|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
211. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
212. | FitoNT 1.0.0.0 (netnet.ca) | ||
WRONG....In today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
213. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
214. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
215. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
216. | Folder Password Expert 2.1 (folder-password-expert.com) | ||
Password Expert is a security software program that lets you restrict access to the folders that contain your sensitive data. Secure your documents to prevent people from viewing, printing, or altering them. The folder can be protected simply by right-clicking on it within Windows Explorer. Folder Password Expert will both secure your folders against accidental deletion and | |||
Updated: 9, 2005 | Rating: 0 | Author: Olaf Laturner | Size: 846 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
217. | Folder Protection 2.1 (folder-protection.com) | ||
Protection is security software that lets you control access to your folders. Secure your documents to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. If the drive is connected to another PC, your folders still remain protected. Folder Protection is ideal for | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Cadwallen | Size: 786 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
218. | Folder Security 2.5 (folder-security.com) | ||
Security is a software program designed to password-protect folders. It lets you prevent people from viewing, printing, or altering your confidential documents. Folders remain protected should your PC be rebooted into Windows Safe Mode or DOS. A nice feature is the ability to include a password hint. Choose something sensible and it will prompt you to remember your password | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicole Collet | Size: 755 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
219. | Folder Shield 2003 1.3 (baxbex.com) | ||
the selected data disappear. Folder Shield vastly increases the security of your PC, while at the same time being so simple and very convenient to use. Folder Shield is multilingual and supports: English, Spanish, German, French, Italian, Portuguese (Brazil), Swedish, and Danish Folder Shield enables you to make folders completely invisible. Just specify all confidential folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
220. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
221. | FolderSafe 2.1 (occultsoft.com) | ||
is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
222. | Free Internet Eraser 2.05 (privacyeraser.com) | ||
Internet Eraser is an Internet privacy software that protects your Internet privacy by permanently erase internet history and past computer activities. Even though, many of the tasks can be performed manually, Free Internet Eraser can automate this process for you. Free Internet Eraser allows you to erase history, erase Internet history, internet cache, cookies, address bar search | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Kent | Size: 852 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
223. | Gazillionaire Deluxe (lavamind.com) | ||
Gazillionaire is the award winning game of business strategy. It was selected as a FINALIST in the Ziff-Davis Shareware of the Year Awards and was ranked in the Top 5 of all strategy games. Gazillionaire is a cross between Monopoly set in outer space and Wall Street in wonderland. It is a wild, intergalactic | |||
Updated: 9, 2005 | Rating: 42 | Author: LavaMind Productions | Size: 5576 kb | Shareware Go to category: Games & Entertainment > Simulation Similar programs | |||
224. | GDS 2000 PRO 1.06 (aidsoft.com) | ||
2000 PRO is incontestably the software you need to manage your service calls. It allows you to follow efficiently your service calls and keep the history of all the problems and solutions encountered. No matter the field of activity of the organization you work for, GDS 2000 PRO will fit your needs for managing efficiently your service calls for all your customers whether they are | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales department | Size: 8346 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
225. | GemTracker Pro 2.1.21 (goldcalculator.com) | ||
stones processing management software. Keeps track of your memos, repairs, recuts, roughs and purchases from start to finish. Maintains a Administrator defined custom gem inventory database over searching, sorting and editing your gem inventory. Includes a built in image viewer with the ability to view and attacth gem pics and lab certifications to your inventory records which will | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Cascio | Size: 13878 kb | Shareware Go to category: Business > Other Similar programs | |||
226. | General Knowledge Base 2.2 (baltsoft.com) | ||
Knowledge Base is an innovative Knowledge Management software allowing an easy and effective management of all types of knowledge bases. With its intuitive user interface, it is easy to create, capture, and store in one location all types of documents and files and have fast retrieval when required. To improve knowledge sharing, it provides an easy access to an organization's | |||
Updated: 2, 2006 | Rating: 42 | Author: Tomas Rutkauskas | Size: 7323 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
227. | GetAnonymous 1.2 (getanonymous.com) | ||
of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to end the | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
228. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Windows applications, focused on enhanced reliability, stability, security and performance. Adobe, Xerox, NEC, Intel and many other companies rely on Ghost Installer Studio to create installations for their top notch software products. Designed to meet high-end expectations of installation technology, Ghost Installer Studio 3.7 offers full support for Microsoft's | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
229. | go1984 3.0.3.6 (logiware.de) | ||
and problem-free video surveillance and recording. The easy to use software with varied functions at an absolutely competitive price sets a new standard for the software industry. The function range of go1984 contains everything, which is required for professional video surveillance. This includes for example: - Live-Monitoring - Recording (timer controlled, motion | |||
Updated: 9, 2005 | Rating: 1029 | Author: Ralf Kronemeyer | Size: 7443 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
230. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
231. | gReg 4.55 (gitanosoftware.com) | ||
many people want your software, some are thieves. Don't take that chance, protect your work! gReg armors your software against thieves-and safeguards your revenues. Our protection is bulletproof! Our competitors offer only simple software licensing and authorization. gReg out-strips the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
232. | GRL RealHidden 1.0 (grltechnology.com) | ||
RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
233. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
Personal Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
234. | hCrypt 3.0 (raysion.com) | ||
applications and more. hCrypt is a member of the family of Raysion security and content management tools that includes other specialized tools (code optimization utility hTune and security tool hWard) and a multifunctional software Advanced HTMLCoder. hCrypt helps you restrict access to non-public Web pages by encrypting them and setting the access password. The program | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
235. | HeadStrong WebClicker 2.56 (headstrong.de) | ||
as well. Server administrators have to be aware of this heavy security hole, as customers may use this program to earn hundreds of dollar a month! You as a server administrator and software developer have the opportunity now to test your own servers to improve protection. uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and | |||
Updated: 9, 2005 | Rating: 0 | Author: Moritz Bartl | Size: 650 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
236. | Help Desk Software - Service Log for Access 3.1 (icon.co.za) | ||
workshop, or awaiting parts are automatically set to "On Hold" · Security ensures that only logs assigned to individual technicians can be viewed by them. · Provides a flexible workflow. · Your customers are kept informed as to the progress of reported faults, with emails being sent to confirm: · That the fault has been logged, and the details · Quotations (approved or | |||
Updated: 9, 2005 | Rating: 0 | Author: Nic Martens | Size: 10107 kb | Shareware Go to category: Business > Other Similar programs | |||
237. | Hide & Protect any Drives 2.01 (softstack.com) | ||
of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media. Protect Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives. Stop unauthorized software installations and data leak by removable | |||
Updated: 2, 2006 | Rating: 244 | Author: IM Soft | Size: 764 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
238. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
239. | Hot Corners 2.3 (southbaypc.com) | ||
This is particularly useful when you need to ensure you privacy and security when you are away from your | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 185 kb | Shareware Go to category: Desktop > Similar programs | |||
240. | HTML Guard 2.32 (aw-soft.com) | ||
you should have a look at HTML Guard. Among other features this software lets you encrypt your HTML source code and disable the right mouse button, text selection and the print function within a browser. Put an end to copying and modification of your HTML code, images and text by others thus protecting your copyright. While not offering absolute security, the combination of | |||
Updated: 2, 2006 | Rating: 0 | Author: Andreas Wulf | Size: 1057 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|