|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
401. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
402. | SnoopTrap 3.0.2 (snooptrap.com) | ||
to guess what the answer is. SnoopTrap is an excellent PC & file security program providing easy, yet secure access to your private data while denying other's attempts to access your computer. Optional | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 5405 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
403. | SoftPerfect Network Scanner 2.7 (softperfect.com) | ||
both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on a network (including system and hidden). In addition, it allows you to mount shared resources as network drives | |||
Updated: 2, 2006 | Rating: 48 | Size: 670 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
404. | SpeedUpMyPC 2.04 (lidownloads.com) | ||
award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources including hardware, system settings and internet usage to operate at peak performance at all times. Your PC will instantly become faster, cleaner and more stable. Even with the latest | |||
Updated: 9, 2005 | Rating: 101 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: System Utilities > Benchmarking Similar programs | |||
405. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split files by | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
406. | SpyCapture 1.4.5 (tsm-soft.com) | ||
it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the keystrokes in all of the Windows environment, as long as the user use the keyboard, it will capture all. 3. Capture all screen shots, as long as the user use the monitor and mouse, it will capture | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
407. | SpyMyPC 2.0 (benutec.com) | ||
large corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Stop Computer Espionage (Monitor your employee and management systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
408. | SpyPC 7.0 (xelerate.biz) | ||
YOUR hands. Kids are smart, and will surpass the simple surf control software that is included on your PC. Spy PC not only offers you rigorous access control to the Internet, it also effectively restricts access to certain parts of the PC. With its stealth surveillance functions, you can see what your | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
409. | StormWindow Me 6.02 (cetussoft.com) | ||
and system of a Windows Me computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
410. | Super Password Guard 3.1 (topaim.net) | ||
information you want, like key codes and serial number of purchased software programs, bank account numbers, credit card numbers, membership numbers, magazine/newspaper subscription dates etc. Storing all your useful information in one place makes it very easy to find it when required and you can also backup all this data at once just by copying single database file. Main features | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
411. | Super Recycle Bin 1.00 (4diskclean.com) | ||
desktop or delete using Explorer Pop-Up . Irrecoverable from any software or hardware tool . Deletion rules conforms to US Department of Defense "clearing and sanitizing standard DoD 5220.22-M" , German, and all other known published government-level data disposal security requirements. When you delete a file in any Windows system you're only informing the operation system | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
412. | SuperCleaner 2.89 (southbaypc.com) | ||
exist), and gives you the option of deleting them. For maximum security, you have the option of erasing files using a file wipe. This prevents someone using "undelete" software from recovering any of your files. SuperCleaner is very powerful, yet easy for beginners to use. Cleans out the garbage from your computer and protects your Internet privacy. It finds and removes | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
413. | System Mechanic 6.0s (iolo.com) | ||
hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
414. | System Mechanic Professional 6.0s (iolo.com) | ||
Mechanic Professional is one award-winning product for all PC security and optimization needs. Use the new PC Repair Wizard to automatically diagnose and fix hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
415. | System Protector 1.9 (aidsoft.com) | ||
Some of the program options are:Customize your Control-PanelCustomize Display PropertiesHide/customize Network settingsCustomize Start MenuHide all drives in Control Panel (A:\, C:\, D:\)Customize your Video AdapterCustomize your Active DesctopChange Computer Owner InformationChange Windows Installation | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
416. | System Shield 2.1c (iolo.com) | ||
existed is still very much intact. 3. Using easily accessible software tools, the file can be instantly undeleted and viewed by anyone who has access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
417. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
418. | Thinstall Studio 1.94 (aidsoft.com) | ||
file that is able to run directly without decompressing to disk. Software Developers can use Thinstall to protect and hide their data files from prying eyes, prevent disassembly of their EXE or DLL files, and create "no installation required" distributions of their software applications | |||
Updated: 9, 2005 | Rating: 16 | Author: Jonathan Clark | Size: 1327 kb | Demo Go to category: System Utilities > Other Similar programs | |||
419. | TK8 Safe 2.5 (tk8.com) | ||
TK8 Safe is a program designed to keep your information secure. The software has many features like auto filling login prompts, password generator, system tray mode, unlimited folders, auto backups etc. All this in a easy to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
