|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
1. | CSSS Video 2.1 (HTTP:) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? CSSS – Computer Security System with motion detection by WEB - camera. The principle of action bases on WEB-camera real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 3005 kb | Demo Go to category: Home & Hobby > Personal Interest Similar programs | |||
2. | NET Video Spy 2.0 (HTTP:) | ||
to create your own video-surveillance system. The idea behind this software is about using hardware already available at your disposal for creating cost-effective video-surveillance solutions. Save your money and nerve! Compare our software prices to dedicated hardware video-surveillance systems | |||
Updated: 2, 2006 | Rating: 142 | Author: Victor Sarbash | Size: 5859 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
3. | Task Manager 2005 (orbisoft.com) | ||
Orbisoft's top-rated Task Manager 2005â„¢ task management software to get organized and manage all your team's jobs and tasks effortlessly. Task Manager 2005 can be used personally or in a team environment to track personal and shared tasks, jobs (including customer jobs) and projects. Get a quick-view of all your tasks, guard against missed deadlines, balance workloads automatically | |||
Updated: 9, 2005 | Rating: 42 | Author: Orbisoft Development | Size: 15088 kb | Demo Go to category: Business > Project Management Similar programs | |||
4. | PyramexServer 2.0 (pyramex.com) | ||
server redundancy, multiple domain support, and much more. Our software is completely written in Java to allow complete multi-platform support yet maintain a powerful server environment. The server is designed to out-perform all of its competition by exceeding performance standards as well as introducing extended features that make it the final e-mail server solution for your | |||
Updated: 3, 2005 | Rating: 0 | Size: 28883 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
5. | Air Messenger LAN Server 6.7.6 (internetsoftwaresolutions.org) | ||
Access number, IP restrictions, and client logon are added for security control. Requires the use of Air Messenger Client to use all features but will accept SNPP connections from any SNPP Compliant Alphanumeric Paging Software. Client fully support the ETAP protocol for delivery confirmation and message updating when used with supporting terminals. Features: SNPP | |||
Updated: 2, 2006 | Rating: 64 | Author: Steve Hardt | Size: 26042 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
6. | eBookSnap Ebook Creator Software 1.2 (ebooksnap.com) | ||
at zero cost. Create unlimited number of ebooks, add content security function, so you have total control over which pages of your ebook people may access. You can password-protect one, ten or all of your pages (such as with unregistered users). You can also add an expiry date or disable your book after a given number of days or views.Your book is compatible with Flash, Quicktime | |||
Updated: 3, 2005 | Rating: 42 | Author: Konrad Kasior | Size: 1200 kb | Demo Go to category: Business > Other Similar programs | |||
7. | eResponse 6.1.3 (bonafide.com) | ||
order fulfillment, customer service and inventory management software for small to medium size online stores and mail order operations. Easily export inventory information to multiple online stores such as; Store.net, Yahoo Store, Half.com, Nextag.com, Amazon.com and integrate to existing online stores. Import customer orders directly from these stores eliminating double entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
8. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
Button Sales Totals & Reports, On the Fly Inventory Entry, Password Security, Quotes, Rentals, Inventory Control, Billing, Mailing Lists, Terms, Invoicing, Packing Slips, Automatic Sale Discounts and more. Import and export products, customers list and sales information. Send/Email all | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
9. | JD Punch Clock 2.63 (employeepunchclock.com) | ||
run on a MS Access or SQL Server Database giving you the added security to know that your information in safe from missed indexes, deleted text files, and prying eyes. JD Punch Clock is designed with you and your business in mind so whether you have 5 or 5,000,000 employee's we have a solution to fit YOUR needs. Unlike other applications JD Punch Clock understands that your data is | |||
Updated: 9, 2005 | Rating: 82 | Author: John Spiker | Size: 4370 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
10. | MICR Font Set 3.4 (micrfonts.com) | ||
fonts come in Windows TrueType and PostScript formats. Note: Optio software users need our LaserJet PCL version, not the TrueType version. Print your own checks from Windows, using any laser printer! You get our MICR fonts (which include the numbers 0 - 9, On-Us, Transit, Amount, and Dash), a calibration program, and our Secure Fonts used in printing check amounts and payee | |||
