|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
101. | Capturix VideoSpy 3.02.1817 (capturix.com) | ||
system is now available for your PC. Capturix VideoSpy is a complete software that combines video surveillance and domotics. Supports any video for windows device (like USB Webcam or Tv Tuner card) and network cameras or video servers. With this software you can record all video activity with a programmed schedule, insert data in picture, work as a motion detector, record | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexandre Simoes | Size: 9442 kb | Commercial Go to category: Audio & Multimedia > Video Tools Similar programs | |||
102. | Casino Las Vegas - $400 FREE! 2006 V (best-on-line-casinos.com) | ||
Casino Las Vegas software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Casino Las Vegasare being processed by | |||
Updated: 2, 2006 | Rating: 42 | Author: Jack Black | Size: 245 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
103. | Casino Solei 2006 V (best-on-line-casinos.com) | ||
To compliment their experienced team CasinoSolei.com purchased software from industry leaders, Playtech. Playtech's software is considered to be one of the top Internet casino products on the market. Their team, with special experience in the brick and mortar casino industry, bring additional experience and professionalism to Casino's Solei's Internet operations. It is | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
104. | CCSA practice tests. 1.2 (simulationexams.com) | ||
CCSA certifications: The CheckPoint® Certified Security Administrator (CCSA) certification is designed as a foundation level certification. A CCSA is knowledgeable about installation, and configuration, and administration of CheckPoint® VPN-1/FireWall-1. Practice tests for CheckPoint® CCSA conforms to the objectives of CCSA 2000. The package contains 3 tests and most questions | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3176 kb | Demo Go to category: Education > Other Similar programs | |||
105. | CD-DVD Lock 2.01 (getfreefile.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | CD-DVD Lock 2.01 (softheap.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
107. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their hard | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | Chameleon 2.0 (members.optushome.com.au) | ||
your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
109. | CHAOS Compressor 3.0 (safechaos.net) | ||
Data compression utility, which allows you to quickly open, create, and modify your archives. Data compression utility, which allows you to quickly open, create, and modify your archives. | |||
Updated: 9, 2005 | Rating: 81 | Size: 491 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
110. | CHAOS Compressor 3.0 (safechaos.com) | ||
Data compression utility, which allows you to quickly open, create, and modify your archives. Data compression utility, which allows you to quickly open, create, and modify your archives. | |||
Updated: 9, 2005 | Rating: 0 | Size: 491 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
111. | CHAOS Generator 2.4 (safechaos.net) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
112. | CHAOS Generator 2.4 (safechaos.com) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
113. | CHAOS Messenger 4.0 (safechaos.net) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
114. | CHAOS Messenger 4.0 (safechaos.com) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
115. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
116. | CHAOS Self Decryptor 3.9 (safechaos.com) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 0 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
117. | CHAOS Self Extractor 3.85 (safechaos.net) | ||
are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple | |||
Updated: 9, 2005 | Rating: 0 | Size: 520 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
118. | CHAOS Self Extractor 3.85 (safechaos.com) | ||
are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple | |||
Updated: 9, 2005 | Rating: 0 | Size: 520 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
119. | CHAOS Shredder 3.0 (safechaos.net) | ||
your disk, without the possibility to recover it by any practical software or hardware | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
120. | CHAOS Shredder 3.0 (safechaos.com) | ||
your disk, without the possibility to recover it by any practical software or hardware | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
121. | CHAOS Universal 6.2 (safechaos.com) | ||
CHAOS Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
122. | Chaperone 4.0 (css-software.com) | ||
access to the entire computer. Additional features increase security by disabling Registry tools, preventing program installations, denying access to the control panel, and more…. Chaperone fully supports multiple users. Each user can have their own access rights, or can use the same rights as other users. These user accounts can even mirror the Windows login, preventing the | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
123. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies. This software provides all the standard information about your chat partner plus a whole lot more. How many times have you | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
124. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
125. | Cheat Checker 2.03 (nine-patch.com) | ||
complaints by classmates dropped to near zero. Students named the software The Cheat Checker. The Cheat Checker examines similar pairs of answer sheets for independent marking. Any pair that fails the test is labeled presumptive cheating. The Cheat Checker then examines the uniqueness of this pair with respect to the entire class. A significant finding for uniqueness and for | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
126. | ChoiceMail One 3.1 (digiportal.com) | ||
ChoiceMail One is DigiPortal’s critically acclaimed anti -spam software. ChoiceMail blocks 100% of spam with absolute certainty. ChoiceMail allows you to choose which messages come to your inbox. Take control of your email again with | |||
Updated: 9, 2005 | Rating: 82 | Author: DigiPortal Software | Size: 13703 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
127. | CobraSoft PopStop 2.1 (cobrasoftonline.com) | ||
and pop under windows and ads while you browse the web. This is the software advertisers don't want you to know about. CobraSoft PopStop puts the control back in your hands. You decide what windows stay and | |||
Updated: 3, 2005 | Rating: 0 | Author: Ian Pilipski | Size: 6271 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
128. | Codelock 2.0 (codelock.co.nz) | ||
an optional expiry time. Codelock is an easy to use, full-featured software encryption solution for PHP and HTML scripts. Codelock V2.0 works by encrypting your entire PHP page(s) (including HTML and Javascript). You simply browse your computer harddrive for your file(s) or specify your server path | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
129. | CoffeeCup Password Wizard 5.0 (promaxum.com) | ||
Create unlimited password protected pages with unlimited usernames and passwords with CoffeeCup Password Wizard. You don't even have to know Flash or HTML ! Customize the look and feel to match your page. You can even point different users to different URLs ! Preview within the program or your favorite | |||
Updated: 9, 2005 | Rating: 0 | Author: CoffeeCup Software | Size: 4144 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
130. | CoffeeCup WebCam 3.5 (promaxum.com) | ||
with CoffeeCup WebCam, you can hook up your camera, start the WebCam software, and put LIVE Images online in minutes ! You can even have multiple cameras and multiple Websites. CoffeeCup WebCam will upload images from any camera, to any Website on your list, on any schedule you set ! And with the | |||
Updated: 9, 2005 | Rating: 215 | Author: CoffeeCup Software | Size: 2923 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
131. | Comet eye lite 1.0 (cometeye.com) | ||
CometEye is a video monitoring application adapted for home and business users. It delivers high quality audio and video transmissions with either a dial-up or high-speed connection. It can also be used with handheld devices such as Pocket PC 2000,2002,2003, SmartPhone 2002 and services from T-Mobile, AT&T | |||
Updated: 3, 2005 | Rating: 42 | Author: Valeri Chirokov | Size: 2300 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
132. | Commodorecasino 5.30 (commodore-online-casino.com) | ||
casino run their own proprietary casino software unlike any other on the internet, including some games you won't find anywhere else. Designed with the pleasure of the player in mind, their elegant and user-friendly software offers a full suite of traditional interactive casino games including slots (12 games), video poker (15 games), blackjack, roulette and keno. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Al Cord | Size: 132 kb | Freeware Go to category: Games & Entertainment > Board Similar programs | |||
133. | Complete Anonymous Internet 1.0 (pcmesh.com) | ||
SOCKS proxy, corporate networks won't need to install internet security software (antivirus, firewall, antitrojan, web content filters, etc.) on every single computer. Instead all security software will be installed on SOCKS proxy only, where the incoming traffic will be | |||
Updated: 9, 2005 | Rating: 42 | Author: PC Mesh Marketing | Size: 1574 kb | Shareware Similar programs | |||
134. | Complete Cleanup 4.83 (softdd.com) | ||
cleanups which you would like to add to the cleanup list. This software will also improve the performance and disk reading speed of your pc. Simply run the self-extracting file to install. (Runs on all Windows systems). Protect your internet privacy, clean up all the garbage data on your pc, and improve your pc | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
135. | Comtun Pro 4.5a (linkbyte.com) | ||
today to see what it can offer you! stealth network firewall, NAT software router, HTTP caching, SOCKS server, access control and authentication, built-in DHCP Server, dial-up control, VPN (PPTP and IPSec), network monitoring and management, banner blocking, firewall timing | |||