420. | Trace Remover 5.1.0.2 (rizalsoftware.com) | ||
on a computer. Many people do not realize that Windows and other software programs store information about what they have done. Trace Remover is a very useful program for cleaning up the history of your activities on a computer. Many people do not realize that Windows and other software programs store information about what they have | |||
Updated: 8, 2004 | Rating: 0 | Author: Jaime Laurente | Size: 894 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
421. | Tweak Boy 1.52 (ansoftware.com) | ||
that can be altered for a friendlier Windows environment.This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no need to dig through the registry looking for that specific setting (such as StartUp manage ,Start Menu,Desktop,IE skin,System Icon , System and IE Security,Clear History,Scan Trojan,Backup and Restore | |||
Updated: 3, 2005 | Rating: 42 | Author: QH AYZ | Size: 1369 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
422. | Tweak Genie 6.0.1 (tweakgenie.com) | ||
Tweak Genie is the most powerful tweaking software for Windows with over 1000 essential and easy to perform tweaks! Introduction Tweak Genie will assist you to manipulate the hidden settings of windows according to your requirements. It gives you full control over these settings. These settings cover various aspects of your windows operating system like Appearance | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 620 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
423. | Tweak Manager 2.12 (winguides.com) | ||
every aspect of your computer, including tweaks for popular software like Microsoft Office and Internet Explorer. - Customize your computer with over 1000+ powerful tweaks - Secure Windows with hundreds of restrictions and policies - Tweak popular software like Internet Explorer and Office - Easily download new and updated tweaks using Live Update Take complete control | |||
Updated: 9, 2005 | Rating: 0 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
424. | Tweak O Matic 1.1 (cyberspacehq.com) | ||
enhance and personalize the Windows interface, take control of security settings, increase your computer's performance, change hidden internet settings you always wished you could change and much more. It will even tweak other software for you! This program is extremely easy to use, And if you aren't happy with a tweak you made, you can always roll back to previous settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales CyberHQ | Size: 792 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
425. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
even apply changes to multiple computers at once. No need to install software on every computer -just connect to the computers remotely. Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, tweak Microsoft Office, validate your Internet Explorer links -and much more. Tweaki, more than just a system | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
426. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
427. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
428. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
429. | virtualCrypt 3.02 (netindiasolutions.com) | ||
is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on your computer but they are accessible and visible only when are mounted | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
430. | Watcher 2.21 (digi-watcher.com) | ||
is an intelligent webcam software that turns your PC and webcam into an inexpensive and complete audio/video surveillance and broadcasting system for home security or office security. Standalone, Watcher does motion detection, auido/video logging, broadcasting and more. Used together with the RemoteView(free), you can do real time remote surveillance. Key features of | |||
Updated: 9, 2005 | Rating: 178 | Author: Mable Ryan | Size: 1597 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
431. | WatchetZip! 1.2 (watchetsoft.co.uk) | ||
direct to CD or DVD with no extra software. Unzip selected files, view or execute without unzipping, make self-unzipping executables, add password protection. Fully configurable for selecting individual files, complete folder trees and can replicate these when unzipping. Easy file and folder management. Include hidden files. Compatible with standard zip formats. Easy to use zip | |||
Updated: 9, 2005 | Rating: 105 | Author: Colin Balkham | Size: 2211 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
432. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
users understand the danger that each spyware threat poses to online security. And to ensure you have the most advanced spyware protection available, Webroot upgrades Spy Sweeper up to four times a year, and provides those upgrades absolutely FREE. With new user interface enhancements, Spy Sweeper has never been easier to use. Backed by FREE expert customer support, it’s reliable | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
433. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and log-ins | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
434. | Innovatools What's On My Computer 2.0 (whatsonmycomputer.com) | ||
just downloaded from the Internet? Is it a virus? Is it legitimate software? Is it safe? Where can you find more information about it, or about the company that produced it? What are other people saying about it? Is it stable? Is it full of bugs? Where can you find an update? What about the programs that are running right now on your computer, or the ones that start automatically? Do | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1135 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