Updated: 2, 2006 | Rating: 16 | Author: Gary Elfring | Size: 1166 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
11. | MobiManager for Nokia Phones 1.3 (mobimarketing.com) | ||
valuable data again! Edit and backup your phonebook, view hidden security features, create your own logos and funky ringtones. MobiManager is the easy-to-use software for creating phone logos, ringtones, startup images and screensavers. Use it to backup and restore your phonebook, edit names, send SMS messages and reveal hidden security features. If you use a Nokia | |||
Updated: 9, 2005 | Rating: 138 | Author: Mike Bradley | Size: 779 kb | Demo Go to category: Home & Hobby > Personal Finance Similar programs | |||
12. | Print Studio ID Badge Maker Software 2E (jollytech.com) | ||
Studio ID badge maker software provides everything you need to design and print ID cards. Whether you are using paper badges, or PVC cards with magnetic stripes, printing single sided badges or double sided ID cards, using a laser or plastic card printer, Print Studio ID badge maker software will do it all! By including a standalone networkable database feature as well as | |||
Updated: 9, 2005 | Rating: 42 | Author: Jolly Technologies | Size: 15625 kb | Demo Go to category: Business > Other Similar programs | |||
13. | Print Studio Photo ID Card Software 2E (jollytech.com) | ||
Studio photo ID card software provides everything you need to design and print ID cards. Whether you are using paper badges, PVC cards with magnetic stripes, printing single sided badges or double sided ID cards, using a laser or plastic card printer, Print Studio photo ID card software will do it all! By including a standalone networkable database feature as well as one-click | |||
Updated: 9, 2005 | Rating: 16 | Author: Jolly Technologies | Size: 15625 kb | Demo Go to category: Business > PIMS & Calendars Similar programs | |||
14. | SIGNS 6.12 (rad2themax.com) | ||
is a feature-rich, customizable software package designed for SERIOUS investigative professionals. From dispatch through incident reporting, case management to extensive administrative reports, S.I.G.N.S. will not only AUTOMATE your work flow, but give you the tools you need to ANALYZE trends so you can do more than react - you can PRO-ACT, because S.I.G.N.S. gives you the data | |||
Updated: 3, 2005 | Rating: 55 | Author: Paul Pleasant | Size: 22648 kb | Demo Go to category: Business > Databases & Tools Similar programs | |||
15. | TradingSolutions 3.1 (tradingsolutions.com) | ||
is a financial analysis software package that combines traditional technical analysis with state-of-the-art artificial intelligence technologies. Use any combination of financial indicators in conjunction with advanced neural networks and genetic algorithms to create remarkable effective end-of-day or real-time trading models for the stock, futures and forex markets | |||
Updated: 9, 2005 | Rating: 0 | Author: NeuroDimension Incorporated | Size: 58568 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
16. | Alkonost ContraCopy 3.00 (contracopy.com) | ||
ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable | |||
Updated: 9, 2005 | Rating: 36 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
17. | Codelock 2.0 (codelock.co.nz) | ||
an optional expiry time. Codelock is an easy to use, full-featured software encryption solution for PHP and HTML scripts. Codelock V2.0 works by encrypting your entire PHP page(s) (including HTML and Javascript). You simply browse your computer harddrive for your file(s) or specify your server path | |||
Updated: 9, 2005 | Rating: 101 | Author: Vince Edwards | Size: 279 kb | Demo Go to category: Development > Other Similar programs | |||
18. | Cryptocx v5 5.1.6 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
19. | Cryptocx v6 6.1.3 (easybyte.com) | ||
to add further powerful features in a very easy to use bundle. Data security is becoming more and more important, with developers wanting to add secure data encryption facilities to their programs and web sites. The versatility of Cryptocx, combined with the fastest file encryption available anywhere, full PGP support and the ability to create Self Decrypting Archives (SDA), makes | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
20. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Windows applications, focused on enhanced reliability, stability, security and performance. Adobe, Xerox, NEC, Intel and many other companies rely on Ghost Installer Studio to create installations for their top notch software products. Designed to meet high-end expectations of installation technology, Ghost Installer Studio 3.7 offers full support for Microsoft's | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
21. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
