|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
1. | Aloaha PDF Suite 2.1.264 (aloaha.com) | ||
high costs - Communicate across operating systems - Maintain security for confidential material - Preserve content integrity – keep fonts, images and layout intact - Letterhead or Watermark imposition - direct Image 2 PDF Conversion - batch prints your existing PDF - batch converts, signes your files into PDF - hotfolder support for autoprint, autosign, batchsign and PDF | |||
Updated: 3, 2006 | Rating: 435 | Author: Aloaha Software | Size: 8789 kb | Commercial Go to category: System Utilities > Printer Similar programs | |||
2. | Fastream NETFile FTP/Web Server 8.2.1 (fastream.com) | ||
959, 1579, 2389, mlst, ftpmd5 with optional FXP disabling for extra security and anti-hammering for FTP hack prevention Bandwidth limits for web domains at user granularity with separate settings for upload and download Virtual File System (VFS) feature for serving all network drives from a single IP | |||
Updated: 3, 2006 | Rating: 111 | Author: Gorkem Ates | Size: 3633 kb | Freeware Go to category: Servers > FTP Servers Similar programs | |||
3. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 322 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
4. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
5. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
(VCL edition) is the comprehensive component collection for Internet security. Unlike other components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
6. | Search and Recover 3.0d (iolo.com) | ||
calendars, contacts, notes, and tasks in MS Outlook - Bonus security features allow you to quickly and securely delete ANY existing file or folder on your system, keeping private data away from other recovery tools and thereby out of unwanted hands. - Eliminates the need to go to backups when data is accidentally lost - Create and work with emergency disk images Create an exact | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
7. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | BB EAP 5.38 (bbsys.com) | ||
referrals. User action tracking based on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
9. | Message Parse 3.12 (cypressnet.com) | ||
An email processing utility, that provides an easy, and effective way to transfer data from email to other applications. MsgParse exports data from your email messages to user defined customized flat files, that can be used to import to other applications such as database and spreadsheet programs. This is a | |||
Updated: 2, 2006 | Rating: 0 | Author: James Hall | Size: 5231 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
10. | APS Accounting & Stock Control 1.1.6.0 (advanced.servehttp.com) | ||
control features with deferent types of transactions such as Cost Centers, General Vouchers, Reciept & Payment Vouchers and wide range of reports such as general ledger, profit and loss, trial balance, statement of accounting, Taccounts and balance sheet and a complete Stock Control features such Item | |||
Updated: 2, 2006 | Rating: 42 | Author: yasser almohanna | Size: 24700 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
11. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
for response, and just disconnect. And all of it fully automated. It's suitable for many environments, such as ASPx. When you're unsure when to send actual command, wodSSH.NET may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent command | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
12. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
13. | wodSSH 2.3.7.0 (weonlydo.com) | ||
It also supports blocking and non-blocking operations, thus it's suitable for many environments, such as ASP. Using WaitFor and Execute methods, it will behave just like expect command known from UNIX systems. When you're unsure when to send actual command, wodSSH may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
14. | Casino Solei 2006 V (best-on-line-casinos.com) | ||
around the globe CasinoSolei.com has established a "Customer Service Center" in San Jose, Costa Rica offering chat, email and toll free phone services to their global clientele. To compliment their experienced team CasinoSolei.com purchased software from industry leaders, Playtech | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
15. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
16. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
17. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
18. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
19. | Advanced Desktop Shield 1.63 (softstack.com) | ||
Desktop Shield - security utility is a must for public access PCs located in school or university labs, Internet cafes, libraries and other public places where you need to stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. With Advanced Desktop Shield you can backup, restore and manage | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | VisNetic MailServer 8.3.5 (deerfield.com) | ||
easy-to-use administration console with unmatched mail server security, speed, and scalability. VisNetic Mail Server features support for Sender Policy Framework (SPF) and Spam URI Realtime Blocklists (SURBL). Instant Anti Spam is a complete spam filtering solution built into VisNetic Mail Server. Instant Anti Spam combines the most effective anti spam technologies into one | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
21. | Active Scripting Fast Disable 1.5 (sparkleware.com) | ||
Explorer's Active Scripting "feature" is responsible for popup windows, scrolling status bar text, security holes, and other annoyances. Unfortunately, some websites require this technology for basic navigation, so permanently disabling Active Scripting is an impractical solution. The "Enable/Disable Active Scripting" option is normally buried deep in the Windows Control | |||
Updated: 2, 2006 | Rating: 149 | Author: Chris Marshall | Size: 580 kb | Shareware Go to category: Network & Internet > Ad Blockers Similar programs | |||
22. | SecureBlackbox (ActiveX/DLL) 4.2 (secureblackbox.com) | ||
edition) is the comprehensive component collection for Internet security. SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you | |||
Updated: 2, 2006 | Rating: 0 | Author: EldoS Corporation | Size: 4127 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
23. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how thatâ??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
