|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
351. | ExeShield 2.6 (moonlight-software.com) | ||
it's easy to turn your applications into "try-before-you-buy" software with very little effort, and maximum protection against piracy, backdating, reverse-engineering or any kind of tampering. ExeShield will protect virtually any Win32 executable, including: Visual Basic Delphi C++ C++ Builder PowerBasic MASM Visual Studio With ExeShield it's easy to turn your | |||
Updated: 9, 2005 | Rating: 0 | Author: George Balla | Size: 947 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
352. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
353. | System Key Wizard 2.1 (home.wol.co.za) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
354. | System Key Wizard 2.1 (continuumq.com) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
355. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
356. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
the list of attachment types, which are blocked by the Outlook security system (only for Internet Mail). Attachments blocked by the Microsoft Outlook security system can be saved on the hard drive. The program works both in manual and automatic modes. The program can automatically extract attachments from incoming messages to save them to disk (they are replaced in the | |||
Updated: 2, 2006 | Rating: 120 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
357. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons in the wrong hands. New added features to | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
358. | Dial-Up Lock Me 2.1 (winutility.com) | ||
Lock Millennium Edition is an Internet security and dial-up (RAS) monitoring software that enables to set user-level security for Internet Dial-Up (RAS) connections. Using Dial-Up Lock Me you can limit and monitor incoming and outgoing traffic, limit and monitor time online and set allowed/denied time periods for selected users on a Windows 95/98/Me. Dial-Up Lock Me | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 765 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
359. | 1st Email Anti-Virus 4.0 (zzee.com) | ||
Email Anti-Virus is the only security program that protects from all kinds of email threats. Generic antivirus programs and setting the most secure options in email client software can't provide the same level of protection as 1EAV does. It copes with iframe / MIME header / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Slavic | Size: 975 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
360. | Engineers Edition 5.2 (solarwinds.net) | ||
etc) across a range of subnets. This tool will even tell you what software is installed and/or currently running on the discovered device. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but also set alert thresholds for automatic e-mail notification. The BANDWIDTH MONITOR tool provides graphing and trending analysis over months or | |||
Updated: 9, 2005 | Rating: 16 | Author: Doug Rogers | Size: 75498 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
361. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
at the specified time intervals. Internet Cleaner is a trial software, you can download and evaluate it free of charge for the period of 30 days. Remove all traces of your computer activity (including recently visited sites, browser cache and cookies, Start menu history, documents history etc.) and free the hard drive space by erasing the Scandisk file fragments and emptying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
362. | JBMail 3.2 (jbmail.pc-utils.com) | ||
e-mail client that supports SSL/TLS encrypted POP3 and SMTP. The software has been designed for simplicity, security and on-line mailbox access meaning that mail is manipulated remotely and NOT stored locally. Delete spam or large attachments without having to first download them! This portable software does not require installation, registry keys or even temporary | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
363. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
Server is an enterprise class mail server software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based administration, and a wide array of standard | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
364. | NetChatSpy 2.5.0 (home.primus.com.au) | ||
from any computer on a local area network. Undetectable because software installed on only one computer in the network. Can operate in 'Stealth Mode' to record conversations on local computer for added security. Monitor children or employees to ensure on-line safety and appropriate use of Internet. Remotely monitor Instant Messenger conversations from any computer on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Langford | Size: 5655 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
365. | Norton Internet Security 2004 (nct.symantecstore.com) | ||
Norton Internet Security 2004 provides essential protection from viruses, hackers, and privacy threats. Powerful yet easy to use, this award-winning suite now includes advanced spam-fighting software. Viruses are a daily threat, so Norton Internet Security gives you the world’s most trusted antivirus solution. Norton AntiVirus removes viruses from email | |||
Updated: 9, 2005 | Rating: 47 | Author: Jennifer Leonard | Size: 35100 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
366. | Pop3Hot 2.0 (ref.izymail.com) | ||
against being sent damaging code in e-mail by setting appropriate security levels in their application. Pop3Hot is a new eMail solution to synchronize AOL, MSN, Hotmail or Yahoo with Outlook, Eudora, Pocket PC and others. Download and send messages, incl. all attachments. Synchronize all folders and use them offline via POP3, IMAP4 and | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulrich Schwanitz | Size: 335 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
367. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network. SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
368. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