This allows you to control where registered versions of your software are installed. KeyedAccess will let you set multiple "locks" so your application can be unlocked using keys generated for the current version of your software, for previous versions, or for all versions of your software (i.e.: A "master key"). A separate database file is provided to generate | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
22. | IDAutomation MICR Font Advantage 4.9 (bizfonts.com) | ||
with your printer, (2) MICR print specifications documentation, (3) Security Fonts for printing secure names and amounts plus (4) a Visual Basic source code example of printing a bank check. Compatible with Windows, Pocket PC, Macintosh, UNIX, Linux and others. TrueType, PostScript and PCL laserjet | |||
Updated: 9, 2005 | Rating: 0 | Author: Technical Support | Size: 2398 kb | Demo Go to category: System Utilities > Other Similar programs | |||
23. | BackRex Mail Backup 2.5 (backsettings.com) | ||
customizations including favorites, proxy settings, dialup accounts, security settings, history, and other. BackRex Mail Backup can help you to migrate all your mail and program settings from one computer to another, even with different versions of Windows (for example from Windows 2000 to Windows XP | |||
Updated: 9, 2005 | Rating: 126 | Author: BackRex Software | Size: 651 kb | Demo Go to category: Communications > Other E-Mail Tools Similar programs | |||
24. | Encrypt HTML source 2.03 (encrypt-html.com) | ||
source will also keep away all web content filters and other censor software - they will not be able to analyze your web site and block it - this may increase the number of visits to your site several times.To read more visit http://www.encrypt-html.com http://www.encrypt-html.com. Encrypt HTML, password protect web site. ASP,SHTML,JavaScript,VBScript,CSS source code encryption. Web | |||
Updated: 9, 2005 | Rating: 128 | Author: Robert Davies | Size: 2092 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
25. | Eyes&Ears 1.8 (intech2.com) | ||
monitored for motion by the 'Standard' or 'Plus' versions of the software. Demo is full-featured, but capture sessions are limited to 15 minutes. Price $69.95. Or try Eyes&Ears Lite for $49.95. Same great software but without SMTP & FTP file transfers. A audio/video surveillance application that supports motion/sound sensing with SMTP and FTP support as well as support for | |||
Updated: 8, 2004 | Rating: 124 | Author: Kevin Crawford | Size: 2428 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
26. | Internet Access Scheduler 2.0 (winutility.com) | ||
Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
27. | MDaemon 8.1.4 (files.altn.com) | ||
, Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs. MDaemon features include top-notch antispam security features; seamless integration with AntiVirus for MDaemon plug-in; built-in groupware functionalities for sharing folders, tasks, contacts, and | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
28. | MyPrivacy 5.5.3 (omniquad.com) | ||
your tracks. MyPrivacy, a new free software from Omniquad is a privacy tool that helps you maintain your privacy by cleaning up all traces of your Internet and PC activities. It helps you erase data you may have entered like personal information in online forms, Urls in your browser address bar, files you searched for, etc. Data that otherwise would be exposed to other users of | |||
Updated: 2, 2006 | Rating: 82 | Author: Daniel Sobstel | Size: 7824 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
29. | PC Tattletale Parental Control & Surveillance Software 7.4.01 (pctattletale.com) | ||
parental control software & Internet monitoring software captures everything your child does online; what they see, where they go & even who they talk to! This easy to use Internet monitoring & parental control software makes it easy to help protect your children when they go online, use instant messaging, chat rooms or anytime children are online. PC Tattletale | |||
Updated: 8, 2004 | Rating: 0 | Author: Don Schnure | Size: 230134 kb | Demo Go to category: System Utilities > Other Similar programs | |||
30. | BackRex Expert Backup 2.5 (backsettings.com) | ||
vulnerability! Imagine what would happen to your life if your social security data gets lost due to hardware crash… What would have happened to Tolstoy if he'd have lost his WarAndPeace.doc due to hard drive failure? Psychiatrists around the globe have already reported numerous hysteria and suicidal | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
31. | CSSS 2.2 (sarbash.com) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The principle of action bases on microphone (microphones) real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
32. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
33. | lock and go 1.0 (aidsoft.com) | ||
(lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to potential media theft. That is why lockngo is the perfect companion for your portable | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
34. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
