|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
101. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
102. | Cheat Checker 2.03 (nine-patch.com) | ||
complaints by classmates dropped to near zero. Students named the software The Cheat Checker. The Cheat Checker examines similar pairs of answer sheets for independent marking. Any pair that fails the test is labeled presumptive cheating. The Cheat Checker then examines the uniqueness of this pair with respect to the entire class. A significant finding for uniqueness and for | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
103. | CobraSoft PopStop 2.1 (cobrasoftonline.com) | ||
and pop under windows and ads while you browse the web. This is the software advertisers don't want you to know about. CobraSoft PopStop puts the control back in your hands. You decide what windows stay and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ian Pilipski | Size: 6271 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
104. | Codelock 2.0 (codelock.co.nz) | ||
an optional expiry time. Codelock is an easy to use, full-featured software encryption solution for PHP and HTML scripts. Codelock V2.0 works by encrypting your entire PHP page(s) (including HTML and Javascript). You simply browse your computer harddrive for your file(s) or specify your server path | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
105. | CoffeeCup WebCam 3.5 (promaxum.com) | ||
with CoffeeCup WebCam, you can hook up your camera, start the WebCam software, and put LIVE Images online in minutes ! You can even have multiple cameras and multiple Websites. CoffeeCup WebCam will upload images from any camera, to any Website on your list, on any schedule you set ! And with the | |||
Updated: 9, 2005 | Rating: 215 | Author: CoffeeCup Software | Size: 2923 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
106. | Complete Anonymous Internet 1.0 (pcmesh.com) | ||
SOCKS proxy, corporate networks won't need to install internet security software (antivirus, firewall, antitrojan, web content filters, etc.) on every single computer. Instead all security software will be installed on SOCKS proxy only, where the incoming traffic will be | |||
Updated: 9, 2005 | Rating: 42 | Author: PC Mesh Marketing | Size: 1574 kb | Shareware Similar programs | |||
107. | Complete Cleanup 4.83 (softdd.com) | ||
cleanups which you would like to add to the cleanup list. This software will also improve the performance and disk reading speed of your pc. Simply run the self-extracting file to install. (Runs on all Windows systems). Protect your internet privacy, clean up all the garbage data on your pc, and improve your pc | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
108. | Comtun Pro 4.5a (linkbyte.com) | ||
today to see what it can offer you! stealth network firewall, NAT software router, HTTP caching, SOCKS server, access control and authentication, built-in DHCP Server, dial-up control, VPN (PPTP and IPSec), network monitoring and management, banner blocking, firewall timing | |||
Updated: 9, 2005 | Rating: 82 | Author: Sales Linkbyte | Size: 2141 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
109. | Crime Catcher 2.1 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | Crime Catcher 3.0 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The Professional Edition supports upto 4 webcams/input devices so security can be maximized. The webcam software will monitor for movement or motion. If motion is detected pictures will be taken of what the webcam can see! You can of course have other actions take place | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Torkington | Size: 4262 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
111. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
LE Ttotally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password protect any file or folder with strong Encryption. It allows you to protect data | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
112. | CryptEnCrypt 1.10 (inetprom.com) | ||
is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
113. | cryptlib 3.0 (download.componentspot.com) | ||
by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
114. | Cryptocx v5 5.1.6 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
115. | Cryptocx v6 6.1.3 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
116. | CryptoMite 2.00 (baxbex.com) | ||
encapsulated inside the archive. CryptoMite is the first encryption software (and properly the only) which supports personal skins for encrypted exe-files (see http://www.baxbex.com/krprof.html http://www.baxbex.com/krprof.html for examples). You even could build encrypted exe-files in several languages (German, Spain, Italien, Portugues, French, Swedish). To send | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
117. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
118. | CSSS 2.2 (sarbash.com) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The principle of action bases on microphone (microphones) real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
119. | CSSS Video 2.1 (HTTP:) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? CSSS – Computer Security System with motion detection by WEB - camera. The principle of action bases on WEB-camera real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 3005 kb | Demo Go to category: Home & Hobby > Personal Interest Similar programs | |||
120. | CyberMatrix In Out Scheduler 1.01 (cyber-matrix.com) | ||