435. | Win Control 2004 (salfeld.com) | ||
you to protect your NT/2000/XP PC from vandalism in the systems software, its configuration and from unduly changed passwords. You can also define which Programs a user is allowed to run and which | |||
Updated: 9, 2005 | Rating: 0 | Author: Dierk Salfeld | Size: 2280 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
436. | Wincph encryption software 4.7 (keepsecret.net) | ||
and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted Archive. Drag and Drop | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
437. | WinDefender 2.1.9.1 (rtsecurity.com) | ||
running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones - files will be decrypting 'on the fly'! For any required files and folders you can assign access right, i.e. make it read-only or hide, for example. Try it first on any test files in order | |||
Updated: 9, 2005 | Rating: 0 | Author: RTSECURITY . | Size: 1351 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
438. | WinGuard Pro 2006 Free Edition 6.0 (winguardpro.com) | ||
also encrytption for your files and folders. It offers an all-in-one security solution for your computer. With extra features to lock the boot keys, task keys, software installations and internet access. This is the free edition download, however there is an option to upgrade to Premium | |||
Updated: 2, 2006 | Rating: 48 | Author: WGP Security Solutions | Size: 2454 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
439. | WinGuardian 3.0 (webroot.com) | ||
settings (like the Windows background wallpaper) or run unauthorized software. This is useful in helping to prevent viruses and intentional or unintentional operating system changes. An additional feature of WinGuardian allows the system administrator to email out the log files to a specific email address. a valuable tool for monitoring the activities on a computer to help encourage | |||
Updated: 9, 2005 | Rating: 71 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
440. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. WinTasks 5.0 Professional provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance. The award-winning | |||
Updated: 9, 2005 | Rating: 42 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
441. | Xintegrity 1.6 (xintegrity.com) | ||
Xintegrity makes it virtually impossible for anybody or anything to modify your files without being detected. When Xintegrity detects a modified file it will show exactly how and when the file was modified and display the contents of the modified file in comparison with an optionally backed up copy of the | |||
Updated: 9, 2005 | Rating: 16 | Author: Global Data Integrity Global Data Integrity | Size: 4506 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
442. | XRampAV 4.0 (XRamp.com) | ||
is the most powerful anti-virus software on the market today. It has a 32-bit engine powered by Hauri and runs over 50 percent faster than other leading anti-virus software. XRampAV fully integrates with windows explorer and popular mail programs and provides complete protection for your whole PC. Since it is fully integrated, you can scan individual files, emails or | |||
Updated: 9, 2005 | Rating: 0 | Author: XRamp Technologies | Size: 17141 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
443. | xSharez scanner 3.0 (tools-for.net) | ||
for both network administrators and users interested in the network security issues. This software will help you to solve one of the most serious problems of all modern computer networks - unauthorized data access using NetBIOS/SMB protocol. What xSharez Scanner can do for you: - Audit B and | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
444. | ZCuretIT 1.2.4.1 (zcureit.com) | ||
are supported and the recipient doesn't need any additional software for ZCureIT to work! Send contracts to business partners securely, send images to friends, send anything that you don't want the whole World to see the ZCureIT way. Strong encryption and compression techniques are applied (equivalent to U.S. government standards). ZCureIT can send your data safely through | |||
Updated: 8, 2004 | Rating: 0 | Author: Ken Myers | Size: 892 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
445. | ZeroTracks 1.2 (aidsoft.com) | ||
is another high-end security and privacy tool from INVISICOM, INC., the creators of StealthDisk™ - the world leading data security software solution. ZeroTracks™ is one of the most advanced Privacy Protection Tools on the market today. It is a must-have tool for anyone who is concerned with his privacy and disk space. ZeroTracks™ gets rid of all the leftovers that | |||
Updated: 9, 2005 | Rating: 258 | Author: Derek Phelps | Size: 679 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
446. | Xizzo 1.2 (xizzo.com) | ||
and all data files can be saved to removable media for further security. Xizzo's password management features includes one-click data entry, a user-friendly interface, an auto-logout feature for added security if you leave your computer, a customizable password generator, an Internet Launcher that opens a new browser window when any entry is double-clicked, and much more | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Tessov | Size: 758 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
447. | Dynasoft Cybercafe SurfShop Pro 4.60 (eficium.com) | ||
