|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
301. | Retail Plus 2.0 (sympatico.ca) | ||
Proven Point Of Sale Software Since 1987 Our mission is to make award winning software that delivers the right mix of simplicity, features and price. An automated point of sale system can help you a great deal by saving time on routine tasks, increasing accuracy and controling what happens at the sales counter. But you may have noticed that most POS software | |||
Updated: 9, 2005 | Rating: 0 | Author: Kuno Egger | Size: 6000 kb | Shareware Go to category: Business > Other Similar programs | |||
302. | Retirement Investment Required + 1.2 (benttreesoftware.com) | ||
under Win 95, 98, Me, NT4, XP, & 2000. Have you called the Social Security Hotline (1-800-772-1213) to verify your estimated monthly SS benefit so that you can evaluate the monthly shortfall you may experience? This program calculates the amount of money required to provide a given monthly income at retirement with or without withdrawing capital, which, when added to your Social | |||
Updated: 9, 2005 | Rating: 0 | Author: Carl Hooper | Size: 1212 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
303. | Retirement Savings Planner 2005.6 (torrid-tech.com) | ||
meet your specified retirement income goal. It's that easy. This software works with all types of retirement plans and assets including 401(k), IRA, 403(b), 457, SIMPLE, and any other defined contribution plan. "It is one of the most helpful, and easy to use, pieces of retirement planning software I've seen. Thanks." R. Gibson Retirement Planner makes planning easy by | |||
Updated: 9, 2005 | Rating: 86 | Size: 3195 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
304. | RoboNanny 1.2 (softnanny.com) | ||
give you the peace of mind you longed for. What you need is a home security system. RoboNanny will help you make sure your children are always safe, with Internet broadcasting and activity recording. RoboNanny is a computer home security and baby monitoring software. It monitors sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Afonin | Size: 520 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
305. | S.O.S.Automation 1.01 (triplebit.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 9, 2005 | Rating: 0 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
306. | S.O.S.Automation 1.01 (sosautomation.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
307. | Safe Express Home 4.2 (netsafesoft.com) | ||
of damage to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
308. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
309. | ScreenLock 9.0 (screenlock.com) | ||
to guess what the answer is. ScreenLock is an excellent PC & file security program providing easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
310. | ScreenLock Pro 2.0.41 (screenlock.com) | ||
PC World's Editor's Pick.! ScreenLock is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make ScreenLock ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to | |||
Updated: 8, 2004 | Rating: 65 | Author: Gregory Nelson | Size: 5254 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
311. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail client to pick up e-mail locally. Other users (hackers) cannot read your username / password across | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
312. | Secura Archiver 1.6 (cmfperception.com) | ||
Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
313. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Backup Professional is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
314. | Secure Files 2.8 (securefiles.net) | ||
Secure Files allows you to hide,protect and encrypt your personal files and folders easily, the protected files will be encrypted and unreadable. With Secure Files, what you need to do is just adding your filesand folders to Securet Files. The files will be encrypted and hidden automatically.If you want | |||
Updated: 8, 2004 | Rating: 0 | Author: Tang Jun | Size: 720 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
315. | Secure Reminder 6.0 (securereminder.com) | ||
Reminder software offers you an easy way to organize important information dates and events on the computer desktop. Secure Reminder is an easy to use daily reminders software that includes reminder, task scheduler, personal information organizer and password generator function. Don't ever forget an important date or event again! You can be reminded with by showing an alarm | |||
Updated: 9, 2005 | Rating: 102 | Author: SecureReminder. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
316. | SecureCode 2.0 (aidsoft.com) | ||
is a new software protection for Borland Delphi or C++ Builder, based on the lastest technique protection to provide a strong security to protect your software against reverse engineering and illegal decompilation. If you have important code and you do not want a competitor to see, use SecureCode !You can use as protection against reverse-engineering or you can use | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
317. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
is a new software protection based on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration software, you can use as protection against reverse-engineering or | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
318. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
need not have a copy of the program!. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. SIT 2000 is so simple to use. SIT 2000 is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
319. | SecureWord 1.5 (secureword.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
320. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
321. | Security Folder 2.0 (everstrike.com) | ||
protection. Despite the fact that there are many 3d party data security solutions on the market today, few of them offer an intuitively easy way to protect files and folders on local hard drive from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
322. | Security Folder 2.0 (security-folder.com) | ||
protection. Despite the fact that there are many 3d party data security solutions on the market today, few of them offer an intuitively easy way to protect files and folders on local hard drive from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
323. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
324. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
Pro is the complete network monitoring software. It offers IT administrators full control over the IT infrastructure by monitoring all event sources and notifying the occurrence of all critical events for corrective measures to be taken, manually or automatically, thus avoiding any undesired consequences. Sentry Pro Version features customized monitoring objects for servers (MS | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
325. | Server Maintenance Portal 3.2 (absolutedynamics.com) | ||
Asset Management Software that collects hardware and software assets across the network. SMP also works with Microsoft Baseline Security Analyzer to determine the security state of your Windows systems. Integrated with MBSA 2.0. Disk space monitoring and reporting. Easy-to-navigate web pages. Flexible reporting options. Intuitive Active Directory searches | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
326. | Settings Sentry 1.0 (spyblocker-software.com) | ||
malicous web pages, software and other types of sneakware from changing Internet Explorer settings. Works like a firewall for vulnerable Internet Explorer settings. Settings Sentry Locks your settings preventing them from being tampered with. You can selectively allow or deny any setting instantaneously. Protects your start page and other selected settings. features full logging and | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Kurland | Size: 1216 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
