|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
61. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
and up-to-date protection against emerging spyware. Spy Sweeper’s advanced removal engine deletes the toughest spyware programs - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats - which are specifically designed to avoid detection and removal. This | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
62. | Webroot Window Washer 6.0 (webroot.com) | ||
and Netscape. Window Washer includes bleach technology as an added security measure. Bleach completely overwrites files, making recovery impossible. This enhanced version also cleans up hard disk free space to remove evidence of your deleted files. Maintain your preferred Internet settings and log-ins | |||
Updated: 9, 2005 | Rating: 0 | Author: Webroot Software | Size: 2700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
63. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | ZCuretIT 1.2.4.1 (zcureit.com) | ||
have done everything you can to protect your data. For you it's as easy as selecting the file, entering the password, selecting the output destination, and pressing a button to create a self-extracting and self-decrypting executeable. For the recipient, it's as easy as entering the password, pressing the Open button, and the the application automatically opens up in the | |||
Updated: 8, 2004 | Rating: 0 | Author: Ken Myers | Size: 892 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
65. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
66. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how thatâ??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
67. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
68. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
69. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
70. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
71. | Norton Internet Security 2004 (nct.symantecstore.com) | ||
Norton Internet Security 2004 provides essential protection from viruses, hackers, and privacy threats. Powerful yet easy to use, this award-winning suite now includes advanced spam-fighting software. Viruses are a daily threat, so Norton Internet Security gives you the world’s most trusted antivirus solution. Norton AntiVirus removes viruses from email | |||
Updated: 9, 2005 | Rating: 47 | Author: Jennifer Leonard | Size: 35100 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | PocoMail 4.0 (pocomail.com) | ||
A powerful email program that does not compromise your privacy or security. The streamlined interface never gets in your way, with many unique features that allow you to conquer your mailbox: fast searches, full-page preview, Bayesian | |||
Updated: 2, 2006 | Rating: 0 | Author: Slaven Radic | Size: 3836 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
73. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
75. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
76. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
77. | WatchetBurn! 2.72 (watchetsoft.co.uk) | ||
can choose to modify the SQL yourself. We've specialised in data security for blue chip companies for 20 years. One banking client said 'Your software's boring - it just works !' We take that as a compliment. Now introducing WatchetBurn! - powerful, secure, simple Windows software for the programmer, home and office user. Runs under Windows 9x and later. Supports all | |||
Updated: 3, 2005 | Rating: 0 | Author: Colin Balkham | Size: 5711 kb | Shareware Similar programs | |||
78. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
79. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
80. | wodSSH 2.3.7.0 (weonlydo.com) | ||
It also supports blocking and non-blocking operations, thus it's suitable for many environments, such as ASP. Using WaitFor and Execute methods, it will behave just like expect command known from UNIX systems. When you're unsure when to send actual command, wodSSH may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
81. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
for response, and just disconnect. And all of it fully automated. It's suitable for many environments, such as ASPx. When you're unsure when to send actual command, wodSSH.NET may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent command | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
82. | APS Accounting & Stock Control 1.1.6.0 (advanced.servehttp.com) | ||
control features with deferent types of transactions such as Cost Centers, General Vouchers, Reciept & Payment Vouchers and wide range of reports such as general ledger, profit and loss, trial balance, statement of accounting, Taccounts and balance sheet and a complete Stock Control features such Item | |||
Updated: 2, 2006 | Rating: 42 | Author: yasser almohanna | Size: 24700 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
83. | Cornolius Database Application 1.4.300 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card. Cornolius Database Application is a stand-alone multi-user program for building databases. It enables you to build databases based on primary-foreign key stucture. It is equipped with a database wizard to help you build your databases with | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 12093 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
84. | m9P Phonebook2 2.1 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. This phonebook manager provides you with an easy way to store and retrieve your contacts information. m9P Phonebook2 can handle multiple phonebook databases and is capable of exporting a database to a web form for use on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 11348 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
85. | m9P Database 1.2 (mental9Production.com) | ||
by a password and by users' privileges which enhances database security. This program has also built-in transactional support, allowing the user to roll back the database to a previous state. m9P Database has a variety of useful and unique features. Among these are the ability to export a database for use on a Web site and logging of all database activities to a file. This | |||
Updated: 9, 2005 | Rating: 51 | Author: Khaled Aboulhosn | Size: 12566 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
86. | m9P Zipper X 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. Special Offer: click Buy Now button on this site to buy the software directly from RegNow and receive 30% discount! m9P Zipper X is a simple file compression (zipping) & decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4423 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
87. | m9P Zipper XT 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. m9P Zipper XT is a user-friendly heavy-duty file compression (zipping) and decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the [.zip] format. m9P Zipper XT outputs very small zipped | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4326 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|