35. | SpeedUpMyPC 2.04 (lidownloads.com) | ||
award-winning and leading software utility that automatically optimizes and maximizes the performance of all computers within minutes. SpeedUpMyPC automatically fine-tunes all your resources including hardware, system settings and internet usage to operate at peak performance at all times. Your PC will instantly become faster, cleaner and more stable. Even with the latest | |||
Updated: 9, 2005 | Rating: 101 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: System Utilities > Benchmarking Similar programs | |||
36. | System Protector 1.9 (aidsoft.com) | ||
Some of the program options are:Customize your Control-PanelCustomize Display PropertiesHide/customize Network settingsCustomize Start MenuHide all drives in Control Panel (A:\, C:\, D:\)Customize your Video AdapterCustomize your Active DesctopChange Computer Owner InformationChange Windows Installation | |||
Updated: 9, 2005 | Rating: 0 | Author: Dimitar Terziev | Size: 1 kb | Demo Go to category: System Utilities > Other Similar programs | |||
37. | Thinstall Studio 1.94 (aidsoft.com) | ||
file that is able to run directly without decompressing to disk. Software Developers can use Thinstall to protect and hide their data files from prying eyes, prevent disassembly of their EXE or DLL files, and create "no installation required" distributions of their software applications | |||
Updated: 9, 2005 | Rating: 16 | Author: Jonathan Clark | Size: 1327 kb | Demo Go to category: System Utilities > Other Similar programs | |||
38. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
39. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. WinTasks 5.0 Professional provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance. The award-winning | |||
Updated: 9, 2005 | Rating: 42 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
40. | xSharez scanner 3.0 (tools-for.net) | ||
for both network administrators and users interested in the network security issues. This software will help you to solve one of the most serious problems of all modern computer networks - unauthorized data access using NetBIOS/SMB protocol. What xSharez Scanner can do for you: - Audit B and | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
41. | CCSA practice tests. 1.2 (simulationexams.com) | ||
CCSA certifications: The CheckPoint® Certified Security Administrator (CCSA) certification is designed as a foundation level certification. A CCSA is knowledgeable about installation, and configuration, and administration of CheckPoint® VPN-1/FireWall-1. Practice tests for CheckPoint® CCSA conforms to the objectives of CCSA 2000. The package contains 3 tests and most questions | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3176 kb | Demo Go to category: Education > Other Similar programs | |||
42. | iNet+ Practice Tests. 2.6 (simulationexams.com) | ||
of Website divelopment, Client, and Server side scripting, Internet security, intranets, extranets, e-commerce, and Internet based business development. SimulationExams.com practice tests for CompTIA i-Net+ certification conforms to the latest objectives of the exam. The package contains 3 tests and | |||
Updated: 9, 2005 | Rating: 0 | Author: Anand Software and Training (P) Ltd. | Size: 3503 kb | Demo Go to category: Education > Other Similar programs | |||
43. | Alkonost ContraCopy 3.00 (alkonost.com) | ||
ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
44. | VeriFinger Standard SDK 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Other Similar programs | |||
45. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
46. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 16 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
47. | VeriFinger Standard SDK (Windows Demo) 4.2 (neurotechnologija.com) | ||
per second,. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
48. | VeriLook Standard SDK (Demo for Windows) 2.0 (neurotechnologija.com) | ||
per second. VeriLook can be easily integrated into the customer's security system. The integrator has a complete control over SDK data input and output; therefore SDK functions can be used in connection with most cameras and databases. Integrator could develop any user interface. Distribution | |||
Updated: 2, 2006 | Rating: 0 | Author: Neurotechnologija | Size: 590 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
49. | Internet Access Scheduler 2.0 (winutility.com) | ||
Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
50. | MDaemon 8.1.4 (altn.com) | ||
, Windows-based email server software, contains full mail server functionality and control with a strong emphasis on security to protect your email communication needs. MDaemon features include top-notch antispam security features; seamless integration with AntiVirus for MDaemon plug-in; built-in groupware functionalities for sharing folders, tasks, contacts, and | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|