|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
21. | BREAKTRU PAYROLL 2006 10.1.0 (breaktru.com) | ||
the deductions and withholding too much or too little? Payroll 2006 software makes it easy to keep track of your weekly or bi-weekly pay checks. Enter the hours worked as well as overtime, holiday, sick leave, and other pay categories, then Payroll 2006 applies the withholding tax rates for federal | |||
Updated: 3, 2006 | Rating: 101 | Author: David Giordano | Size: 6501 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
22. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important note: Adobe Acrobat doesn't need to be installed. Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
26. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
27. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
28. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
29. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. Log data is converted to text format, and delivered to a remote Snare Server, or to a remote Syslog | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
30. | WebCam Monitor 3.54 (deskshare.com) | ||
With support for both motion detection and sound detection, the software lets you keep an eye on your property from a remote location. Whenever WebCam Monitor detects an intrusion or other unusual activity, the program can perform any number of activities to protect your property. WebCam Monitor can be configured to manually or automatically capture snapshot images, or record | |||
Updated: 3, 2006 | Rating: 2799 | Author: Steve P | Size: 8783 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
31. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
Button Sales Totals & Reports, On the Fly Inventory Entry, Password Security, Quotes, Rentals, Inventory Control, Billing, Mailing Lists, Terms, Invoicing, Packing Slips, Automatic Sale Discounts and more. Import and export products, customers list and sales information. Send/Email all | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
32. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
presentation can be easily viewed with any web browser. No special software is required, since 98% of the browsers have the Flash plug-in already installed. When performing the conversion, the size of the output files is reduced with up to 90%, which is till to 3 times better than with other leading | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
33. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a unique email monitoring software and surveillance tool created for a wide range of users either for ordinary home users or businessmen, corporations etc. With its help you can know the exact contents of email messages sent by your children, spouse or employees. EmailObserver is a unique monitoring software tool from a variety of similar software available | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
34. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a unique email monitoring software and surveillance tool created for a wide range of users either for ordinary home users or businessmen, corporations etc. With its help you can know the exact contents of email messages sent by your children, spouse or employees. EmailObserver is a unique monitoring software tool from a variety of similar software available | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
36. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
Anti Keylogger is powerful but easy to use anti-spy software to prohibit operation of any keyloggers currently in use or presently being developed anywhere. Once installed our anti-spy software will protect your privacy immediately and constantly. One particularly scary and dangerous feature of all spy software is recording of computer user's keystrokes for the | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
37. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
38. | EMS IB Manager 4.1 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Powerful stored procedure debugger; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing InterBase and Firebird services. EMS SQL Manager 2005 for IB/FB is a powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
39. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS Excel does not need to be installed. Partial Features List: - reads XLS files (does not require MS Excel to be | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
40. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|