3550 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | Active CHAOS 5.0 (safechaos.net) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS programs installed | |||
Updated: 9, 2005 | Rating: 0 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | Active CHAOS 5.0 (safechaos.com) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS programs installed | |||
Updated: 9, 2005 | Rating: 42 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | Active Scripting Fast Disable 1.5 (sparkleware.com) | ||
is responsible for popup windows, scrolling status bar text, security holes, and other annoyances. Unfortunately, some websites require this technology for basic navigation, so permanently disabling Active Scripting is an impractical solution. The "Enable/Disable Active Scripting" option is normally buried deep in the Windows Control Panel, and changing it repeatedly is a | |||
Updated: 2, 2006 | Rating: 149 | Author: Chris Marshall | Size: 580 kb | Shareware Go to category: Network & Internet > Ad Blockers Similar programs | |||
27. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
be True? Check it out! All-round, Computer and Internet Monitoring software tool. It allows companies and individuals to track the use of PCs easily and invisibly. It logs screenshots, keystrokes, BOTH sides of a CHAT conversation. With Network (LAN) and email | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
28. | Advanced Content Management 1.0 (advcomm.net) | ||
provided you have translators available. For administration and security purpose you can assign roles as Designers, Translators, Moderators and Administrators to your site. You can write site content in a web-based editor. No need to install and configure any software on your computer. It is designed for the non-technical user. Advanced CMS is ideal for websites having large | |||
Updated: 3, 2005 | Rating: 0 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
29. | Advanced File Shredder 1.14 (ashkon.com) | ||
number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like business or financial information can be easily recovered. Note: when you normally delete files using Windows Explorer and even emptying the Recycle Bin it is still possible to recover data or some of its | |||
Updated: 9, 2005 | Rating: 357 | Author: Ashkon Software | Size: 512 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | Advanced HTMLCoder 3.0 (raysion.com) | ||
HTMLCoder is a unique security and content management tool that enables you to shrink the size of your Web pages, restrict access to them and protect your code from unauthorized viewing. Use this utility to optimize the HTML, CSS and JavaScript code by removing redundant spaces, lines and characters and changing styles, classes and variable names for the shorter ones. It can also | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
31. | Advanced Password Generator 2.87 (segobit.com) | ||
Advanced Password Generator is a Windows based application designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password | |||
Updated: 2, 2006 | Rating: 16 | Author: Segobit Software Segobit Software | Size: 177 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
32. | Advanced Password Manager 2.33 (rayslab.com) | ||
sites assign you a password without letting you change it. Besides, security experts say that you should use different passwords to protect yourself. Are fed up with forgetting your passwords and getting "Your login or password is incorrect" messages? Then it's time you get Advanced Password Manager | |||
Updated: 9, 2005 | Rating: 0 | Author: Rayslab Inc. | Size: 1086 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
33. | Advanced Project Management 2.03 (advcomm.net) | ||
on different topics relating to your projects Establish role based security through an easy to understand interface. Perform administrative tasks easily. Use powerful online help (context sensitive) to do different thing Advanced Project Management is an Advanced Portal product offered to any website | |||
Updated: 3, 2005 | Rating: 48 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
34. | Advanced Security Level 6.1 (softfolder.com) | ||
Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System, Add/Remove Programs | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
35. | Advanced Store Builder 2.02 (advcomm.net) | ||
Listing: All items are listed under selected departments. Role Based Security Implemented. Registered users Services: Only registered users allowed to add/edit/delete an item Sales Tax: State Wise and fixed rate Sales Tax implementation. Order notification system: Provide controls to admin to Specify person's email to notify them order is placed so that they can arrange the order's | |||
Updated: 3, 2005 | Rating: 42 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
36. | AES Home 4.0 (aes.safeworld.info) | ||
are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | AES Home 4.0 (abensoft.com) | ||
are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | AES Pro 5.5 (aes.safeworld.info) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS Public Key programs | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | AES Pro 5.5 (abensoft.com) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS Public Key programs | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
40. | AllCleaner 6.5 (allcleaner.com) | ||
and most advanced privacy and PC cleaning tool. We invented this software category more than two years ago and since then more than one million customers worldwide have installed Windows AllCleaner on their PCs! If you are like most people on the Net, you've most likely downloaded music on the Net. Did you know that when you use these file sharing services, they track your | |||
