|
||||||
|
||
|
Home > Security center software |
Related keywords: security, Security, computer security, internet security, security software, information security, center, SECURITY, call center, file security |
|
|
1. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 322 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
2. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
3. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
(VCL edition) is the comprehensive component collection for Internet security. Unlike other components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
4. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | BB EAP 5.38 (bbsys.com) | ||
referrals. User action tracking based on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
6. | Message Parse 3.12 (cypressnet.com) | ||
An email processing utility, that provides an easy, and effective way to transfer data from email to other applications. MsgParse exports data from your email messages to user defined customized flat files, that can be used to import to other applications such as database and spreadsheet programs. This is a | |||
Updated: 2, 2006 | Rating: 0 | Author: James Hall | Size: 5231 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
7. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
for response, and just disconnect. And all of it fully automated. It's suitable for many environments, such as ASPx. When you're unsure when to send actual command, wodSSH.NET may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent command | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
8. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
9. | wodSSH 2.3.7.0 (weonlydo.com) | ||
It also supports blocking and non-blocking operations, thus it's suitable for many environments, such as ASP. Using WaitFor and Execute methods, it will behave just like expect command known from UNIX systems. When you're unsure when to send actual command, wodSSH may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
10. | Casino Solei 2006 V (best-on-line-casinos.com) | ||
around the globe CasinoSolei.com has established a "Customer Service Center" in San Jose, Costa Rica offering chat, email and toll free phone services to their global clientele. To compliment their experienced team CasinoSolei.com purchased software from industry leaders, Playtech | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Card Similar programs | |||
11. | SafeSystem 2006 (gemiscorp.com) | ||
SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your system. It can make your files and folders completely invisible, inaccessible or simply read-only and prevent the change of configuration and | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
12. | PECompact 2.75 (bitsum.com) | ||
make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC plug-ins. Custom loaders (decompression) stubs and API hook plugins are also able to be utilized. Advanced configuration includes selection of resource types that | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
13. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
14. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
15. | CSJami Minicom Pro 5.4.0.0 (csjami.netfirms.com) | ||
*Remote Modem *Scheduler *TimeCenter *Wake On Lan WOL *>128 bit security Password protected and optimised for easy use. TCP-IP and IPX enabled, 4,8, 16 bit color selection and multithreaded. Transit routing. Easily take control of remote PCs with Minicom over LAN dial-up or Internet connections. Screen file manager and finder Time Center audio and video routers shutdown | |||
Updated: 2, 2006 | Rating: 42 | Author: CSJami CSJami | Size: 5006 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
16. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
17. | Active Scripting Fast Disable 1.5 (sparkleware.com) | ||
Explorer's Active Scripting "feature" is responsible for popup windows, scrolling status bar text, security holes, and other annoyances. Unfortunately, some websites require this technology for basic navigation, so permanently disabling Active Scripting is an impractical solution. The "Enable/Disable Active Scripting" option is normally buried deep in the Windows Control | |||
Updated: 2, 2006 | Rating: 149 | Author: Chris Marshall | Size: 580 kb | Shareware Go to category: Network & Internet > Ad Blockers Similar programs | |||
18. | SecureBlackbox (ActiveX/DLL) 4.2 (secureblackbox.com) | ||
edition) is the comprehensive component collection for Internet security. SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you | |||
Updated: 2, 2006 | Rating: 0 | Author: EldoS Corporation | Size: 4127 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
19. | DevSolutions FTP 1.0 (devsolutions.net) | ||
is included with the library allowing you to find out how thatâ??s done. The DevSolutions FTP protocol is a relatively simple client-side component for rapid transfer of files from the local hard disk to an FTP server. Being a COM Component, ftp protocol that allows access to a remote file system in a standard way. It comprises commands for manipulating and navigating remote | |||
Updated: 2, 2006 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Similar programs | |||
20. | ShopAssist Point Of Sale System 4.92 (users.iafrica.com) | ||
Cashier Statistics. Over three hundred reports and charts. Security Five levels of password protection for its various modules and functions. Audit trail of all transactions. Integrated data backup and recovery. Network Up to two hundred terminals per server. Multi-Store Inter-Branch Transfers. Consolidated Sales, Consolidated Stockholding, Branch Orders. Tools | |||
Updated: 2, 2006 | Rating: 16 | Author: Ivan Smith | Size: 16796 kb | Shareware Go to category: Business > Other Similar programs | |||
21. | My Notes Center 1.4.3 (mynotescenter.com) | ||
necessary information and how to manage the data stored. My Notes Center is an e-organizer and personal information manager jam-packed with features like an overstuffed sandwich. It stores personal notes, e-mails, web links, phone numbers, addresses, even credit card numbers safely and securely. Use | |||
Updated: 2, 2006 | Rating: 0 | Author: Dmitry Bobrik | Size: 1873 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
22. | Air Messenger LAN Server 6.7.6 (internetsoftwaresolutions.org) | ||
investment for companies that run a large sales force or dispatch centers. All sales people or dispatchers can send pages through one network computer without the need to supply each computer with a phone line or modem. The Air Messenger Server can maintain company wide group and user lists which can be broken down to departments, detailed message and transfer logs, and | |||
Updated: 2, 2006 | Rating: 64 | Author: Steve Hardt | Size: 26042 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
23. | TreePad Business Edition 7.2 (treepad.com) | ||
intuitive and versatile, including: Password-protection and high-security Encryption, Spell Checker (20+ langs.), Thesaurus, multi-Lingual Editions, Photo Album, Website Generation with dynamic tree, image-converter, Presentation mode, documentation-, shortcuts-, hyperlinks-, addresses-, passwords and | |||