Cybercafe SurfShop Pro is the latest generation of cybercafe software that offers an intuitive interface and powerful security, centralised management and reporting features. Get your Internet, games or cyber cafe up and running in minutes with continental Europe's leading Internetcafe software. Easily and efficiently run and administer your business with our | |||
Updated: 2, 2006 | Rating: 55 | Author: Dynasoft Ltd | Size: 41861 kb | Shareware Go to category: Business > Other Similar programs | |||
448. | Casino Las Vegas - $400 FREE! 2006 V (best-on-line-casinos.com) | ||
Casino Las Vegas software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Casino Las Vegasare being processed by | |||
Updated: 2, 2006 | Rating: 42 | Author: Jack Black | Size: 245 kb | Freeware Go to category: Graphic Apps > Other Similar programs | |||
449. | Casino Solei 2006 V (best-on-line-casinos.com) | ||
To compliment their experienced team CasinoSolei.com purchased software from industry leaders, Playtech. Playtech's software is considered to be one of the top Internet casino products on the market. Their team, with special experience in the brick and mortar casino industry, bring additional experience and professionalism to Casino's Solei's Internet operations. It is | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
450. | Magic Box Casino - $567 FREE! 2006 V (best-on-line-casinos.com) | ||
Magic Box Casino software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Magic Box Casino are being processed | |||
Updated: 2, 2006 | Rating: 0 | Author: Sally Young | Size: 139 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
451. | Royal Dice Casino $150 Free! 2005V (best-on-line-casinos.com) | ||
Royal Dice Casino's software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Royal Dice Casino are being | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
452. | epAssist Personal Assistant 3.001 (goldencrater.com) | ||
email and files, run commands, print, control home automation, view security cameras over email, desktop toolbar, or the web. All using plain English. Everything is included to access your Assistant on the web, including read, reply, forward and compose email and send from your Desktop email account | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Koornneef | Size: 1520 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
453. | BigSender 3.72 (CraigRichards.com) | ||
searching, browsing, editing and removing multiple records, login security for as many administrators as you want, each with their own access privileges, seamless integration with your site's look and feel, "above and beyond" customer support included, and many other must-have features, discover why professionals like you rely on BigSender. Manage and use your contact lists more | |||
Updated: 2, 2006 | Rating: 0 | Author: Craig Richards Design | Size: 1385 kb | Commercial Go to category: Business > PIMS & Calendars Similar programs | |||
454. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
and money for e-mail transmission. The recipient requires no special software, because iOpus SEA packages decode themselves after the password is entered. If desired, your company logo, a custom message, and a link to your home page can be displayed: the perfect combination of branding and security. In addition, your disclaimer may be displayed: your client has to accept it | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
455. | Silver Key 3.3 (filecryption.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel†command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
456. | Tech-Pro StopAds 1.2 (tech-pro.net) | ||
means "this PC", you can prevent web browsers and other Internet software from discovering the real addresses of these servers, and hence block access to them. It's Windows that does the actual blocking. What StopAds does is make it easy for you to use a hosts file to block sites. Tech-Pro StopAds requires the Tech-Pro Utilities Startup package to be installed. Tech-Pro Utilities | |||
Updated: 9, 2005 | Rating: 0 | Author: Julian Moss | Size: 270 kb | Freeware Go to category: Network & Internet > Ad Blockers Similar programs | |||
457. | CCSA practice tests. 1.2 (simulationexams.com) | ||
CCSA certifications: The CheckPoint® Certified Security Administrator (CCSA) certification is designed as a foundation level certification. A CCSA is knowledgeable about installation, and configuration, and administration of CheckPoint® VPN-1/FireWall-1. Practice tests for CheckPoint® CCSA conforms to the objectives of CCSA 2000. The package contains 3 tests and most questions | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3176 kb | Demo Go to category: Education > Other Similar programs | |||
458. | Cheat Checker 2.03 (nine-patch.com) | ||
complaints by classmates dropped to near zero. Students named the software The Cheat Checker. The Cheat Checker examines similar pairs of answer sheets for independent marking. Any pair that fails the test is labeled presumptive cheating. The Cheat Checker then examines the uniqueness of this pair with respect to the entire class. A significant finding for uniqueness and for | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
459. | iNet+ Practice Tests. 2.6 (simulationexams.com) | ||
of Website divelopment, Client, and Server side scripting, Internet security, intranets, extranets, e-commerce, and Internet based business development. SimulationExams.com practice tests for CompTIA i-Net+ certification conforms to the latest objectives of the exam. The package contains 3 tests and | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3503 kb | Demo Go to category: Education > Other Similar programs | |||
460. | 404Browser 1.6 (404Browser.com) | ||