Updated: 9, 2005 | Rating: 25 | Author: Leo van Opstal | Size: 4929 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
41. | Anti-Spy.Info adware remover 1.6.5 (anti-spy.info) | ||
is your security and personal privacy tool that detects and removes spyware, trojans, keyloggers and adware. It complements your firewall and anti-virus software. The process viewer tells you every hidden function of all dynamic link library, system task and thread process currently active on your computer. Anti-Spy.Info doesn't require runtime modules, doesn't | |||
Updated: 9, 2005 | Rating: 580 | Author: Alex Neuber | Size: 1212 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
42. | Anti-Trojan Shield 2.1.0.14 (atshield.com) | ||
while maintaining an exceptional level of personal privacy and security. Without this tool, you definitely should worry about new Trojan horses and viruses, but with Anti-Trojan Shield you have no need for concern. Its integrated update utility always keeps the software on the cutting edge, fully armed for battle. Anti-Trojan Shield is an advanced, highly effective blocker of | |||
Updated: 9, 2005 | Rating: 280 | Author: ATShield Team | Size: 6366 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
43. | ArchiDoc (3035) (canteco.net) | ||
in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
44. | Auto Maintenance Plus 5.2a (reg-software.com) | ||
affordability for mortgage or auto loans, plus optional password security of your important information, and you have many bases covered. Now with improved print capabilities and more. Auto Maintenance Plus should capitalize the PLUS. You get a database to record your automobile expenses for maintenance and repairs, etc and | |||
Updated: 2, 2006 | Rating: 0 | Author: Richard Gilmore | Size: 8657 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
45. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces: Skinnable Simple Interface - just select what do you | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
46. | Ax NetGuard 2.0 (ax-soft.com) | ||
what e-mails were sent, what was said on instant messaging and what software they used. In parent control mode, you get all the benefits of all the stealth monitoring features plus the ability to limit how the computer is used. In control mode, you can also block and filter inappropriate Internet sites. You can even create a listing of only allowable sites where they can visit and | |||
Updated: 3, 2005 | Rating: 42 | Author: Moser Damien | Size: 2187 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
47. | Axessh Windows SSH Client 3.2 (labf.com) | ||
(apart from places where people aren't allowed to own cryptographic software). SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet ; cyber hackers stealing passwords and other important information. Axessh brings you | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
48. | BB EAP 5.38 (bbsys.com) | ||
on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final resolution/or declined help, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
49. | BestCrypt 7.20.2 (jetico.com) | ||
is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | Boss Key 1.6 (boss-key.com) | ||
using a hot key! Everybody should have such program for personal security. Imagine, you work with confidential information - maybe, just writing email to your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
51. | BPS Windows Trace Remover 5.0 (bulletproofsoft.h4host.com) | ||
any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be a dangerous weapons in the wrong hands. Wipe out | |||
Updated: 9, 2005 | Rating: 77 | Author: Naglaa Elbanhawy | Size: 5479 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
52. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons in the wrong hands. New added features to | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
53. | BREAKTRU PAYROLL 2006 10.1.0 (breaktru.com) | ||
the deductions and withholding too much or too little? Payroll 2006 software makes it easy to keep track of your weekly or bi-weekly pay checks. Enter the hours worked as well as overtime, holiday, sick leave, and other pay categories, then Payroll 2006 applies the withholding tax rates for federal | |||
Updated: 3, 2006 | Rating: 101 | Author: David Giordano | Size: 6501 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
54. | BREAKTRU PAYROLL 2006 10.1.0 (breaktru.com) | ||
the deductions and withholding too much or too little? Payroll 2006 software makes it easy to keep track of your weekly or bi-weekly pay checks. Enter the hours worked as well as overtime, holiday, sick leave, and other pay categories, then Payroll 2006 applies the withholding tax rates for federal | |||
Updated: 3, 2006 | Rating: 0 | Author: David Giordano | Size: 6501 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
55. | BriefAudit 1.0c (peccatte.karefil.com) | ||
BriefAudit selects files changes events in NT4/NT2000 standard Security Log and writes the selected events in the corresponding Windows 2000 and/or Macintosh files comments. Main features Runs on Windows NT 4.0/Windows 2000 running standard audit policy. Selects files modifications events in the standard Security Log, keeping only the essential informations: Date and | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2712 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | c:JAM - Central Jet Accounts Manager 1.4 (jomdev.de) | ||
(Central Jet Account Manager) is a security- and user account-management tool for organizations that use MS Jet databases such as MS Access and some VB applications. Using a two-paned Explorer-style interface, c:JAM lets you organize workgroups, authorize user access and manage your various datasources. Features include drag-and-drop, context menus, automatic PID and password | |||