Updated: 9, 2005 | Rating: 82 | Author: Sales Linkbyte | Size: 2141 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
136. | Crime Catcher 2.1 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | Crime Catcher 3.0 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The Professional Edition supports upto 4 webcams/input devices so security can be maximized. The webcam software will monitor for movement or motion. If motion is detected pictures will be taken of what the webcam can see! You can of course have other actions take place | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Torkington | Size: 4262 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
LE Ttotally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password protect any file or folder with strong Encryption. It allows you to protect data | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
139. | CryptCD 4.0 (timesavesoftware.com) | ||
Creates a password protected encrypted CD/DVD image, burn, Add files, configure a decoy setup screen so others think its just another install CD. Run/view files right off the CD! decrpyted and run transparently - files removed automatically after your finished viewing them! Safe, portable way of backing up | |||
Updated: 9, 2005 | Rating: 6049 | Author: Timesave Software | Size: 3450 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
140. | CryptEnCrypt 1.10 (inetprom.com) | ||
is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
141. | cryptlib 3.0 (download.componentspot.com) | ||
by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
142. | Cryptocx v5 5.1.6 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
143. | Cryptocx v6 6.1.3 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
144. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
145. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
146. | CryptoMite 2.00 (baxbex.com) | ||
encapsulated inside the archive. CryptoMite is the first encryption software (and properly the only) which supports personal skins for encrypted exe-files (see http://www.baxbex.com/krprof.html http://www.baxbex.com/krprof.html for examples). You even could build encrypted exe-files in several languages (German, Spain, Italien, Portugues, French, Swedish). To send | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
147. | CryptOne 1.1 (eniksoft.com) | ||
program is file encryption software that can encrypt multiple files and folders. You can set your own password or let the program generate it for you. For increasing password security you can set to hide password with (*). The program uses 2048 byte key for encode data. It means high security level for your files. To break password it needs billion and billion of years | |||
Updated: 9, 2005 | Rating: 48 | Author: Nikolas Ehrenberg | Size: 421 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
148. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
149. | CSSS 2.2 (sarbash.com) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The principle of action bases on microphone (microphones) real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
150. | CSSS Video 2.1 (HTTP:) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? CSSS – Computer Security System with motion detection by WEB - camera. The principle of action bases on WEB-camera real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 3005 kb | Demo Go to category: Home & Hobby > Personal Interest Similar programs | |||
151. | Cybercafe Manager 2002 1.3 (alarit.com) | ||
Manager 2002 is a complete software solution for Cybercafe Management. The program enables effective cybercafe / internet club administration. The system allows automated management of user sessions while they use computers on the local network. Sessions costs are calculated using flexible tarif scales or using custom cost values. The program consists of two modules | |||
Updated: 9, 2005 | Rating: 16 | Author: Konstantin Pavelko | Size: 496 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
152. | CyberMatrix In Out Scheduler 1.01 (cyber-matrix.com) | ||
accustomed to the traditional scheduling boards. To this effect the software looks a lot like an actual scheduling board. Virtual pins are used to designate which employees are in, which are out and when they will return. Unlike the traditional scheduling boards, In Out Scheduler can be accessed by all | |||
Updated: 9, 2005 | Rating: 0 | Author: Cyber Matrix | Size: 1669 kb | Commercial Go to category: Business > Other Similar programs | |||
153. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | DBDocumentor 4.00 (pikauba.com) | ||
what other objects. The cross referencing extends to procedure and security usage, clearly showing which procedures are used where, and under what security context. These capabilities make DBDocumentor ideal for those wishing to learn the structure of a given database, or simply to document the database for future reference.  Extended capabilities include declarative | |||
Updated: 2, 2006 | Rating: 0 | Author: Tim Mackey | Size: 3660 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
155. | dbQwikSite PE 4.0 (thedevshop.com) | ||