accustomed to the traditional scheduling boards. To this effect the software looks a lot like an actual scheduling board. Virtual pins are used to designate which employees are in, which are out and when they will return. Unlike the traditional scheduling boards, In Out Scheduler can be accessed by all | |||
Updated: 9, 2005 | Rating: 0 | Author: Cyber Matrix | Size: 1669 kb | Commercial Go to category: Business > Other Similar programs | |||
121. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
122. | dbQwikSite PE 4.0 (thedevshop.com) | ||
PE :Free Database Web Site Builder Software Personal Edition is a starter version of dbQwikSite. It is an intelligent code generator saving hours of tedious web programming. Absolutely no coding required. Features: -100% code generation you don't need to code ASP/PHP/HTML or SQL -Connects to almost any database Access, SQL Server, MySQL and more... -Integrated Drag & | |||
Updated: 2, 2006 | Rating: 48 | Author: Gerald Enright | Size: 7062 kb | Freeware Go to category: Web Development > ASP & PHP Similar programs | |||
123. | Debt Reduction - Zilch Standard 4.0 (zilchworks.com) | ||
payment and balance schedules and be on your way to financial security. Stop giving your money away... Stop making your bank rich... Stop making your credit card company rich... Stop making your mortgage company rich. Because, as long as you keep giving them your money [INTEREST PAYMENTS]... guess what? They'll keep taking it. No financial expertise is required. Get | |||
Updated: 9, 2005 | Rating: 42 | Author: Michael Riley | Size: 5216 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
124. | Delete 2.10 (eBible.org) | ||
DELETE.EXE is a Win32 console application that deletes files. Win32 Console application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
125. | Desktop Lock 6.1 (toplang.com) | ||
Lock is a powerful computer security software, it locks your pc to prevent others from accessing your private documents or resources, after your computer was locked by Desktop Lock, people will not be able to access your documents, browse your computer, or use programs on your computer. Desktop Lock fully supports all Windows system, includes Windows 2000/XP/NT and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
126. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
127. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
128. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a program you can't afford to be without. Designed for 32-bit Microsoft Windows systems, Port Explorer supports Windows 95, 98, 98 SE, ME, NT4, 2K, and XP, and also has a built-in dynamic language support system (supported languages include English, Dutch | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
129. | Diary 3000 2.5 (yourfamilysoftware.com) | ||
a unique gift for that special child? Along comes Diary 3000!... a software program that gives your child the security she/he needs to keep a personal diary. It is password protected and extremely easy to use. Your child will be using it like an expert within minutes of installing it. The look and feel of the program can be completely customized to your child's taste. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Lee Mc Cauley | Size: 3508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
130. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
131. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
132. | DLOCK2 2.01 (eBible.org) | ||
source code in your own products at no charge. This software is free, however you may send the author donations to express appreciation if you like. DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code included. Version 2.01 is the same as the original DLOCK2, except recompiled for | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
133. | Document Post 1.01 (offsitelabs.com) | ||
interface. Document Post allows the author to publish content. The software prevents a web master from being the bottleneck when information needs to be published in a timely manner. User login security to maintain user's personal information. Administration login to manage the application. Can require "supervisor" approval before documents become available for display | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Copeland | Size: 4373 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
134. | Don't Touch My Computer Episode 2 1.2a (enetwork.ncbuy.com) | ||
If you're tired of people messing with your PC whenever you step way, it's time to send them the right message. Don't Touch My Computer Episode 2 is the fun filled sequel to our initial DTMC screen saver. In addition to a stream of fun animations that play out, the lovable dog does a whole mess of tricks to | |||
Updated: 9, 2005 | Rating: 0 | Author: NCBuy Development | Size: 2284 kb | Freeware Go to category: Desktop > Similar programs | |||
135. | doQuments 2.0.172 (itaz.com) | ||
can be MS Access based or MS SQL Server based. It's powerful security features enable you to control access to documents on a per user basis. doQuments is available in three editions: Standard, Professional and Enterprise. Features of all the three editions are included in the evaluation version. doQuments is a Windows based document management application designed to make it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shiraz Ahmed | Size: 18060 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
136. | dsCrypt 1.10 (members.ozemail.com.au) | ||
