|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
241. | ezProxy 2.7.1 (lavasoftware.net) | ||
Explorer, Eudora, Icq/AIM, FTP programs, RealAudio and any other software that supports proxy connections (most of them do these days). ezProxy offers several advanced features including bandwidth balancing, remote control and a password protected user interface. You can specify rules for all users or define custom rules and restrictions for individual users. Rules can be saved as | |||
Updated: 2, 2006 | Rating: 42 | Author: Hu Wei | Size: 2029 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
242. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
* Protection against viruses. Includes an award-winning antivirus software. * Easy-to-Install. Install and use in your own language. * Easy-to-Use Virus Protection. * Virus definition databases updated even twice a day. * New! Improved E-mail scanning removes infected attachments automatically. * New! Virus news. Get information about latest threats from F-Secure. Stops even | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
243. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
244. | Fibonacci Calculator 2.00.01 (aga-wallstreet.com) | ||
but in graphical one as well. You don't need an additional charting software to determine input data for Fibonacci Numbers calculation. The Calculator downloads historical data for a security of your choice and draws the security's chart. You do not need to subscribe to historical data provider, it's free! You can build historical chart of three types: Line, Bar and | |||
Updated: 3, 2005 | Rating: 184 | Author: Eugene Ginzburg | Size: 2700 kb | Shareware Go to category: Business > Other Similar programs | |||
245. | File & Folder Protector 2.33 (softheap.com) | ||
Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
246. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
247. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
248. | FileVault 3.0 (networktoolz.com) | ||
directories and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files that conceal your most sensitive documents. Send Vault files safely over the Internet safe in the knowledge that only the recipient can open them and that they will be completely meaningless to anyone who may | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
249. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
250. | FitoNT 1.0.0.0 (netnet.ca) | ||
WRONG....In today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
251. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
252. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
253. | FlowBiz Net Publisher 1.00 (devware.com.au) | ||
Procedure Charter charts and information, read only, with no other software to deploy or maintain. If you need a database solution with security and search with an on-line coach, check out Enterprise. Tool for publishing Active FlowBiz Procedure Charter HTML pages for browsing on a LAN/WAN or your companies Inter or Intranet. Deploy ISO 9000, Safety, Environment, work | |||
Updated: 9, 2005 | Rating: 0 | Author: Brent Brian | Size: 585 kb | Demo Go to category: Business > Other Similar programs | |||
254. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
255. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
Password Expert is a security software program that lets you restrict access to the folders that contain your sensitive data. Secure your documents to prevent people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
256. | Folder Protection 2.1 (folder-protection.com) | ||
Protection is security software that lets you control access to your folders. Secure your documents to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. If the drive is connected to another PC, your folders still remain protected. Folder Protection is ideal for | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Cadwallen | Size: 786 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
257. | Folder Security 2.5 (folder-security.com) | ||
Security is a software program designed to password-protect folders. It lets you prevent people from viewing, printing, or altering your confidential documents. Folders remain protected should your PC be rebooted into Windows Safe Mode or DOS. A nice feature is the ability to include a password hint. Choose something sensible and it will prompt you to remember your password | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicole Collet | Size: 755 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
258. | Folder Security Personal 3.5 (y0ys.com) | ||
Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make them read-only. It works with drive of all of FAT/FAT32/NTFS formats. This program | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
259. | Folder Shield 2003 1.3 (baxbex.com) | ||
the selected data disappear. Folder Shield vastly increases the security of your PC, while at the same time being so simple and very convenient to use. Folder Shield is multilingual and supports: English, Spanish, German, French, Italian, Portuguese (Brazil), Swedish, and Danish Folder Shield enables you to make folders completely invisible. Just specify all confidential folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
260. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
261. | FolderSafe 2.1 (occultsoft.com) | ||
is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
262. | Free DWG Viewer 5.3.0.2 (infograph.com) | ||
company's Net-It publishing products and featuring Visual Rights security options for file content. The DWG viewer also supports IGC's legacy formats from previous versions of Brava! and MYRIAD. Based on ActiveX, IGC's Free DWG Viewer serves as a stand-alone desktop application, or an ActiveX control that can be invoked from a specified application, such as Internet Explorer. Now | |||
Updated: 2, 2006 | Rating: 1642 | Author: Kevin Keil | Size: 12254 kb | Freeware Go to category: Graphic Apps > Viewers Similar programs | |||
263. | Free Internet Eraser 2.05 (privacyeraser.com) | ||
Internet Eraser is an Internet privacy software that protects your Internet privacy by permanently erase internet history and past computer activities. Even though, many of the tasks can be performed manually, Free Internet Eraser can automate this process for you. Free Internet Eraser allows you to erase history, erase Internet history, internet cache, cookies, address bar search | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Kent | Size: 852 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
264. | Gazillionaire Deluxe (lavamind.com) | ||
Gazillionaire is the award winning game of business strategy. It was selected as a FINALIST in the Ziff-Davis Shareware of the Year Awards and was ranked in the Top 5 of all strategy games. Gazillionaire is a cross between Monopoly set in outer space and Wall Street in wonderland. It is a wild, intergalactic | |||
Updated: 9, 2005 | Rating: 42 | Author: LavaMind Productions | Size: 5576 kb | Shareware Go to category: Games & Entertainment > Simulation Similar programs | |||
265. | GDS 2000 PRO 1.06 (aidsoft.com) | ||
2000 PRO is incontestably the software you need to manage your service calls. It allows you to follow efficiently your service calls and keep the history of all the problems and solutions encountered. No matter the field of activity of the organization you work for, GDS 2000 PRO will fit your needs for managing efficiently your service calls for all your customers whether they are | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales department | Size: 8346 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
266. | GemTracker Pro 2.1.21 (goldcalculator.com) | ||
stones processing management software. Keeps track of your memos, repairs, recuts, roughs and purchases from start to finish. Maintains a Administrator defined custom gem inventory database over searching, sorting and editing your gem inventory. Includes a built in image viewer with the ability to view and attacth gem pics and lab certifications to your inventory records which will | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Cascio | Size: 13878 kb | Shareware Go to category: Business > Other Similar programs | |||
267. | General Knowledge Base 2.2 (baltsoft.com) | ||
Knowledge Base is an innovative Knowledge Management software allowing an easy and effective management of all types of knowledge bases. With its intuitive user interface, it is easy to create, capture, and store in one location all types of documents and files and have fast retrieval when required. To improve knowledge sharing, it provides an easy access to an organization's | |||
Updated: 2, 2006 | Rating: 42 | Author: Tomas Rutkauskas | Size: 7323 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
268. | GetAnonymous 1.2 (getanonymous.com) | ||
of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to end the | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
269. | GetAnonymous V2.0 - Personal Edition 2 (coftware.com) | ||
of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to end the | |||
Updated: 9, 2005 | Rating: 90 | Author: Tom Brett | Size: 10240 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
270. | GetAnonymous V2.0 Professional Edition 2 (coftware.com) | ||
of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous Professional allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous Professional not only allows you to use a proxy chain, but also to control the length of this chain. You can set | |||
Updated: 9, 2005 | Rating: 39 | Author: Tom Brett | Size: 5120 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|