PE :Free Database Web Site Builder Software Personal Edition is a starter version of dbQwikSite. It is an intelligent code generator saving hours of tedious web programming. Absolutely no coding required. Features: -100% code generation you don't need to code ASP/PHP/HTML or SQL -Connects to almost any database Access, SQL Server, MySQL and more... -Integrated Drag & | |||
Updated: 2, 2006 | Rating: 48 | Author: Gerald Enright | Size: 7062 kb | Freeware Go to category: Web Development > ASP & PHP Similar programs | |||
156. | Debt Reduction - Zilch Standard 4.0 (zilchworks.com) | ||
payment and balance schedules and be on your way to financial security. Stop giving your money away... Stop making your bank rich... Stop making your credit card company rich... Stop making your mortgage company rich. Because, as long as you keep giving them your money [INTEREST PAYMENTS]... guess what? They'll keep taking it. No financial expertise is required. Get | |||
Updated: 9, 2005 | Rating: 42 | Author: Michael Riley | Size: 5216 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
157. | Delete 2.10 (eBible.org) | ||
DELETE.EXE is a Win32 console application that deletes files. Win32 Console application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
158. | Delete Cookies 1.2 (temporary-internet-files.com) | ||
Cookies is security software to remove all the traces of your online and offline activity: Internet Explorer cookies and cache, history, typed URLs in the address bar, temporary files and the shortcuts to the recently used documents. The user interface is very convenient allowing you to select items to clean and erase all the traces with a single click. Delete Cookies lets | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Appleby | Size: 500 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
159. | Desktop Lock 6.1 (toplang.com) | ||
Lock is a powerful computer security software, it locks your pc to prevent others from accessing your private documents or resources, after your computer was locked by Desktop Lock, people will not be able to access your documents, browse your computer, or use programs on your computer. Desktop Lock fully supports all Windows system, includes Windows 2000/XP/NT and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
160. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
161. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
162. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a program you can't afford to be without. Designed for 32-bit Microsoft Windows systems, Port Explorer supports Windows 95, 98, 98 SE, ME, NT4, 2K, and XP, and also has a built-in dynamic language support system (supported languages include English, Dutch | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
163. | Diary 3000 2.5 (yourfamilysoftware.com) | ||
a unique gift for that special child? Along comes Diary 3000!... a software program that gives your child the security she/he needs to keep a personal diary. It is password protected and extremely easy to use. Your child will be using it like an expert within minutes of installing it. The look and feel of the program can be completely customized to your child's taste. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Lee Mc Cauley | Size: 3508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
164. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
165. | Digital Physiognomy 1.341 (uniphiz.com) | ||
reading software that tells you about the character of a person. The program works like a police sketch (a.k.a. photo robot), so you don't even have to have a person's photograph. The software reveals a person's Temper, Intellect, Self-Esteem, Sense of Humor, Level of Optimism, Will Power, and Luck. Digital Physiognomy can give you detailed written reports or present all | |||
Updated: 2, 2006 | Rating: 275 | Author: Sergey Vasilyev | Size: 4030 kb | Shareware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
166. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
167. | DLOCK2 2.01 (eBible.org) | ||
source code in your own products at no charge. This software is free, however you may send the author donations to express appreciation if you like. DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code included. Version 2.01 is the same as the original DLOCK2, except recompiled for | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
168. | Document Post 1.01 (offsitelabs.com) | ||
interface. Document Post allows the author to publish content. The software prevents a web master from being the bottleneck when information needs to be published in a timely manner. User login security to maintain user's personal information. Administration login to manage the application. Can require "supervisor" approval before documents become available for display | |||
Updated: 3, 2005 | Rating: 0 | Author: R. Copeland | Size: 4373 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
169. | Don't Touch My Computer Episode 2 1.2a (enetwork.ncbuy.com) | ||
If you're tired of people messing with your PC whenever you step way, it's time to send them the right message. Don't Touch My Computer Episode 2 is the fun filled sequel to our initial DTMC screen saver. In addition to a stream of fun animations that play out, the lovable dog does a whole mess of tricks to | |||