is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
137. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
138. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
Center Manager (ESCM) – software for service centers and workshops. ESCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
139. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
140. | Easy Ebook Creator 1.0 (allthesoft.com) | ||
a few mouse clicks. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may access. Creates ebooks in a few mouse clicks. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may | |||
Updated: 9, 2005 | Rating: 0 | Author: Herry Kevin | Size: 1201 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
141. | Easy Photo Grabber 1.4.0 (mslsoft.com) | ||
are free of charge for registered users ! Video Photo Surveillance Software for Windows. Grab video images from your webcam or TV-capture card and create a photo archive on disk. Keep a watchful eye on your office, house, or shop - truly, any place you want to | |||
Updated: 9, 2005 | Rating: 16 | Author: MSL Soft | Size: 1390 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
142. | Easy Spyware and Adware Killer 1.1 (easyspywarekiller.com) | ||
Spyware and Adware Killer is an award-winning spy software, spyware and adware detector. The software goes after Trojan horses, adware, key loggers, dialers, spy cookies, and system-monitoring tools. Easy Spyware and Adware Killer is an award-winning spy software, spyware and adware | |||
Updated: 9, 2005 | Rating: 169 | Author: Christian Champion | Size: 294 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
143. | eBookSnap Ebook Creator Software 1.2 (ebooksnap.com) | ||
at zero cost. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may access. You can password-protect one, ten or all of your pages (such as with unregistered users). You can also add an expiry date or disable your book after a given number of days or views.Your book is compatible with Flash, Quicktime | |||
Updated: 3, 2005 | Rating: 42 | Author: Konrad Kasior | Size: 1200 kb | Demo Go to category: Business > Other Similar programs | |||
144. | ECS (Event Control System) 2.3.14 (OmnipotenceSoftware.com) | ||
of our 15 years of experience in automation software development, ECS is an all-purpose automation program suitable for virtually any tasks (in residential, commercial, and industrial environments). Boasting an object-oriented design, ECS is elegantly simple, yet extremely powerful. Automated tasks may be implemented via simple time-based schedules (great for novices) and/or | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Gilmore | Size: 12000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
145. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
146. | EMS IB Manager 4.1 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Powerful stored procedure debugger; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing InterBase and Firebird services. EMS SQL Manager 2005 for IB/FB is a powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
147. | EMS MySQL Manager 3.6 (ems-hitech.com) | ||
objects; * Advanced data manipulation tools; * Powerful security management; * Excellent visual and text tools for query building; * Impressive data export and import capabilities; * Completely remade Visual Database Designer; * Easy-to-use wizards performing MySQL services. EMS SQL Manager for MySQL is a powerful tool for MySQL Server administration and | |||
Updated: 2, 2006 | Rating: 1145 | Author: EMS Software Development | Size: 15145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
148. | EMS PostgreSQL Manager 3.4 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing PostgreSQL maintenance tasks. EMS SQL Manager for PostgreSQL is a powerful graphical tool for PostgreSQL DB Server | |||
Updated: 2, 2006 | Rating: 202 | Author: EMS Software Development | Size: 13640 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
149. | Enable Xp 2.5 (unique-expressions.com) | ||
interface, coupled together with the Microsoft .NET Framework for Security and reliability, achieve just that. The .NET Framework 1.1 from Microsoft is Required And can be downloaded for free. from Microsoft. If you only want to run applications built using the .NET Framework 1.1, download the .NET Framework 1.1 from Microsoft Windows Update. Almost all XP pro systems have it | |||
Updated: 3, 2005 | Rating: 0 | Author: Robert Wagner | Size: 3132 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
150. | Encrypt HTML source 2.03 (encrypt-html.com) | ||
source will also keep away all web content filters and other censor software - they will not be able to analyze your web site and block it - this may increase the number of visits to your site several times.To read more visit http://www.encrypt-html.com http://www.encrypt-html.com. Encrypt HTML, password protect web site. ASP,SHTML,JavaScript,VBScript,CSS source code encryption. Web | |||
Updated: 9, 2005 | Rating: 128 | Author: Robert Davies | Size: 2092 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
151. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
encrypted by Encryption Workshop will not be decrypted by other software or vice versa. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
152. | Engineers Edition 3.3 (solarwinds.net) | ||
discover an entire subnet. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The ADVANCED BANDWIDTH MONITOR tool provides graphing and trending analysis over | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 61138 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