Updated: 9, 2005 | Rating: 0 | Author: Johannes Mueller | Size: 2616 kb | Shareware Go to category: Business > Other Similar programs | |||
57. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
58. | Captain Mnemo Pro 1.41 (refog.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | Capturix BabyWatch 1.50.140 (capturix.com) | ||
children at home is now available, Capturix BabyWatch is a simple software that power your webcam into a Video Security System. BabyWatch ables you to call home and access to all images captured by your webcam during the day, an integrated motion detector can capture a image only when detects | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandre Simхes | Size: 6770 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
60. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their hard | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
61. | CHAOS Messenger 4.0 (safechaos.net) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
62. | CHAOS Messenger 4.0 (safechaos.com) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
64. | CHAOS Self Decryptor 3.9 (safechaos.com) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 0 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | CHAOS Universal 6.2 (safechaos.com) | ||
CHAOS Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies. This software provides all the standard information about your chat partner plus a whole lot more. How many times have you | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
67. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
68. | CobraSoft PopStop 2.1 (cobrasoftonline.com) | ||
and pop under windows and ads while you browse the web. This is the software advertisers don't want you to know about. CobraSoft PopStop puts the control back in your hands. You decide what windows stay and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ian Pilipski | Size: 6271 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
69. | CoffeeCup WebCam 3.5 (promaxum.com) | ||
with CoffeeCup WebCam, you can hook up your camera, start the WebCam software, and put LIVE Images online in minutes ! You can even have multiple cameras and multiple Websites. CoffeeCup WebCam will upload images from any camera, to any Website on your list, on any schedule you set ! And with the | |||
Updated: 9, 2005 | Rating: 215 | Author: CoffeeCup Software | Size: 2923 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
70. | Complete Anonymous Internet 1.0 (pcmesh.com) | ||
SOCKS proxy, corporate networks won't need to install internet security software (antivirus, firewall, antitrojan, web content filters, etc.) on every single computer. Instead all security software will be installed on SOCKS proxy only, where the incoming traffic will be | |||
Updated: 9, 2005 | Rating: 42 | Author: PC Mesh Marketing | Size: 1574 kb | Shareware Similar programs | |||
71. | Complete Cleanup 4.83 (softdd.com) | ||
cleanups which you would like to add to the cleanup list. This software will also improve the performance and disk reading speed of your pc. Simply run the self-extracting file to install. (Runs on all Windows systems). Protect your internet privacy, clean up all the garbage data on your pc, and improve your pc | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
72. | Comtun Pro 4.5a (linkbyte.com) | ||
today to see what it can offer you! stealth network firewall, NAT software router, HTTP caching, SOCKS server, access control and authentication, built-in DHCP Server, dial-up control, VPN (PPTP and IPSec), network monitoring and management, banner blocking, firewall timing | |||
Updated: 9, 2005 | Rating: 82 | Author: Sales Linkbyte | Size: 2141 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
73. | Crime Catcher 2.1 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | Crime Catcher 3.0 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The Professional Edition supports upto 4 webcams/input devices so security can be maximized. The webcam software will monitor for movement or motion. If motion is detected pictures will be taken of what the webcam can see! You can of course have other actions take place | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Torkington | Size: 4262 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | CryptEnCrypt 1.10 (inetprom.com) | ||
is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
76. | CryptoMite 2.00 (baxbex.com) | ||
encapsulated inside the archive. CryptoMite is the first encryption software (and properly the only) which supports personal skins for encrypted exe-files (see http://www.baxbex.com/krprof.html http://www.baxbex.com/krprof.html for examples). You even could build encrypted exe-files in several languages (German, Spain, Italien, Portugues, French, Swedish). To send | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
78. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | Debt Reduction - Zilch Standard 4.0 (zilchworks.com) | ||
payment and balance schedules and be on your way to financial security. Stop giving your money away... Stop making your bank rich... Stop making your credit card company rich... Stop making your mortgage company rich. Because, as long as you keep giving them your money [INTEREST PAYMENTS]... guess what? They'll keep taking it. No financial expertise is required. Get | |||
Updated: 9, 2005 | Rating: 42 | Author: Michael Riley | Size: 5216 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
80. | Delete 2.10 (eBible.org) | ||
DELETE.EXE is a Win32 console application that deletes files. Win32 Console application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
81. | Desktop Lock 6.1 (toplang.com) | ||
