|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
41. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
42. | PECompact 2.75 (bitsum.com) | ||
make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC plug-ins. Custom loaders (decompression) stubs and API hook plugins are also able to be utilized. Advanced configuration includes selection of resource types that | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
43. | PowerZip 7.06 (powerzip.biz) | ||
documents with PowerZip - an easy to use file compression & security program. PowerZip Compression / Extraction Wizards make working with archives (such as Zip files) easy while providing an array of advanced features. The Wizards are quick to use because they have only a small number of steps; some steps can be switched of if not needed, others can be skipped to use default | |||
Updated: 9, 2005 | Rating: 124 | Author: Dimitri Ternovski | Size: 1920 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
44. | Protect Folder 98 3.0 (everstrike.com) | ||
Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the file or folder that you | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
45. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Search and Recover 3.0d (iolo.com) | ||
calendars, contacts, notes, and tasks in MS Outlook - Bonus security features allow you to quickly and securely delete ANY existing file or folder on your system, keeping private data away from other recovery tools and thereby out of unwanted hands. - Eliminates the need to go to backups when data is accidentally lost - Create and work with emergency disk images Create an exact | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
48. | Super Password Guard 3.1 (topaim.net) | ||
accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not stored anywhere). You can also assign a short master password hint text so if you accidentally forget your master password, the hint will help you to recall it. 3. Make custom categories/subcategories to divide your accounts into logical | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
49. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
50. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
51. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
and up-to-date protection against emerging spyware. Spy Sweeper’s advanced removal engine deletes the toughest spyware programs - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats - which are specifically designed to avoid detection and removal. This | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
53. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and log-ins | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
54. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | ZCuretIT 1.2.4.1 (zcureit.com) | ||
have done everything you can to protect your data. For you it's as easy as selecting the file, entering the password, selecting the output destination, and pressing a button to create a self-extracting and self-decrypting executeable. For the recipient, it's as easy as entering the password, pressing the Open button, and the the application automatically opens up in the | |||
Updated: 8, 2004 | Rating: 0 | Author: Ken Myers | Size: 892 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
56. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
57. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how thatâ??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
58. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
59. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
60. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|