|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
1. | SiteKiosk 5.5.45 (sitekiosk.com) | ||
is a software for public access internet terminals and lets you turn any computer into a secure multilanguage Internet terminal, allowing the user to access the Internet but protecting the underlying operating system and files. Possible uses include presentations, exhibitions, libraries, and more. SiteKiosk works with normal displays and Touchscreens. A keyboard doesn't even have | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Koepf | Size: 9022 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
2. | ABC Amber Access Converter 3.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of MDB files at a time. Partial Features List: - reads MDB (MS Access) files - exports to XLS, CSV, DBF, XML, PDF (does not require Adobe Acrobat to be installed) | |||
Updated: 2, 2006 | Rating: 718 | Author: ProcessText Group | Size: 1145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
3. | ABC Amber CSV Converter 2.03 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of CSV files at a time. As all "ABC Amber" products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads CSV (comma-separated), TXT | |||
Updated: 2, 2006 | Rating: 1563 | Author: ProcessText Group | Size: 1279 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
4. | ABC Amber DBF Converter 2.01 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of DBF files at a time. As all ABC Amber products, it's really easy as ABC and powerful as Amber. Partial Features List: - reads DBF files (dBASE III+, dBASE IV | |||
Updated: 2, 2006 | Rating: 387 | Author: ProcessText Group | Size: 1124 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
5. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS Excel does not need to be installed. Partial Features List: - reads XLS files (does not require MS Excel to be | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
6. | ABC Amber Lotus 1-2-3 Converter 2.04 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WK1 files at a time. Important note: Lotus 1-2-3 does not need to be installed. Partial Features List: - reads WK1 files (does not require Lotus 1-2-3 to be | |||
Updated: 3, 2006 | Rating: 321 | Author: ProcessText Group | Size: 1181 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
7. | ABC Amber PDF2Image Converter 2.02 (thebeatlesforever.com) | ||
TGA, VST, AFI). You can export all pages or just selected page. The software supports a command line and more than 50 languages. Partial Features List - reads PDF files (doesn't require Adobe Acrobat to be installed); - exports the document to BMP, WMF, EMF, ICO, JPG, GIF, PNG, TIFF, PCX, PCC | |||
Updated: 2, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1292 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
8. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important note: Adobe Acrobat doesn't need to be installed. Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
9. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of WQ1 files at a time. Important note: Corel QuattroPro does not need to be | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
10. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
Converter program include 40/128 bits PDF encryption, advanced PDF security options, page size and page orientation support, resolution mode, compression mode, etc. Not only conversion to PDF is supported. ABC Amber Text Converter is the award-winning, powerful batch tool to convert documents to PDF, HTML, CHM, RTF, HLP, TXT (ANSI and Unicode), DOC, XLS, MCW, WRI, WPD, WK4, WPS | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
11. | BB EAP 5.38 (bbsys.com) | ||
on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final resolution/or declined help, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
12. | CafeTimePro -Internet Cafe Software 4.0 (cafetime.com) | ||
the start time, duration and end time are always visible. System Security: Lock down the computer so that only the applications specified by the kiosk administrator are permitted to run. Complete prepay System: Prepaid accounts can be generated in advance for sale to customers. Coin Acceptor Ready: Connect to a coin acceptor mechanism via a COM port. The Timer | |||
Updated: 9, 2005 | Rating: 558 | Author: Rory Keogh | Size: 5982 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
13. | EMS MySQL Manager 3.6 (ems-hitech.com) | ||
objects; * Advanced data manipulation tools; * Powerful security management; * Excellent visual and text tools for query building; * Impressive data export and import capabilities; * Completely remade Visual Database Designer; * Easy-to-use wizards performing MySQL services. EMS SQL Manager for MySQL is a powerful tool for MySQL Server administration and | |||
Updated: 2, 2006 | Rating: 1145 | Author: EMS Software Development | Size: 15145 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
14. | NewWayService 2.19 (orologic.com) | ||
is the Help Desk software solution designed to maximise your service centre or call centre department. Whatever your industry, NewWayService allows you to easily track and manage calls, issues, jobs, requests or work orders. With its very user-friendly environment, no intense training is needed to learn to use it. Flexible, NewWayService adapts itself to your needs | |||
Updated: 3, 2006 | Rating: 0 | Author: Sales Department | Size: 21313 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | DOVICO Track-IT Suite 12.1 (dovico.com) | ||
Suite is an award winning XML and Web Services architectured software solution that monitors project costs, resources, employee time sheets, expenses, invoices, and receivables. Through better timesheet and project management, DOVICO Track-IT Suite helps corporations reduce project costs and increase resource performance. Timesheets and Expenses are gathered through the use | |||
Updated: 2, 2006 | Rating: 0 | Author: DOVICO Software | Size: 90961 kb | Shareware Go to category: Business > Project Management Similar programs | |||
17. | Trusted Messenger 2.7 (notepage.net) | ||
time messaging software designed for business use. Trusted Messenger is a peer to peer application, that allows network users to communicate in a fast effective manner, without the the delays associated with email. Companies that utilize Trusted Messenger, instant messaging software, have a competitive edge in todays fast paced business world. By increasing corporate | |||
Updated: 9, 2005 | Rating: 0 | Author: NotePage, Inc. NotePage, Inc. | Size: 1068 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
18. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
19. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
20. | Smart Pix Manager 8.05 (xequte.com) | ||
can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in encrypted zips. Databases can be shared across a network and support for off-line sources is included (e.g. prompting for the correct CD-ROM). Features include: Wide Format Support, including all common Images, Sounds, Videos, Text, Office | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | 4t Explorer Sweeper 2.0 (4t-niagara.com) | ||
speeds up PC performance, increases free disks space and improves security by clearing the content of various Explorer and Netscape folders. In its "System Tray" mode it runs in system Tray as icons and helps to free up space on your taskbar. In "Invisible" mode application is not possible to see | |||
