|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
31. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
32. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
33. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
34. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is ideal for monitoring convenience stores, gas stations, day care centers, retirement facilities, hospitals, laboratories, commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
35. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
37. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
38. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
40. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
increase system performance. Improve Internet performance, and web security. Provide convenient tools to tune up and ease your computer use. PCXL also provides special security features to protect your system. Available in standard and professional suite editions. Features include: -brand new redesigned interface -brand new SmartJupiter optimization engine -thousands of | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
41. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
42. | PowerZip 7.06 (powerzip.biz) | ||
documents with PowerZip - an easy to use file compression & security program. PowerZip Compression / Extraction Wizards make working with archives (such as Zip files) easy while providing an array of advanced features. The Wizards are quick to use because they have only a small number of steps; some steps can be switched of if not needed, others can be skipped to use default | |||
Updated: 9, 2005 | Rating: 124 | Author: Dimitri Ternovski | Size: 1920 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
43. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
44. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
Password Expert is a security software program that lets you restrict access to the folders that contain your sensitive data. Secure your documents to prevent people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | DigiSecret 2.0 (tamos.com) | ||
being intercepted. DigiSecret also includes Message Encryption Center that allows you to encrypt/decrypt plain text messages and send them via e-mail. DigiSecret also takes care of permanently erasing files or folders that you wish to remove. The files are deleted and overwritten several times to eliminate every possibility of recovering the information. DigiSecret was | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
any feature of avast!, prepare and run tasks, store and check task's results. On Access Scanner - special providers to protect: the most of available E-mail clients, Instant Messaging - ICQ, Miranda etc., Network traffic - Intrusion Setection - lightweight firewall, P2P protection for | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
47. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
50. | Visual Web Task 4.0 (lencom.com) | ||
You can teach your spider how to negotiate logins , proxies and security pages to download and extract what You need - files , emails , search results. One spider can invoke another and this let You create a spider to meet ANY complication level. The tool is completely visual and there is no need to be a programmer to use it. The product uses Internet explorer as web engine so | |||
Updated: 9, 2005 | Rating: 62 | Author: Vlad Melamed | Size: 4000 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
51. | IglooFTP PRO 3.9 (iglooftp.com) | ||
through the Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1), and Stanford SRP protocols, MD4/MD5 encrypted passwords, persistent downloads, scheduled transfers, advanced FTP operations, server-to-server transfers, full transfer resume, Remote Directory Caching, URL clipboard monitoring, enhanced Firewall support, Drag & Drop, and more. Award winning FTP Client | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Marc Jacquet | Size: 2240 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
52. | Form Mail: eMail Form Processor Pro 3.2 (mitridat.com) | ||
per invocation. Environment Settings (i.e. current time, user's host name etc.) may be included in the templates. Can check that entered data matches a particular format - i.e. all digits, a syntactically correct e-mail address, letters only, etc. Security measures include you being able to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Koldirkaev | Size: 130 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
53. | ArtistScope CD 2.0 (artistscope.com) | ||
similar to a mini web server and run from anywhere, from the user's hard-drive or CD. Almost anything that you can run on your web site can be run on ArtistScope CD. With a few link modifications to your existing web site, it could be run from CD or downloaded to the end user to run on their computer | |||
Updated: 9, 2005 | Rating: 101 | Author: William Kent | Size: 3943 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
54. | Atelier Web Ports Traffic Analyzer 2.32 (atelierweb.com) | ||
* Real-time mapping of ports to processes (applications and services)! * History since boot-time of all TCP, UDP and RAW ports open through Winsock and respective mapping to processes! * Log since boot-time of data sent and received (up to 500 MB) by above ports! * Sophisticated archiving feature allowing | |||
Updated: 9, 2005 | Rating: 16 | Author: Jose Pascoa | Size: 4497 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
55. | CryptoHeaven 2.5.2 (cryptoheaven.com) | ||
and friends accross networks and firewalls with very high level of security without a need for expensive VPN, PKI or complicated network administration, setup and maintainance. Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management | |||
Updated: 9, 2005 | Rating: 43 | Author: Marcin Kurzawa | Size: 10413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
56. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
57. | SecureCode 2.0 (aidsoft.com) | ||
based on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use as additionnal protection with you current registration scheme.The | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
58. | TreePad SAFE 7.1.4 (treepad.com) | ||
Manager (PIM) and database, password protected, with high-security 256bit TwoFish encryption, Word Processor, Web site Generation on the fly, photo album, shortcuts-, notes-, hyperlinks-, addresses-, and collections-Organizer, Documentation Tool, and much more! Widely imitated, TreePad is an Award winning, highly intuitive, powerful application, yet awesomely small: runs also | |||
Updated: 9, 2005 | Rating: 0 | Author: Henk Hagedoorn | Size: 3833 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
59. | PDF to Text (pdf2text) SDK-COM 3.0 (globalpdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 48 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
60. | WatchetBurn! 2.72 (watchetsoft.co.uk) | ||
can choose to modify the SQL yourself. We've specialised in data security for blue chip companies for 20 years. One banking client said 'Your software's boring - it just works !' We take that as a compliment. Now introducing WatchetBurn! - powerful, secure, simple Windows software for the programmer, home and office user. Runs under Windows 9x and later. Supports all | |||
Updated: 3, 2005 | Rating: 0 | Author: Colin Balkham | Size: 5711 kb | Shareware Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|