|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
211. | Norton Internet Security 2004 (nct.symantecstore.com) | ||
Norton Internet Security 2004 provides essential protection from viruses, hackers, and privacy threats. Powerful yet easy to use, this award-winning suite now includes advanced spam-fighting software. Viruses are a daily threat, so Norton Internet Security gives you the world’s most trusted antivirus solution. Norton AntiVirus removes viruses from email | |||
Updated: 9, 2005 | Rating: 47 | Author: Jennifer Leonard | Size: 35100 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
212. | Pop3Hot 2.0 (ref.izymail.com) | ||
against being sent damaging code in e-mail by setting appropriate security levels in their application. Pop3Hot is a new eMail solution to synchronize AOL, MSN, Hotmail or Yahoo with Outlook, Eudora, Pocket PC and others. Download and send messages, incl. all attachments. Synchronize all folders and use them offline via POP3, IMAP4 and | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulrich Schwanitz | Size: 335 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
213. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons in the wrong hands. New added features to | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
214. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
215. | 1st Email Anti-Virus 4.0 (zzee.com) | ||
Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Slavic | Size: 975 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
216. | Engineers Edition 5.2 (solarwinds.net) | ||
etc) across a range of subnets. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The BANDWIDTH MONITOR tool provides graphing and trending analysis over months or | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
217. | System Key Wizard 2.1 (home.wol.co.za) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
218. | System Key Wizard 2.1 (continuumq.com) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
219. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
220. | Engineers Edition 3.3 (solarwinds.net) | ||
discover an entire subnet. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The ADVANCED BANDWIDTH MONITOR tool provides graphing and trending analysis over | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 61138 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
221. | ExeShield 2.6 (moonlight-software.com) | ||
it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield it's easy to turn your | |||
Updated: 9, 2005 | Rating: 0 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
222. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
223. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
lets you charge customers, using all kinds of payment devices. The software uses Internet Explorer as its basis but presents a much simplified interface that even the novice user will understand. Some of the features included: Multiple-window support, multilanguage support, automatic dial-up or network connection, event-logging, download manager, favorites, Web site filtering (with | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
224. | IDpack Plus 7.1 (aptika.com) | ||
kinds of uses: employees, schools, libraries, membership, corporate security cards, convention cards and all other needs. There is no need to buy expensive ID card-making equipment or PVC cards, IDpack prints on your own printer with more than 1000 Avery label formats built in or 40 DYMO LabelWriter | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Bourdages | Size: 23221 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
225. | Plexis POS 2.8 (plexispos.com) | ||
POS Software, Point of Sale for Quick Service, QSR Restaurants, Bars, Coffee Shops, Grocery, Convenience Stores, Liquor, Pizza Delivery and Retail. Use Touch Screen, Mouse or Keyboard. Includes Inventory and Barcode, Customer Management, A/R, Statements, General Ledger, Reporting, Multiple Taxes, Discounting and more. Single Lane or Multi-Lane Network option available. Integrated | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales Department | Size: 9760 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
226. | Timesheets Lite 1.1.0.9 (users.tpg.com.au) | ||
Lite is our free timesheeting software. It is ideally suited to a project based environment where you need to track your employees time against projects. Key features of Timesheets Lite include: Completely free for use Simple to use interface Create and delete employees and projects Allow employees to book time against projects Generate reports suitable for | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Nemtsas | Size: 2755 kb | Freeware Go to category: Business > Project Management Similar programs | |||
227. | Alkonost ContraCopy 3.00 (alkonost.com) | ||
ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
228. | IT Manager Helpdesk 2.0 (168.144.45.89) | ||
The IT Managerâ„¢ was designed to help effectively and efficiently manage change and growth in IT Manager resources and other vital information on a daily basis allowing that information to be added, modified, or viewed with minimal effort. A resource can be a piece of hardware, a staff member, a location | |||
Updated: 9, 2005 | Rating: 173 | Author: Ertugrul Akbas | Size: 43 kb | Commercial Go to category: Business > Helpdesk & Remote PC Similar programs | |||
229. | SPAM Shredder 3.1 (safechaos.com) | ||
emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control under incoming emails, thus helping to save your time and money! Applying the SPAM Shredder allows to determine up to 99.9% of spam emails. SPAM Shredder is a | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
230. | Safe Express Home 4.2 (netsafesoft.com) | ||
of damage to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
231. | CHAOS Universal 6.2 (safechaos.com) | ||
CHAOS Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
232. | CCSA practice tests. 1.2 (simulationexams.com) | ||
CCSA certifications: The CheckPoint® Certified Security Administrator (CCSA) certification is designed as a foundation level certification. A CCSA is knowledgeable about installation, and configuration, and administration of CheckPoint® VPN-1/FireWall-1. Practice tests for CheckPoint® CCSA conforms to the objectives of CCSA 2000. The package contains 3 tests and most questions | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3176 kb | Demo Go to category: Education > Other Similar programs | |||
233. | Cheat Checker 2.03 (nine-patch.com) | ||
complaints by classmates dropped to near zero. Students named the software The Cheat Checker. The Cheat Checker examines similar pairs of answer sheets for independent marking. Any pair that fails the test is labeled presumptive cheating. The Cheat Checker then examines the uniqueness of this pair with respect to the entire class. A significant finding for uniqueness and for | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
234. | iNet+ Practice Tests. 2.6 (simulationexams.com) | ||
of Website divelopment, Client, and Server side scripting, Internet security, intranets, extranets, e-commerce, and Internet based business development. SimulationExams.com practice tests for CompTIA i-Net+ certification conforms to the latest objectives of the exam. The package contains 3 tests and | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3503 kb | Demo Go to category: Education > Other Similar programs | |||
235. | Xizzo 1.2 (xizzo.com) | ||
and all data files can be saved to removable media for further security. Xizzo's password management features includes one-click data entry, a user-friendly interface, an auto-logout feature for added security if you leave your computer, a customizable password generator, an Internet Launcher that opens a new browser window when any entry is double-clicked, and much more | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Tessov | Size: 758 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
236. | Royal Dice Casino $150 Free! 2005V (best-on-line-casinos.com) | ||
Royal Dice Casino's software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Royal Dice Casino are being | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
237. | epAssist Personal Assistant 3.001 (goldencrater.com) | ||
email and files, run commands, print, control home automation, view security cameras over email, desktop toolbar, or the web. All using plain English. Everything is included to access your Assistant on the web, including read, reply, forward and compose email and send from your Desktop email account | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Koornneef | Size: 1520 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
238. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
and money for e-mail transmission. The recipient requires no special software, because iOpus SEA packages decode themselves after the password is entered. If desired, your company logo, a custom message, and a link to your home page can be displayed: the perfect combination of branding and security. In addition, your disclaimer may be displayed: your client has to accept it | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
239. | Tech-Pro StopAds 1.2 (tech-pro.net) | ||
means "this PC", you can prevent web browsers and other Internet software from discovering the real addresses of these servers, and hence block access to them. It's Windows that does the actual blocking. What StopAds does is make it easy for you to use a hosts file to block sites. Tech-Pro StopAds requires the Tech-Pro Utilities Startup package to be installed. Tech-Pro Utilities | |||
Updated: 9, 2005 | Rating: 0 | Author: Julian Moss | Size: 270 kb | Freeware Go to category: Network & Internet > Ad Blockers Similar programs | |||
240. | virtualCrypt 3.02 (netindiasolutions.com) | ||
is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on your computer but they are accessible and visible only when are mounted | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|