Updated: 9, 2005 | Rating: 0 | Author: 4t Niagara Software | Size: 943 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
23. | Anti-Spy.Info adware remover 1.6.5 (anti-spy.info) | ||
is your security and personal privacy tool that detects and removes spyware, trojans, keyloggers and adware. It complements your firewall and anti-virus software. The process viewer tells you every hidden function of all dynamic link library, system task and thread process currently active on your computer. Anti-Spy.Info doesn't require runtime modules, doesn't | |||
Updated: 9, 2005 | Rating: 580 | Author: Alex Neuber | Size: 1212 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
24. | DiamondCS Port Explorer 2.100 (diamondcs.com.au) | ||
that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a program you can't afford to be without. Designed for 32-bit Microsoft Windows systems, Port Explorer supports Windows 95, 98, 98 SE, ME, NT4, 2K, and XP, and also has a built-in dynamic language support system (supported languages include English, Dutch | |||
Updated: 2, 2006 | Rating: 0 | Author: DiamondCS Support | Size: 1062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | Hosting Controller Software 6.1 (hostingcontroller.com) | ||
website into hands of respective owners without compromising any security. In addition to Microsoft products, it supports most third party products that are commonly used by hosting providers as a standard. With its support for nine Email servers, four DNS servers, two FTP servers, four Statistics servers, two database servers, all major payment gateways including Paypal and two | |||
Updated: 9, 2005 | Rating: 0 | Author: Haider Ali | Size: 42 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
26. | Internet Timer 3 3.0.348 (internet-timer.co.uk) | ||
ultimate online tracking and control software, designed to log online usage while displaying real-time session costs on-screen. iT3 supports world call schemes, application processing, custom events, restrictions, limits and includes a comprehensive log viewer showing filterable listings, user and connection statistics, usage graphs, ranked data as well as sorted data exports in | |||
Updated: 9, 2005 | Rating: 39 | Author: Peter Chamberlin | Size: 4332 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
27. | Visendo popConnect 6.0 (ppedv.com) | ||
1 modem or ISDN card for the whole network (also router), more security (store copys of all mails local), everything on a NT server installable ( also WIN95), mailinglist ( resolve mailheader) Free support hotline! MS Exchange Server is not able to collect mails from external POP3 or IMAP4 accounts. popConnect is built to do that. It connects to POP3 or IMAP4 accounts | |||
Updated: 9, 2005 | Rating: 16 | Author: ppedv AG | Size: 2500 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
28. | PopMessenger 1.61 (leadmind.com) | ||
system unreliable in question. Introducing PopMessenger by LeadMind Software, the complete small to large enterprise level instant communication solution that offers full range of instant communication tools that do not require a dedicated server or usage of third party services. PopMessenger | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
29. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
ISDN, DSL or cable connection. Meets your requirements for Internet security & Internet privacy. Shows the currently active connections & the details of these connections. You can shut off any unsafe connection. This program includes four inter locking security services: a firewall, an | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
30. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web. this information can be available to any one who opens | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
31. | Zip & Email 1.4 (tools-for.net) | ||
decrease the send time. Zip & Email doesn't use 3rd party email software like Microsoft Outlook, The Bat!, Eudora Mail, etc. In fact, it doesn't even require a SMTP server to run - all of the files are sent directly to the recipients mailbox! Key features: Simplicity – just click once to | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Markov | Size: 997 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
32. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your staff, children, spouse or significant other type on your computer when | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
33. | Advanced Security Control 2.1 (protect-me.com) | ||
can be executed and by whom. You can control access to any 32-bit software, such as games, Internet browsers, or anything else depending on the time of day and day of week. Configuration is as simple as setting up login hour restrictions. Just choose a program, define users who should be affected by the rules, and choose when to enable and disable access on a one-week grid. If users | |||
Updated: 8, 2004 | Rating: 0 | Author: Ashot Oganesyan | Size: 1081 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
34. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces: Skinnable Simple Interface - just select what do you | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
35. | Data Destroyer 1.5 (braintwist-studios.com) | ||
contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with Windows | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
37. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
38. | KGB Spy 3.93 (refog.com) | ||
Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | MagicTweak 3.20 (magictweak.com) | ||
designed to optimize and personalize Microsoft Windows. This unique software makes it easy to tweak hundreds of hidden settings in Windows XP/2000/Me/98, so there is no longer any need to dig through the registry looking for that specific setting (from Start Menu,Desktop,IE skin,System Icon to System | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
40. | ArchiDoc (3035) (canteco.net) | ||
in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
41. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this new solution ensures complete protection against viruses, hackers and other | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
42. | Password Manager XP 2.1.322 (cp-lab.com) | ||
Manager XP is a convenient software application for storing passwords, access codes, social security and credit card numbers and other valuable information that needs protection. It will be your passwords and secrets keeper. Protect your private data with this password management utility. Program's unique features include capability to encrypt stored information with | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
43. | Password Spectator Pro 3.10 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
44. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
45. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
47. | Remote Administrator 2.2 (radmin.com) | ||
of all data streams. Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login. Radmin is very secure and reliable | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
48. | SecureWord 1.5 (secureword.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
49. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
50. | Universal Shield 4.0 (everstrike.com) | ||
Shield 4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|