|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
41. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
Personal Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
42. | lock and go 1.0 (aidsoft.com) | ||
(lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to potential media theft. That is why lockngo is the perfect companion for your portable | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
43. | Panda Security Demo 3.0.2.0 (pandasecurity.com) | ||
such as file transfer via FTP or chatting through IRC. Panda Security allows you to lock down your data with iron-clad protection. Helps you keep hackers or unauthorized users away from your files, and from configuring your systems. You can prevent data from being removed from your company or computer. And you can prevent users from accessing certain Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 6010 kb | Demo Go to category: System Utilities > Other Similar programs | |||
44. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
45. | RemoteExec 3.07 (isdecisions.com) | ||
RemoteExec® will dramatically minimize, simplify and secure all software and operating system administration tasks (Application and upgrade deployment, script and batch launching…), without disrupting on-going production. FEATURES: - Remote running of program files (.exe, .bat, .cmd…), scripts (.vbs, .js…) and all associated file types (.doc, .wav, .reg, .msi...) | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
46. | Sitekeeper 3.5 (execsoft.com) | ||
easy as clicking your mouse. Automate and centralize your patch and security update management, hardware and software inventory, license compliance tracking, and software installations. No expensive, dedicated hardware or special training required-with Sitekeeper, you can automate your patch and systems management in under an hour. Sitekeeper runs on Windows® XP | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 42997 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
47. | SpeedUpMyPC 2.04 (lidownloads.com) | ||
award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources including hardware, system settings and internet usage to operate at peak performance at all times. Your PC will instantly become faster, cleaner and more stable. Even with the latest | |||
Updated: 9, 2005 | Rating: 101 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: System Utilities > Benchmarking Similar programs | |||
48. | System Protector 1.9 (aidsoft.com) | ||
Some of the program options are:Customize your Control-PanelCustomize Display PropertiesHide/customize Network settingsCustomize Start MenuHide all drives in Control Panel (A:\, C:\, D:\)Customize your Video AdapterCustomize your Active DesctopChange Computer Owner InformationChange Windows Installation | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
49. | Thinstall Studio 1.94 (aidsoft.com) | ||
file that is able to run directly without decompressing to disk. Software Developers can use Thinstall to protect and hide their data files from prying eyes, prevent disassembly of their EXE or DLL files, and create "no installation required" distributions of their software applications | |||
Updated: 9, 2005 | Rating: 16 | Author: Jonathan Clark | Size: 1327 kb | Demo Go to category: System Utilities > Other Similar programs | |||
50. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
51. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. WinTasks 5.0 Professional provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance. The award-winning | |||
Updated: 9, 2005 | Rating: 42 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
52. | xSharez scanner 3.0 (tools-for.net) | ||
for both network administrators and users interested in the network security issues. This software will help you to solve one of the most serious problems of all modern computer networks - unauthorized data access using NetBIOS/SMB protocol. What xSharez Scanner can do for you: - Audit B and | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
53. | CCSA practice tests. 1.2 (simulationexams.com) | ||
CCSA certifications: The CheckPoint® Certified Security Administrator (CCSA) certification is designed as a foundation level certification. A CCSA is knowledgeable about installation, and configuration, and administration of CheckPoint® VPN-1/FireWall-1. Practice tests for CheckPoint® CCSA conforms to the objectives of CCSA 2000. The package contains 3 tests and most questions | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3176 kb | Demo Go to category: Education > Other Similar programs | |||
54. | iNet+ Practice Tests. 2.6 (simulationexams.com) | ||
of Website divelopment, Client, and Server side scripting, Internet security, intranets, extranets, e-commerce, and Internet based business development. SimulationExams.com practice tests for CompTIA i-Net+ certification conforms to the latest objectives of the exam. The package contains 3 tests and | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3503 kb | Demo Go to category: Education > Other Similar programs | |||
55. | Alkonost ContraCopy 3.00 (alkonost.com) | ||
ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
56. | VeriFinger Standard SDK 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Other Similar programs | |||
57. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
58. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
59. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
60. | VeriLook Standard SDK (Demo for Windows) 2.0 (neurotechnologija.com) | ||
per second. VeriLook can be easily integrated into the customer's security system. The integrator has a complete control over SDK data input and output; therefore SDK functions can be used in connection with most cameras and databases. Integrator could develop any user interface. Distribution | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 590 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|