to the fullest extent. It is built with productivity, speed, and security in mind. Some of the features that will instantly increase your efficiency on the Internet include the following. A sample of the features: · Automatic Bookmark Organization: This takes the bookmarks and organizes them into groups, based on the information provided by the corresponding web pages. · | |||
Updated: 3, 2005 | Rating: 0 | Author: Steven Hicks | Size: 619 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
461. | CryptOne 1.1 (eniksoft.com) | ||
program is file encryption software that can encrypt multiple files and folders. You can set your own password or let the program generate it for you. For increasing password security you can set to hide password with (*). The program uses 2048 byte key for encode data. It means high security level for your files. To break password it needs billion and billion of years | |||
Updated: 9, 2005 | Rating: 48 | Author: Nikolas Ehrenberg | Size: 421 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
462. | pclxav 6.0_0303 (crackchina.nease.net) | ||
anti virus ware is always block your work better?anti virus software is not stop your system monitor tools this is a unlmition update program,gave your pc more security.more tools allowers user fix trojan virus dangerous changes.why not automation fix trojan change,cause trojan change is can custom able, to fix it,possible broke user registry. this is a very | |||
Updated: 3, 2005 | Rating: 0 | Author: jike man | Size: 2322 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
463. | SPAM Shredder 3.1 (safechaos.com) | ||
emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control under incoming emails, thus helping to save your time and money! Applying the SPAM Shredder allows to determine up to 99.9% of spam emails. SPAM Shredder is a | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
464. | Safe Express Free 3.4 (netsafesoft.com) | ||
to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
465. | Safe Express Home 4.2 (netsafesoft.com) | ||
of damage to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
466. | CHAOS Universal 6.2 (safechaos.com) | ||
CHAOS Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
467. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
lets you charge customers, using all kinds of payment devices. The software uses Internet Explorer as its basis but presents a much simplified interface that even the novice user will understand. Some of the features included: Multiple-window support, multilanguage support, automatic dial-up or network connection, event-logging, download manager, favorites, Web site filtering (with | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
468. | NewWayService 2.19 (orologic.com) | ||
is the Help Desk software solution designed to maximise your service centre or call centre department. Whatever your industry, NewWayService allows you to easily track and manage calls, issues, jobs, requests or work orders. With its very user-friendly environment, no intense training is needed to learn to use it. Flexible, NewWayService adapts itself to your needs | |||
Updated: 3, 2006 | Rating: 0 | Author: Sales Department | Size: 21313 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
469. | IDpack Plus 7.1 (aptika.com) | ||
kinds of uses: employees, schools, libraries, membership, corporate security cards, convention cards and all other needs. There is no need to buy expensive ID card-making equipment or PVC cards, IDpack prints on your own printer with more than 1000 Avery label formats built in or 40 DYMO LabelWriter | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Bourdages | Size: 23221 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
470. | OroTimesheet 5.07 (orologic.com) | ||
a very user-friendly interface, OroTimesheet is the time tracking software solution you need to track time by project! Discover today the new way to manage timesheets! OroTimesheet allows you to keep track and manage the time spent on each project by you or your employees. Very flexible, OroTimesheet adapts itself to your needs whether you work for a big corporation or are a | |||
Updated: 2, 2006 | Rating: 0 | Author: Sales Department | Size: 30423 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
471. | Plexis POS 2.8 (plexispos.com) | ||
POS Software, Point of Sale for Quick Service, QSR Restaurants, Bars, Coffee Shops, Grocery, Convenience Stores, Liquor, Pizza Delivery and Retail. Use Touch Screen, Mouse or Keyboard. Includes Inventory and Barcode, Customer Management, A/R, Statements, General Ledger, Reporting, Multiple Taxes, Discounting and more. Single Lane or Multi-Lane Network option available. Integrated | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales Department | Size: 9760 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
472. | Snoop 1.1 (yoursnoop.com) | ||
Snoop makes it easy to monitor PC and Internet activity on your work or home computer or even from a remote location. Now you can record everything your children, employees and/or spouse do on their PC and have a report delivered to an e-mail address, anywhere and as frequently as every day. Once installed on | |||
Updated: 3, 2005 | Rating: 0 | Author: Snoop Internet Security | Size: 1390 kb | Freeware Similar programs | |||
473. | Timesheets Lite 1.1.0.9 (users.tpg.com.au) | ||
Lite is our free timesheeting software. It is ideally suited to a project based environment where you need to track your employees time against projects. Key features of Timesheets Lite include: Completely free for use Simple to use interface Create and delete employees and projects Allow employees to book time against projects Generate reports suitable for | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Nemtsas | Size: 2755 kb | Freeware Go to category: Business > Project Management Similar programs | |||
474. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
475. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
476. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
477. | Alkonost ContraCopy 3.00 (alkonost.com) | ||
ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
478. | Engineers Edition 3.3 (solarwinds.net) | ||
discover an entire subnet. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The ADVANCED BANDWIDTH MONITOR tool provides graphing and trending analysis over | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 61138 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
479. | ExeShield 2.6 (moonlight-software.com) | ||
it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield it's easy to turn your | |||
Updated: 9, 2005 | Rating: 0 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
480. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
481. | System Key Wizard 2.1 (home.wol.co.za) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
482. | System Key Wizard 2.1 (continuumq.com) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
483. | VeriFinger Standard SDK 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Other Similar programs | |||
484. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
485. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
486. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
487. | VeriLook Standard SDK (Demo for Windows) 2.0 (neurotechnologija.com) | ||
per second. VeriLook can be easily integrated into the customer's security system. The integrator has a complete control over SDK data input and output; therefore SDK functions can be used in connection with most cameras and databases. Integrator could develop any user interface. Distribution | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 590 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
488. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
489. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 120 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
490. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons in the wrong hands. New added features to | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
491. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
492. | 1st Email Anti-Virus 4.0 (zzee.com) | ||
Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Slavic | Size: 975 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
493. | Engineers Edition 5.2 (solarwinds.net) | ||
etc) across a range of subnets. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The BANDWIDTH MONITOR tool provides graphing and trending analysis over months or | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
494. | iNet Shaper 2.191 (winfiles32.com) | ||
Shaper is All-In-One internet connection sharing software solution covering the variety of expensive networking equipment fuctions. It performs internet connection sharing, internet traffic accounting (billing). Software router performs network address translation (NAT), traffic shaping (optional bandwidth management for each user), has filtering capabilities, powerful user | |||
Updated: 3, 2005 | Rating: 24 | Author: UIP RU | Size: 4100 kb | Freeware Similar programs | |||
495. | Internet Access Scheduler 2.0 (winutility.com) | ||
Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
496. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
at the specified time intervals. Internet Cleaner is a trial software, you can download and evaluate it free of charge for the period of 30 days. Remove all traces of your computer activity (including recently visited sites, browser cache and cookies, Start menu history, documents history etc.) and free the hard drive space by erasing the Scandisk file fragments and emptying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
497. | JBMail 3.2 (jbmail.pc-utils.com) | ||
e-mail client that supports SSL/TLS encrypted POP3 and SMTP. The software has been designed for simplicity, security and on-line mailbox access meaning that mail is manipulated remotely and NOT stored locally. Delete spam or large attachments without having to first download them! This portable software does not require installation, registry keys or even temporary | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
498. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
Server is an enterprise class mail server software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based administration, and a wide array of standard | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
499. | MDaemon 8.1.4 (altn.com) | ||
, Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs. MDaemon features include top-notch antispam security features; seamless integration with AntiVirus for MDaemon plug-in; built-in groupware functionalities for sharing folders, tasks, contacts, and | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
500. | NetChatSpy 2.5.0 (home.primus.com.au) | ||
from any computer on a local area network. Undetectable because software installed on only one computer in the network. Can operate in 'Stealth Mode' to record conversations on local computer for added security. Monitor children or employees to ensure on-line safety and appropriate use of Internet. Remotely monitor Instant Messenger conversations from any computer on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Langford | Size: 5655 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|