327. | Shift Scheduler Continuous Excel 12 (bizpeponline.com) | ||
The Shift Scheduler will build a roster structure to your specifications, allocate staff automatically, and generate a printable roster, all at the click of a button. It is compact and user friendly allowing you to add staff and shifts (maximum 150) with ease. Default values for continuous shifts mean that | |||
Updated: 9, 2005 | Rating: 148 | Author: David Morcom | Size: 250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
328. | Shift Scheduler Continuous Excel 12 (bizpeponline.com) | ||
The Shift Scheduler will build a roster structure to your specifications, allocate staff automatically, and generate a printable roster, all at the click of a button. It is compact and user friendly allowing you to add staff and shifts (maximum 150) with ease. Default values for continuous shifts mean that | |||
Updated: 9, 2005 | Rating: 0 | Author: David Morcom | Size: 250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
329. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
330. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
bit rate. Simple 1on1 symmetric key entries are used for your email security and file encryption, no Public and Private Keys. The key entries are not partially issued by a Trusted 3rd Party -- you don't have to worry about having to trust any 3rd parties. ShyFile does not use any standardized algorithms but only its own exclusively developed TL6144D algorithm. A File Shredder is | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
331. | SignetSure 1.0 (SignetSure.com) | ||
your program. Scenario Two: You distribute registered software with a datafile that identifies the registered user (e.g. user name, product serial number, et cetera). It is important that users not be able to modify their own registration information, even if someone reverse-engineers your program. SignetSure solves the problems of both these scenarios. SignetSure | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
332. | Silver Inventory System 1.6.2 (executivpro.com) | ||
most powerful report wizard. 15. The system ensures a high level security. Anybody outside can't take advantage of your databases. Silver Inventory System is a complete system for management of sales, purchases and payments. This system is use for creation invoices, sale orders, purchase orders, receiving lists, payment receipts, labels with bar | |||
Updated: 9, 2005 | Rating: 0 | Author: Serge Korsunen | Size: 1266 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
333. | Silver Key 3.3 (filecryption.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel” command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
334. | Silver Key 3.3 (kryptel.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel” command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
335. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
336. | Smart Pix Manager 8.05 (xequte.com) | ||
can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in encrypted zips. Databases can be shared across a network and support for off-line sources is included (e.g. prompting for the correct CD-ROM). Features include: Wide Format Support, including all common Images, Sounds, Videos, Text, Office | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
337. | SnoopTrap 3.0.2 (snooptrap.com) | ||
to guess what the answer is. SnoopTrap is an excellent PC & file security program providing easy, yet secure access to your private data while denying other's attempts to access your computer. Optional | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 5405 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
338. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network. SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable | |||
Updated: 2, 2006 | Rating: 40 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
339. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or segment of a local area network. SoftPerfect Network Protocol Analyzer presents the results of its network analysis in a convenient and easily understandable | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
340. | SoftwareShield System 2.4.10.17 (softwareshield.com) | ||
System is a full featured licensing and copy-protection system for software developers who create Windows applications on the x86 platform. The SoftwareShield System allows you to make copy-protected, demo, trial, pay-per-use, leased and many other versions of your software. License Models | |||
Updated: 9, 2005 | Rating: 0 | Author: Zack Wickes | Size: 9037 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
341. | Spam Alarm for POP3 2.2.2.18 (dignitysoftware.com) | ||
is a highly configurable and extremely efficient e-mail scanning software solution which can be tailored specifically to your system to remove the unsolicited e-mail. Spam Alarm utilizes our innovative multilevel filtering, statistical analysis of individual words and heuristic scanning. Key Features: Blocks 99% of spam with zero false positives Standalone application - your | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugeny Politskovoy | Size: 3704 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
342. | SpamChoke for Windows 1.1 (spamchoke.com) | ||
is an install-and-forget antispam software that works automatically to ensure that your inbox will be free of spam emails. SpamChoke for Windows supports all email clients like MS-Outlook, Outlook Express, Eudora, etc. SpamChoke automatically detects the email program and configures the email accounts to filter spam emails. SpamChoke reduces up to 90% of your spam emails | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 1164 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
343. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split files by | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
344. | Spy Killer 5.0 (spy-killer.com) | ||
and adware detection, removal, and prevention internet system security shield. Advanced features include instant kill and blocking. Free software trial version available to | |||
Updated: 2, 2006 | Rating: 48 | Author: Maxion Software | Size: 764826 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
345. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 520 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
346. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
347. | SpyBlocker 9.1 (spyblocker-software.com) | ||
goes one step further. SpyBlocker strips ads out of ad-supported software, disabling the ad module and tracking capabilities without disabling the functionality of the program. Protect your privacy from spyware, advertising, web bugs, scripts, stylesheets, worms, cookies and | |||
Updated: 3, 2006 | Rating: 165 | Author: Paul Kurland | Size: 3808 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
348. | SpyMyPC 2.0 (benutec.com) | ||
large corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Stop Computer Espionage (Monitor your employee and management systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
349. | SpyMyPC PRO 1.9 (benutec.com) | ||
PRO is award-winning, highly flexible, all-round desktop security monitoring solution, the best choice if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, Internet connections, passwords and chat conversations. SpyMyPC PRO also includes advanced stealth mode features to prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
350. | SSH client for windows SSHPro 2.9 (Labtam-inc.com) | ||
and access to corporate resources over the Internet. It brings security to a PC and a company Lan/Wan or Intranet. SSHPro was implemented as an extension DLL. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to SSHPro without sacrificing any of existing functionality. Furthermore, SSHPro has been developed entirely outside of the USA, and can | |||
Updated: 2, 2006 | Rating: 48 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|