153. | epAssist Personal Assistant 3.001 (goldencrater.com) | ||
email and files, run commands, print, control home automation, view security cameras over email, desktop toolbar, or the web. All using plain English. Everything is included to access your Assistant on the web, including read, reply, forward and compose email and send from your Desktop email account | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Koornneef | Size: 1520 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
154. | eResponse 6.1.3 (bonafide.com) | ||
order fulfillment, customer service and inventory management software for small to medium size online stores and mail order operations. Easily export inventory information to multiple online stores such as; Store.net, Yahoo Store, Half.com, Nextag.com, Amazon.com and integrate to existing online stores. Import customer orders directly from these stores eliminating double entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
155. | eResponse 6.1.3 (mail.bonafide.com) | ||
order fulfillment, customer service and inventory management software for small to medium size online stores and mail order operations. Easily export inventory information to multiple online stores such as; Store.net, Yahoo Store, Half.com, Nextag.com, Amazon.com and integrate to existing online stores. Import customer orders directly from these stores eliminating double entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Similar programs | |||
156. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
157. | EXEsafe 2 (members.aol.com) | ||
a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
158. | ExeShield 3.8 (exeshield.com) | ||
it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield it's easy to turn your | |||
Updated: 2, 2006 | Rating: 79 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
159. | ExeShield 2.6 (moonlight-software.com) | ||
it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield it's easy to turn your | |||
Updated: 9, 2005 | Rating: 0 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
160. | Express Mail@Mate 2.6.7 (express-soft.com) | ||
or POP3 accounts. It is compatible with Outlook 2000/2002 Email Security Update and can extract attachments blocked by Outlook. The latest version has been featured with a new amazing popup notification box. A multifunctional email notification program for Microsoft Exchange, Outlook, and Outlook Express. It runs as a convenient taskbar icon, prompts you with an amazing popup | |||
Updated: 9, 2005 | Rating: 0 | Author: ContextMagic.com | Size: 826 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
161. | EyeCU 2.2 (jpcsoftware.com) | ||
EyeCU turns your existing PC camera into a full-featured video surveillance system. The program utilizes proprietary analysis techniques to detect motion in the images captured by your camera. If motion is detected, EyeCU can play a custom sound notification and save the detection images. In addition, the | |||
Updated: 9, 2005 | Rating: 0 | Size: 5016 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
162. | Eyes&Ears 1.8 (intech2.com) | ||
monitored for motion by the 'Standard' or 'Plus' versions of the software. Demo is full-featured, but capture sessions are limited to 15 minutes. Price $69.95. Or try Eyes&Ears Lite for $49.95. Same great software but without SMTP & FTP file transfers. A audio/video surveillance application that supports motion/sound sensing with SMTP and FTP support as well as support for | |||
Updated: 8, 2004 | Rating: 124 | Author: Kevin Crawford | Size: 2428 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
163. | EyeSpyFX Mobile 1.2 (eyespyfx.com) | ||
can have a fixed or dynamically assigned IP address. When the software is on it sends a "live" message to the EyeSpyFX Live Listings with the camera name and address. The live listings are available on both pc & phone. View your home web cam from anywhere using your mobile phone web browser and/or PC browser Optimise the image size to suit your phone Broadcast from your home | |||
Updated: 9, 2005 | Rating: 0 | Author: Aidan Gallagher | Size: 18558 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
164. | EZ-Pix 8.0 (xequte.com) | ||
etc, Twain Scanner and digital camera support, Password access and security EZ-Pix is fast, highly functional viewer with support for all common image formats. It has an streamlined interface and is simple to use. Despite its simplicity it offers many advanced functions, such as thumbnails, exporting to HTML & | |||
Updated: 9, 2005 | Rating: 0 | Author: Nigel Cross | Size: 1233 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
165. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
Button Sales Totals & Reports, On the Fly Inventory Entry, Password Security, Quotes, Rentals, Inventory Control, Billing, Mailing Lists, Terms, Invoicing, Packing Slips, Automatic Sale Discounts and more. Import and export products, customers list and sales information. Send/Email all | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
166. | ezProxy 2.7.1 (lavasoftware.net) | ||
Explorer, Eudora, Icq/AIM, FTP programs, RealAudio and any other software that supports proxy connections (most of them do these days). ezProxy offers several advanced features including bandwidth balancing, remote control and a password protected user interface. You can specify rules for all users or define custom rules and restrictions for individual users. Rules can be saved as | |||