24. | ShopAssist Point Of Sale System 4.92 (users.iafrica.com) | ||
Cashier Statistics. Over three hundred reports and charts. Security Five levels of password protection for its various modules and functions. Audit trail of all transactions. Integrated data backup and recovery. Network Up to two hundred terminals per server. Multi-Store Inter-Branch Transfers. Consolidated Sales, Consolidated Stockholding, Branch Orders. Tools | |||
Updated: 2, 2006 | Rating: 16 | Author: Ivan Smith | Size: 16796 kb | Shareware Go to category: Business > Other Similar programs | |||
25. | My Notes Center 1.4.3 (mynotescenter.com) | ||
necessary information and how to manage the data stored. My Notes Center is an e-organizer and personal information manager jam-packed with features like an overstuffed sandwich. It stores personal notes, e-mails, web links, phone numbers, addresses, even credit card numbers safely and securely. Use | |||
Updated: 2, 2006 | Rating: 0 | Author: Dmitry Bobrik | Size: 1873 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
26. | Air Messenger LAN Server 6.7.6 (internetsoftwaresolutions.org) | ||
investment for companies that run a large sales force or dispatch centers. All sales people or dispatchers can send pages through one network computer without the need to supply each computer with a phone line or modem. The Air Messenger Server can maintain company wide group and user lists which can be broken down to departments, detailed message and transfer logs, and | |||
Updated: 2, 2006 | Rating: 64 | Author: Steve Hardt | Size: 26042 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
27. | TreePad Business Edition 7.2 (treepad.com) | ||
intuitive and versatile, including: Password-protection and high-security Encryption, Spell Checker (20+ langs.), Thesaurus, multi-Lingual Editions, Photo Album, Website Generation with dynamic tree, image-converter, Presentation mode, documentation-, shortcuts-, hyperlinks-, addresses-, passwords and | |||
Updated: 2, 2006 | Rating: 25 | Author: Henk Hagedoorn | Size: 4074 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
28. | m9P Phonebook2 2.1 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. This phonebook manager provides you with an easy way to store and retrieve your contacts information. m9P Phonebook2 can handle multiple phonebook databases and is capable of exporting a database to a web form for use on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 11348 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
29. | m9P Database 1.2 (mental9Production.com) | ||
by a password and by users' privileges which enhances database security. This program has also built-in transactional support, allowing the user to roll back the database to a previous state. m9P Database has a variety of useful and unique features. Among these are the ability to export a database for use on a Web site and logging of all database activities to a file. This | |||
Updated: 9, 2005 | Rating: 51 | Author: Khaled Aboulhosn | Size: 12566 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
30. | m9P Zipper X 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. Special Offer: click Buy Now button on this site to buy the software directly from RegNow and receive 30% discount! m9P Zipper X is a simple file compression (zipping) & decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4423 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
31. | m9P Zipper XT 1.0 (mental9Production.com) | ||
is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information. m9P Zipper XT is a user-friendly heavy-duty file compression (zipping) and decompression (unzipping) tool. It is specifically designed to handle zipping and unzipping using the [.zip] format. m9P Zipper XT outputs very small zipped | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4326 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
32. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
34. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
35. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 16 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
files layout. You can use one or more passwords.Many additional security options are available. For more information visit http://www.htmlguardian.org http://www.htmlguardian.org. HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
37. | ApoServer 1.0 (aposoft.ru) | ||
to several roles being performed in parallel by using ApoServer's facilities: Business Analyst. The Business Analyst collects the work of the HTML Designer and the Java/C++ specialist into real business scenarios. He also can describe business rules in "hidden" templates. These steps form a final e-commerce scenario called a pipeline. Database Developer. Creates Database structure | |||
Updated: 9, 2005 | Rating: 0 | Author: ApoSoft team | Size: 3186 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
38. | Engineers Edition 5.2 (solarwinds.net) | ||
months or years. You can use the SNMP BRUTE FORCE ATTACK to test security on your community strings. With the NETWORK MONITOR application you can to keep you thumb on the pulse of your network and receive immediate alerts to your digital phone if a server or router fails. The Complete set includes: Advanced Subnet Calculator, Bandwidth Monitor, Bandwidth Gauge, Brute Force Attack | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
39. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
40. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
41. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
42. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
is ideal for monitoring convenience stores, gas stations, day care centers, retirement facilities, hospitals, laboratories, commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
43. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
45. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
46. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Undelete Server and Professional 4.0 (execsoft.com) | ||
How valuable is the data on your servers and PCs? What if you or your users lost a critical accounting file, a major report, or even digital snapshots of the family? The Windows Recycle Bin doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
48. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Center Manager (SCM) – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
50. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Core Manager – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|