|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
41. | m9P Zipper X 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. Special Offer: click Buy Now button on this site to buy the software directly from RegNow and receive 30% discount! m9P Zipper X is a simple file compression (zipping) & decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4423 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
42. | m9P Zipper XT 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. m9P Zipper XT is a user-friendly heavy-duty file compression (zipping) and decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the [.zip] format. m9P Zipper XT outputs very small zipped | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4326 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
43. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
44. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
45. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
46. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
files layout. You can use one or more passwords.Many additional security options are available. For more information visit http://www.htmlguardian.org http://www.htmlguardian.org. HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
48. | Norton Internet Security 2004 (nct.symantecstore.com) | ||
Norton Internet Security 2004 provides essential protection from viruses, hackers, and privacy threats. Powerful yet easy to use, this award-winning suite now includes advanced spam-fighting software. Viruses are a daily threat, so Norton Internet Security gives you the world’s most trusted antivirus solution. Norton AntiVirus removes viruses from email | |||
Updated: 9, 2005 | Rating: 47 | Author: Jennifer Leonard | Size: 35100 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
50. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
51. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
52. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
53. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
54. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is ideal for monitoring convenience stores, gas stations, day care centers, retirement facilities, hospitals, laboratories, commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
55. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and log-ins | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
56. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
58. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
59. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Undelete Server and Professional 4.0 (execsoft.com) | ||
How valuable is the data on your servers and PCs? What if you or your users lost a critical accounting file, a major report, or even digital snapshots of the family? The Windows Recycle Bin doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|