|
||||||
|
||
|
Home > Viruses software |
Related keywords: trojans viruses |
|
|
631. | HS SoBigRemover 1.2 (haysoft.com) | ||
software must be used to detect large number of SoBig viruses in an email account and delete them remotely without the need of downloading any of them to your machine. SoBig virus is large sized email so it uses network traffic when receiving to your machine. This software can be an | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
632. | Iconic Tray 1.21 (iconictray.com) | ||
tray is easy: simply right-click (or middle-click) on the window's "Minimize" button. Anytime you want to view the minimized windows, just open the Iconic Tray icon to see a menu list - click on a window in the list and it's back on screen again. It really is that easy. Of course, if you had chosen to minimize to the system tray, just restore your window as you would any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
633. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
634. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
635. | KeyText 2.25 (mjmsoft.com) | ||
Multi-purpose text and automation utility. KeyText stores pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
636. | LAN Find 3.1 (ihsoftware.net) | ||
Find software installs in network archives! - Find all temporary or virus generated files and delete them! - Search your local computer for the same things! Fast file search on network or your computer! LAN Find is a powerful search engine for your LAN or computer. Find any files (e.g. mp3, avi) | |||
Updated: 9, 2005 | Rating: 1263 | Author: Dmitry Veshkovich | Size: 927 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
637. | LetUknow 2.03 (mhsoftware.co.uk) | ||
LetUknow provides a "peace of mind" method of monitoring your LAN and resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals - you choose how often. If a test fails, the appropriate individuals are notified immediately, resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
638. | Lock Folder 5.0 (realclicks.com) | ||
files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
639. | DVD Ripper Copy Pro Pro (ChineseEnglishTranslation.org) | ||
Ripper Copy Pro is the easiest way to copy DVD's. With DVD Ripper Copy Pro You Can: Copy DVD's to CDR and watch them on your DVD player. Copy DVD's to your computer and watch them on your computer.Make instant backups of your DVD's. Never worry about scratching or loosing your DVD's again! DVD Ripper Copy Pro is the easiest way to copy | |||
Updated: 9, 2005 | Rating: 16 | Author: Anderson Trueman | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
640. | Email Audit 3.2 (km-vision.com) | ||
Compliments Outlook Rules implementations. Moves suspect mails (Virus mails etc) to suspect mails folder Generate regular Audit Reports. KMsoft can also take Advanced Mail solutions projects such as Enterprise Mail Track, Enterprise mail archival,Mail to EDI conversion,EMS,Web based Email Response | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
641. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
642. | EscapeClose Pro 1.9 (sanapesoft.com) | ||
EscapeClose Pro is a tiny utility, allowing you to close or minimize the active window by pressing the Esc button. And now you can hide active window. Thus you can see it neither in the TaskBar nor in the Task Manager list (Ctrl+Alt+Del) nor in the list opening by pressing Alt+Tab. Or, to work more carefully | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Moshkov | Size: 319 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
643. | EtherScout 1.10 (globalpatrol.net) | ||
EtherScout is an Internet traffic monitoring utility that sits in your network and records and analyzes traffic patterns of Internet usage. Reports can be generated in real time, showing detailed information on what users are doing, or trends of surfing behavior on your network. After collecting this | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1216 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
644. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
F-Secure Anti-Virus 2004 you can surf on the Internet, open e-mail attachments and use your computer without any fear of virus infections. You can also be sure that you are not sending viruses to others. Especially for home users and small offices without dedicated IT-staff, F-Secure Anti-Virus 2004 provides maintenance-free, easy-to-use protection | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
645. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
now a highly advanced service against viruses and break-in attempts when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
646. | Field Filler 1.00 (yildun.com) | ||
Field Filler is a HTML Form and clipboard tool software which can open and save various Field Filler text databases. With a Field Filler you can easily copy and paste from the clipboard your most used text and also you can fill an HTML Form fields with just a one click on the button. To copy text onto | |||
Updated: 9, 2005 | Rating: 0 | Author: Samir Alicehajic | Size: 738 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
647. | FileMap by BB 4.0.4 (dogkennels.net) | ||
Don't become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
648. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
649. | FileSpy Pro 2.0 (ic.net) | ||
With FileSpy Pro you can also send messages to users, clear user's connections, unlock locked files, get extended file information, and run queries against the log database to discover important details about file usage. FileSpy Pro is a powerful file monitoring utility for Novell file servers | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
650. | FitoNT 1.0.0.0 (netnet.ca) | ||
today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers, unexpected hard drive or hardware crashes, and any other dangers | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
651. | FlipPublisher 1.0 (flipalbum.com) | ||
FlipPublisher is an authoring tool for digital publications. With FlipPublisher, you can easily publish magazines, novels, textbooks, catalogs, brochures, portfolios, manuals, and more as a FlipBook on the Web or on CDs for viewing on a PC. FlipPublisher empowers the owners of content to become their own | |||
Updated: 9, 2005 | Rating: 88 | Author: E-Book Systems, Inc. | Size: 9239 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
652. | FolderAccess 2.0 (lockfolder.net) | ||
files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
653. | FontMap 2.41 (ccountry.net) | ||
FontMap may be used to view and print both installed and external fonts; it can display a variety of tables, individual characters, a keyboard view, font description, or whatever text you wish to enter. Individual characters can be displayed in a "full-screen" view and custom table parameters can be set to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gary Dix | Size: 336 kb | Shareware Go to category: Desktop > Cursors & Fonts Similar programs | |||
654. | CopyLock 1.08 (noeld.com) | ||
which are currently in use (e.g. system files like comctl32.dll, or virus/trojan files.) Add the files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the processes which use the locked files | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
655. | Crime Catcher 2.1 (crime-catcher.com) | ||
Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
656. | Custom StartUp 3.01 (gboban.com) | ||
you reject. This may be also useful in protection from some types of viruses. Custom StartUp helps you to manage which programs will be stared when Windows starts. Moreover, Custom StartUp allows you to backup and restore configurations later. Also, you can quickly apply start-up configuration and restart or shutdown your | |||
Updated: 9, 2005 | Rating: 0 | Author: Goran Boban | Size: 572 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
657. | Daily Backup 2.08 rel b (softwaremeister.com) | ||
Daily Backup quickly creates zip archives of just the changed (or created) files. Once you've set it up, you'll barely notice your safety net. Schedule your backups: as soon as you changed (or created) a file, at fixed time periods, when the screen saver is running, or on the end of the session. Note that see the generations of files; go back to a previous generation whenever you want | |||
Updated: 9, 2005 | Rating: 43 | Author: Thomas Gawehns | Size: 1319 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
658. | DataLock 1.0 (unicorntech.net) | ||
Most people store their information on their computer and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
659. | Desktop Scout 4.0 (globalpatrol.net) | ||
Desktop Scout is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
660. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Viruses software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|