Updated: 2, 2006 | Rating: 42 | Author: Hu Wei | Size: 2029 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
167. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
168. | Fibonacci Calculator 2.00.01 (aga-wallstreet.com) | ||
but in graphical one as well. You don't need an additional charting software to determine input data for Fibonacci Numbers calculation. The Calculator downloads historical data for a security of your choice and draws the security's chart. You do not need to subscribe to historical data provider, it's free! You can build historical chart of three types: Line, Bar and | |||
Updated: 3, 2005 | Rating: 184 | Author: Eugene Ginzburg | Size: 2700 kb | Shareware Go to category: Business > Other Similar programs | |||
169. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
170. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
171. | FileVault 3.0 (networktoolz.com) | ||
directories and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files that conceal your most sensitive documents. Send Vault files safely over the Internet safe in the knowledge that only the recipient can open them and that they will be completely meaningless to anyone who may | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
173. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
174. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
175. | Folder Shield 2003 1.3 (baxbex.com) | ||
the selected data disappear. Folder Shield vastly increases the security of your PC, while at the same time being so simple and very convenient to use. Folder Shield is multilingual and supports: English, Spanish, German, French, Italian, Portuguese (Brazil), Swedish, and Danish Folder Shield enables you to make folders completely invisible. Just specify all confidential folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
176. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
177. | FolderSafe 2.1 (occultsoft.com) | ||
is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
178. | Gazillionaire Deluxe (lavamind.com) | ||
Gazillionaire is the award winning game of business strategy. It was selected as a FINALIST in the Ziff-Davis Shareware of the Year Awards and was ranked in the Top 5 of all strategy games. Gazillionaire is a cross between Monopoly set in outer space and Wall Street in wonderland. It is a wild, intergalactic | |||
Updated: 9, 2005 | Rating: 42 | Author: LavaMind Productions | Size: 5576 kb | Shareware Go to category: Games & Entertainment > Simulation Similar programs | |||
179. | GDS 2000 PRO 1.06 (aidsoft.com) | ||
2000 PRO is incontestably the software you need to manage your service calls. It allows you to follow efficiently your service calls and keep the history of all the problems and solutions encountered. No matter the field of activity of the organization you work for, GDS 2000 PRO will fit your needs for managing efficiently your service calls for all your customers whether they are | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales department | Size: 8346 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
180. | GemTracker Pro 2.1.21 (goldcalculator.com) | ||
stones processing management software. Keeps track of your memos, repairs, recuts, roughs and purchases from start to finish. Maintains a Administrator defined custom gem inventory database over searching, sorting and editing your gem inventory. Includes a built in image viewer with the ability to view and attacth gem pics and lab certifications to your inventory records which will | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Cascio | Size: 13878 kb | Shareware Go to category: Business > Other Similar programs | |||
181. | General Knowledge Base 2.2 (baltsoft.com) | ||
Knowledge Base is an innovative Knowledge Management software allowing an easy and effective management of all types of knowledge bases. With its intuitive user interface, it is easy to create, capture, and store in one location all types of documents and files and have fast retrieval when required. To improve knowledge sharing, it provides an easy access to an organization's | |||
Updated: 2, 2006 | Rating: 42 | Author: Tomas Rutkauskas | Size: 7323 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
182. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Windows applications, focused on enhanced reliability, stability, security and performance. Adobe, Xerox, NEC, Intel and many other companies rely on Ghost Installer Studio to create installations for their top notch software products. Designed to meet high-end expectations of installation technology, Ghost Installer Studio 3.7 offers full support for Microsoft's | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
183. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
184. | gReg 4.55 (gitanosoftware.com) | ||
many people want your software, some are thieves. Don't take that chance, protect your work! gReg armors your software against thieves-and safeguards your revenues. Our protection is bulletproof! Our competitors offer only simple software licensing and authorization. gReg out-strips the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
185. | GRL RealHidden 1.0 (grltechnology.com) | ||
RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
186. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
Personal Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