Updated: 9, 2005 | Rating: 0 | Author: NCBuy Development | Size: 2284 kb | Freeware Go to category: Desktop > Similar programs | |||
170. | doQuments 2.0.172 (itaz.com) | ||
can be MS Access based or MS SQL Server based. It's powerful security features enable you to control access to documents on a per user basis. doQuments is available in three editions: Standard, Professional and Enterprise. Features of all the three editions are included in the evaluation version. doQuments is a Windows based document management application designed to make it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shiraz Ahmed | Size: 18060 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
171. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
172. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
173. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
174. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
175. | Downtime Recording (MS Access 2000) 2.17 (inteproc.com) | ||
Recording is software designed for recording and analysis of plant downtime. This includes downtime, outages or stoppages for the performance measurement of maintenance activities in manufacturing or production environments. It includes functions for interfacing to process control and for analysing downtime by multiple dimensions such as type, discipline, process, shift, etc | |||
Updated: 9, 2005 | Rating: 0 | Author: Sean Walsh | Size: 6427 kb | Commercial Go to category: Business > Other Similar programs | |||
176. | Downtime Recording (MS Access XP) 2.17 (inteproc.com) | ||
Recording is software designed for recording and analysis of plant downtime. This includes downtime, outages or stoppages for the performance measurement of maintenance activities in manufacturing or production environments. It includes functions for interfacing to process control and for analysing downtime by multiple dimensions such as type, discipline, process, shift, etc | |||
Updated: 9, 2005 | Rating: 42 | Author: Sean Walsh | Size: 6461 kb | Commercial Go to category: Business > Other Similar programs | |||
177. | dsCrypt 1.10 (members.ozemail.com.au) | ||
is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
178. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
179. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
Center Manager (ESCM) – software for service centers and workshops. ESCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
180. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
181. | Easy Ebook Creator 1.0 (allthesoft.com) | ||
a few mouse clicks. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may access. Creates ebooks in a few mouse clicks. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may | |||
Updated: 9, 2005 | Rating: 0 | Author: Herry Kevin | Size: 1201 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
182. | Easy File & Folder Protector 4.14 (softstack.com) | ||
data, as may happen if you use other file- and folder-protecting software. The program uses unique technology, which allows you to protect system files and folders such as the Windows System, Registry and Swap files. The program's interface is very easy to use. On-line help is available. Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
183. | Easy Photo Grabber 1.4.0 (mslsoft.com) | ||
are free of charge for registered users ! Video Photo Surveillance Software for Windows. Grab video images from your webcam or TV-capture card and create a photo archive on disk. Keep a watchful eye on your office, house, or shop - truly, any place you want to | |||
Updated: 9, 2005 | Rating: 16 | Author: MSL Soft | Size: 1390 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
184. | Easy Spyware and Adware Killer 1.1 (easyspywarekiller.com) | ||
Spyware and Adware Killer is an award-winning spy software, spyware and adware detector. The software goes after Trojan horses, adware, key loggers, dialers, spy cookies, and system-monitoring tools. Easy Spyware and Adware Killer is an award-winning spy software, spyware and adware | |||
Updated: 9, 2005 | Rating: 169 | Author: Christian Champion | Size: 294 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
185. | eBookSnap Ebook Creator Software 1.2 (ebooksnap.com) | ||
at zero cost. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may access. You can password-protect one, ten or all of your pages (such as with unregistered users). You can also add an expiry date or disable your book after a given number of days or views.Your book is compatible with Flash, Quicktime | |||
Updated: 3, 2005 | Rating: 42 | Author: Konrad Kasior | Size: 1200 kb | Demo Go to category: Business > Other Similar programs | |||
186. | ECS (Event Control System) 2.3.14 (OmnipotenceSoftware.com) | ||
of our 15 years of experience in automation software development, ECS is an all-purpose automation program suitable for virtually any tasks (in residential, commercial, and industrial environments). Boasting an object-oriented design, ECS is elegantly simple, yet extremely powerful. Automated tasks may be implemented via simple time-based schedules (great for novices) and/or | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Gilmore | Size: 12000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
187. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
188. | EMS IB Manager 4.1 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Powerful stored procedure debugger; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing InterBase and Firebird services. EMS SQL Manager 2005 for IB/FB is a powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
189. | EMS MySQL Manager 3.6 (ems-hitech.com) | ||
objects; * Advanced data manipulation tools; * Powerful security management; * Excellent visual and text tools for query building; * Impressive data export and import capabilities; * Completely remade Visual Database Designer; * Easy-to-use wizards performing MySQL services. EMS SQL Manager for MySQL is a powerful tool for MySQL Server administration and | |||
Updated: 2, 2006 | Rating: 1145 | Author: EMS Software Development | Size: 15145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
190. | EMS PostgreSQL Manager 3.4 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing PostgreSQL maintenance tasks. EMS SQL Manager for PostgreSQL is a powerful graphical tool for PostgreSQL DB Server | |||
Updated: 2, 2006 | Rating: 202 | Author: EMS Software Development | Size: 13640 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
191. | Enable Xp 2.5 (unique-expressions.com) | ||
interface, coupled together with the Microsoft .NET Framework for Security and reliability, achieve just that. The .NET Framework 1.1 from Microsoft is Required And can be downloaded for free. from Microsoft. If you only want to run applications built using the .NET Framework 1.1, download the .NET Framework 1.1 from Microsoft Windows Update. Almost all XP pro systems have it | |||
Updated: 3, 2005 | Rating: 0 | Author: Robert Wagner | Size: 3132 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
192. | Encrypt HTML source 2.03 (encrypt-html.com) | ||
source will also keep away all web content filters and other censor software - they will not be able to analyze your web site and block it - this may increase the number of visits to your site several times.To read more visit http://www.encrypt-html.com http://www.encrypt-html.com. Encrypt HTML, password protect web site. ASP,SHTML,JavaScript,VBScript,CSS source code encryption. Web | |||
Updated: 9, 2005 | Rating: 128 | Author: Robert Davies | Size: 2092 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
193. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
encrypted by Encryption Workshop will not be decrypted by other software or vice versa. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
194. | Engineers Edition 3.3 (solarwinds.net) | ||
discover an entire subnet. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The ADVANCED BANDWIDTH MONITOR tool provides graphing and trending analysis over | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 61138 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
195. | Engineers Edition 5.2 (solarwinds.net) | ||
etc) across a range of subnets. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The BANDWIDTH MONITOR tool provides graphing and trending analysis over months or | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
196. | epAssist Personal Assistant 3.001 (goldencrater.com) | ||
email and files, run commands, print, control home automation, view security cameras over email, desktop toolbar, or the web. All using plain English. Everything is included to access your Assistant on the web, including read, reply, forward and compose email and send from your Desktop email account | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Koornneef | Size: 1520 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
197. | eResponse 6.1.3 (bonafide.com) | ||
order fulfillment, customer service and inventory management software for small to medium size online stores and mail order operations. Easily export inventory information to multiple online stores such as; Store.net, Yahoo Store, Half.com, Nextag.com, Amazon.com and integrate to existing online stores. Import customer orders directly from these stores eliminating double entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
198. | eResponse 6.1.3 (mail.bonafide.com) | ||
order fulfillment, customer service and inventory management software for small to medium size online stores and mail order operations. Easily export inventory information to multiple online stores such as; Store.net, Yahoo Store, Half.com, Nextag.com, Amazon.com and integrate to existing online stores. Import customer orders directly from these stores eliminating double entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Similar programs | |||
199. | Evidence Exterminator 2.14 (softstack.com) | ||
you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is stored in various files and in the Windows registry? Did you know that anybody with a minimal computer knowledge including your | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
200. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|