is a highly configurable and extremely efficient e-mail scanning software solution which can be tailored specifically to your system to remove the unsolicited e-mail. Spam Alarm utilizes our innovative multilevel filtering, statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
369. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
and access to corporate resources over the Internet. It brings security to a PC and a company Lan/Wan or Intranet. SSHPro was implemented as an extension DLL. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to SSHPro without sacrificing any of existing functionality. Furthermore, SSHPro has been developed entirely outside of the USA, and can | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
370. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
371. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
372. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set transitions to display them, add labels. You can also add popular | |||
Updated: 2, 2006 | Rating: 42 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
373. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 42 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
374. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 0 | Author: Dengcheng Xia | Size: 1544 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
375. | !Easy ScreenSaver Studio 3.6 (dd2002.com) | ||
ScreenSaver Studio is a nifty and cool ScreenSaver maker software to make your own ScreenSaver easily as well as an easy-to-use ScreenSaver management tool. You can create ScreenSaver step by step with the wizard, add image files or acquire images to be included from your digital camera or scanner, edit images, set the transitions to display them, and add labels. You can also add | |||
Updated: 2, 2006 | Rating: 60 | Author: Dengcheng Xia | Size: 1396 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
376. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
377. | 1st Evidence Remover 2.14 (softheap.com) | ||
open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the other detailed | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
378. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage and system failures. - Supports NTFS, FAT32 and FAT16 protected disks. - Compatible with MS Windows 95/98/Me/NT/2000/2003/XP. StrongDisk Pro is the most proven and | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
379. | AB Password Generator 2.33 (ab_software.tripod.com) | ||
at your choice. The list can contain up to 999999 passwords. This software can generate random passwords with length between 1 and 999 characters. You can choose that your generated password to contain letters and/or numbers and/or symbols and/or your predefined text. Your specific text can be add at | |||
Updated: 3, 2005 | Rating: 605 | Author: AB Software | Size: 1572 kb | Shareware Similar programs | |||
380. | AB Screen Locker 3.62 (ab_software.tripod.com) | ||
the desktop icons are hidden too. If the system is restarted, this software will automatically load with Windows and your PC will be locked. The password used to lock and unlock the screen can contain any type of character with any length (but minimum 3). The application is loading very fast and it has a nice, friendly GUI. A small utility that allows you to lock your screen. Any key | |||
Updated: 3, 2005 | Rating: 569 | Author: AB Software | Size: 1510 kb | Shareware Similar programs | |||
381. | Captain Mnemo Pro 1.41 (refog.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
382. | CD-DVD Lock 2.01 (softheap.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
383. | Crime Catcher 3.0 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The Professional Edition supports upto 4 webcams/input devices so security can be maximized. The webcam software will monitor for movement or motion. If motion is detected pictures will be taken of what the webcam can see! You can of course have other actions take place | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Torkington | Size: 4262 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
384. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
385. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
386. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
387. | Mutilate File Wiper 2.92 (home.att.net) | ||
data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
388. | Password Security Vault 2.0 (hirtlesoftware.com) | ||
Security Vault stores your personal passwords as well as login names for Internet sites. Most Internet users have numerous web sites which they frequent that require memberships. Simply remember your password for this software and you can forget every other password since this program will keep track of them for you. Includes many handy features to make your web surfing a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 4764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
389. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
390. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
391. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
392. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
393. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
394. | PC LockUp 2.185 (softheap.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
395. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
396. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
397. | S.O.S.Automation 1.01 (sosautomation.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
398. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
399. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
400. | Tweak Manager 2.12 (winguides.com) | ||
every aspect of your computer, including tweaks for popular software like Microsoft Office and Internet Explorer. - Customize your computer with over 1000+ powerful tweaks - Secure Windows with hundreds of restrictions and policies - Tweak popular software like Internet Explorer and Office - Easily download new and updated tweaks using Live Update Take complete control | |||
Updated: 9, 2005 | Rating: 42 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|