187. | hCrypt 3.0 (raysion.com) | ||
applications and more. hCrypt is a member of the family of Raysion security and content management tools that includes other specialized tools (code optimization utility hTune and security tool hWard) and a multifunctional software Advanced HTMLCoder. hCrypt helps you restrict access to non-public Web pages by encrypting them and setting the access password. The program | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
188. | HeadStrong WebClicker 2.56 (headstrong.de) | ||
as well. Server administrators have to be aware of this heavy security hole, as customers may use this program to earn hundreds of dollar a month! You as a server administrator and software developer have the opportunity now to test your own servers to improve protection. uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and | |||
Updated: 9, 2005 | Rating: 0 | Author: Moritz Bartl | Size: 650 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
189. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
With a single mouse-click, Heidi R. Stealthy (TM) allows you to instantly conceal your current PC or laptop activities from your friends, family, coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
190. | HomeOwner 1.0 (pm-software.co.uk) | ||
Location contained value can be useful when considering your home security requirements. Total value can be useful checking that you have adequate home contents insurance. Print hardcopy of any reports generated including full lists for off line reference and storage. Great utility for recording details of your homes contents and any other property you may own. Keep a note of all of | |||
Updated: 3, 2005 | Rating: 16 | Author: Phill Hellewell | Size: 1898 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
191. | Hot Corners 2.3 (southbaypc.com) | ||
This is particularly useful when you need to ensure you privacy and security when you are away from your | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 185 kb | Shareware Go to category: Desktop > Similar programs | |||
192. | HTML Guard 2.32 (aw-soft.com) | ||
you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to copying and modification of your HTML code, images and text by others thus protecting your copyright. While not offering absolute security, the combination of | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
193. | hTune 3.0 (raysion.com) | ||
marks, and changes styles and classes names for shorter ones. This software optimizes HTML code, embedded JavaScripts and cascading style sheets. hTune features the full range of command line options enabling you to automate recurring tasks (e.g. run hTune from a batch file to optimize modified HTML | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 603 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
194. | IDAutomation MICR Font Advantage 4.9 (bizfonts.com) | ||
with your printer, (2) MICR print specifications documentation, (3) Security Fonts for printing secure names and amounts plus (4) a Visual Basic source code example of printing a bank check. Compatible with Windows, Pocket PC, Macintosh, UNIX, Linux and others. TrueType, PostScript and PCL laserjet | |||
Updated: 9, 2005 | Rating: 0 | Author: Technical Support | Size: 2398 kb | Demo Go to category: System Utilities > Other Similar programs | |||
195. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
196. | Identity Knight 1.3 (fspro.net) | ||
of identity theft in the last five years! Holes in Internet Explorer software allowing 3rd party programs access to your private data surely help this number grow. So, is there a way to prevent identity theft? Yes! There is! Introducing Identity Knight: the unique credentials protection software that makes sure that no data from the IE AutoComplete list is left unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
197. | IIPwr Package 2.00 (iipwr.com) | ||
what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the data to your email. KeySpy's seamless installation makes it | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
presentation can be easily viewed with any web browser. No special software is required, since 98% of the browsers have the Flash plug-in already installed. When performing the conversion, the size of the output files is reduced with up to 90%, which is till to 3 times better than with other leading | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
199. | iNet+ Practice Tests. 2.6 (simulationexams.com) | ||
of Website divelopment, Client, and Server side scripting, Internet security, intranets, extranets, e-commerce, and Internet based business development. SimulationExams.com practice tests for CompTIA i-Net+ certification conforms to the latest objectives of the exam. The package contains 3 tests and | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3503 kb | Demo Go to category: Education > Other Similar programs | |||
200. | InfoSafe Plus 3.4.6 (wakefieldsoft.com) | ||
is your complete secure information management software for Palm OS® handhelds, Pocket PC or Windows Mobile handhelds, and Windows PCs! Keep track and organize usernames, passwords, website logins, ID numbers, serial numbers, software codes, insurance info, bank accounts, credit cards, calling cards and much more. Import - Export Items - import and export items to and | |||
Updated: 9, 2005 | Rating: 16 | Author: Shawn Wakefield | Size: 4687 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|