Updated: 2, 2006 | Rating: 25 | Author: Henk Hagedoorn | Size: 4074 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
24. | EasyHues Pro 2.1 (easytools.com) | ||
EasyHues Pro, a program that lets you create color schemes and explore the world of colors. You can create your random color schemes from among 16 million colors with EasyHues Pro. Use the HEX value or the RGB value of the colors in your favorite image editing program. Are you fascinated about colors? Are | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 324608 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
25. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
(title, subject, author, keywords, creator, producer, created date, security, version, page count, etc.) from PDF files. 11.pdf to text SDK-COM supports VB,VC,C++,Delphi,ASP developer languages. 12.pdf to text SDK-COM supports password protected PDF files. pdf to text SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
26. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
27. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
files layout. You can use one or more passwords.Many additional security options are available. For more information visit http://www.htmlguardian.org http://www.htmlguardian.org. HTML password protect, encrypt HTML files with 448 bit keys. Protect web page or entire website with a password. Hide html source code. Image protection-protect | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
28. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
per second. VeriFinger can be easily integrated into the customer's security system. This SDK contains interfaces for some of the major fingerprint scanners, which allow the developer to obtain data from the scanners without any additional software. Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
29. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
30. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
31. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | System Cop 1.1 (mahaonsoft.com) | ||
settings of the Windows operating systems. System Cop is a "control center" of your system ! With this tool you can change the settings of your system centralized from one program only. System Cop is a cross-platform tool which works under all versions of the Windows operating systems (95, 98, 98 Second Edition, NT 4.0, Millennium Edition, 2000, XP and 2003). Each setting | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
33. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
34. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Center Manager (SCM) – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
37. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Core Manager – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
38. | PC Accelerator 2005 Edition 1.1 (smartalec2000.com) | ||
increase system performance. Improve Internet performance, and web security. Provide convenient tools to tune up and ease your computer use. PCXL also provides special security features to protect your system. Available in standard and professional suite editions. Features include: -brand new redesigned interface -brand new SmartJupiter optimization engine -thousands of | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Wong | Size: 3614 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
39. | PowerZip 7.06 (powerzip.biz) | ||
documents with PowerZip - an easy to use file compression & security program. PowerZip Compression / Extraction Wizards make working with archives (such as Zip files) easy while providing an array of advanced features. The Wizards are quick to use because they have only a small number of steps; some steps can be switched of if not needed, others can be skipped to use default | |||
Updated: 9, 2005 | Rating: 124 | Author: Dimitri Ternovski | Size: 1920 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
40. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
and normal access to all your folders and the files within. There's no need to un-hide each file or folder individually. And Magic Folders is totally transparent. No one need know your invisible folders/files even exist. If you wish you can establish 5 different accounts so everyone using your computer can create their own invisible folders that only they have access to. Keep | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
41. | Lock Folder 5.0 (realclicks.com) | ||
Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
42. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
Center Manager (ESCM) – software for service centers and workshops. ESCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
43. | FileMap by BB 4.0.4 (dogkennels.net) | ||
become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
44. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Ness is security software to password protect and lock folders against unwanted access. Lock Ness will both secure your folders against accidental deletion and prevent other users from copying them. The folder can be locked or unlocked simply by right-clicking on it within Windows Explorer. The folder remains protected should your PC be rebooted into Windows Safe Mode, DOS or another | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
46. | DigiSecret 2.0 (tamos.com) | ||
being intercepted. DigiSecret also includes Message Encryption Center that allows you to encrypt/decrypt plain text messages and send them via e-mail. DigiSecret also takes care of permanently erasing files or folders that you wish to remove. The files are deleted and overwritten several times to eliminate every possibility of recovering the information. DigiSecret was | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
any feature of avast!, prepare and run tasks, store and check task's results. On Access Scanner - special providers to protect: the most of available E-mail clients, Instant Messaging - ICQ, Miranda etc., Network traffic - Intrusion Setection - lightweight firewall, P2P protection for | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
48. | BackRex Expert Backup 2.5 (backsettings.com) | ||
face it! We all live in the age of Information Technologies. Day after day we become more and more dependent on information. Not only our financial data and job-related information moved from paper to computer, our day planners, diaries, address books and even calendars are now all-digital. The process of our life relies heavily on machines that are tireless and accurate in | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
49. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | 1st Security Center Pro 4.5 (1securitycenter.com) | ||
Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to | |||
Updated: 9, 2005 | Rating: 30 | Author: Eugene Mihailov | Size: 1480 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security center software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|