Lock is a powerful computer security software, it locks your pc to prevent others from accessing your private documents or resources, after your computer was locked by Desktop Lock, people will not be able to access your documents, browse your computer, or use programs on your computer. Desktop Lock fully supports all Windows system, includes Windows 2000/XP/NT and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
82. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
83. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
84. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a program you can't afford to be without. Designed for 32-bit Microsoft Windows systems, Port Explorer supports Windows 95, 98, 98 SE, ME, NT4, 2K, and XP, and also has a built-in dynamic language support system (supported languages include English, Dutch | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
85. | Diary 3000 2.5 (yourfamilysoftware.com) | ||
a unique gift for that special child? Along comes Diary 3000!... a software program that gives your child the security she/he needs to keep a personal diary. It is password protected and extremely easy to use. Your child will be using it like an expert within minutes of installing it. The look and feel of the program can be completely customized to your child's taste. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Lee Mc Cauley | Size: 3508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
87. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
88. | Document Post 1.01 (offsitelabs.com) | ||
interface. Document Post allows the author to publish content. The software prevents a web master from being the bottleneck when information needs to be published in a timely manner. User login security to maintain user's personal information. Administration login to manage the application. Can require "supervisor" approval before documents become available for display | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Copeland | Size: 4373 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
89. | doQuments 2.0.172 (itaz.com) | ||
can be MS Access based or MS SQL Server based. It's powerful security features enable you to control access to documents on a per user basis. doQuments is available in three editions: Standard, Professional and Enterprise. Features of all the three editions are included in the evaluation version. doQuments is a Windows based document management application designed to make it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shiraz Ahmed | Size: 18060 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
90. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
91. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
92. | Easy Ebook Creator 1.0 (allthesoft.com) | ||
a few mouse clicks. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may access. Creates ebooks in a few mouse clicks. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may | |||
Updated: 9, 2005 | Rating: 0 | Author: Herry Kevin | Size: 1201 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
93. | Easy Photo Grabber 1.4.0 (mslsoft.com) | ||
are free of charge for registered users ! Video Photo Surveillance Software for Windows. Grab video images from your webcam or TV-capture card and create a photo archive on disk. Keep a watchful eye on your office, house, or shop - truly, any place you want to | |||
Updated: 9, 2005 | Rating: 16 | Author: MSL Soft | Size: 1390 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
94. | Easy Spyware and Adware Killer 1.1 (easyspywarekiller.com) | ||
Spyware and Adware Killer is an award-winning spy software, spyware and adware detector. The software goes after Trojan horses, adware, key loggers, dialers, spy cookies, and system-monitoring tools. Easy Spyware and Adware Killer is an award-winning spy software, spyware and adware | |||
Updated: 9, 2005 | Rating: 169 | Author: Christian Champion | Size: 294 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
95. | ECS (Event Control System) 2.3.14 (OmnipotenceSoftware.com) | ||
of our 15 years of experience in automation software development, ECS is an all-purpose automation program suitable for virtually any tasks (in residential, commercial, and industrial environments). Boasting an object-oriented design, ECS is elegantly simple, yet extremely powerful. Automated tasks may be implemented via simple time-based schedules (great for novices) and/or | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Gilmore | Size: 12000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
96. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
97. | EMS IB Manager 4.1 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Powerful stored procedure debugger; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing InterBase and Firebird services. EMS SQL Manager 2005 for IB/FB is a powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
98. | EMS MySQL Manager 3.6 (ems-hitech.com) | ||
objects; * Advanced data manipulation tools; * Powerful security management; * Excellent visual and text tools for query building; * Impressive data export and import capabilities; * Completely remade Visual Database Designer; * Easy-to-use wizards performing MySQL services. EMS SQL Manager for MySQL is a powerful tool for MySQL Server administration and | |||
Updated: 2, 2006 | Rating: 1145 | Author: EMS Software Development | Size: 15145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
99. | EMS PostgreSQL Manager 3.4 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing PostgreSQL maintenance tasks. EMS SQL Manager for PostgreSQL is a powerful graphical tool for PostgreSQL DB Server | |||
Updated: 2, 2006 | Rating: 202 | Author: EMS Software Development | Size: 13640 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
100. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
encrypted by Encryption Workshop will not be decrypted by other software or vice versa. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|