|
||||||
|
||
|
Home > Software > Security & Privacy > Popular |
|
|
121. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
More than an AntiVirus product, BitDefender Professional ensures antivirus protection, as well as data confidentiality, active content control and Internet filtering. BitDefender Professional is an ICSA Labs certified solution for Microsoft Windows XP, allowing users to enjoy their data protection as they solution for Microsoft Windows XP, allowing users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus protection, features as Internet filtering or | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
122. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
Computers play significant role in our everyday life. We rely on tireless machines in almost every aspect of our business and private life. Everything from important corporate budget planning to vacation photos comes digital. And as we enjoy this new electronic world we sometimes seem to forget how many | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
123. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
124. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
125. | Crypton 1.0 (uic.nnov.ru) | ||
Crypton is a multi-utility security suite, which provides strong security for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you files | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
Secure Disk Pro completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
127. | Keyboard Collector 2.07b (softdd.com) | ||
Secretly log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard Collector | |||
Updated: 2, 2006 | Rating: 113 | Author: SoftDD Software | Size: 715 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
128. | Access Administrator 4.14 (softheap.com) | ||
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
129. | BitDefender Professional Plus 9 (bitdefender.com) | ||
Antivirus - Heuristic in Virtual Environment Permanent antivirus protection peer-2-peer application protection innovatvative behavior blocking full e-mail protection Firewall - Internet Traffic Control active content control dial control cookie control Antispam - Anti-phishing self-learning bayesian filter | |||
Updated: 2, 2006 | Rating: 108 | Author: Alix Aranza | Size: 17010 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
130. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
Internet Cleaner is an award-winning privacy protection and hard drive clean-up utility that helps you remove all traces of your online and offline activity and free up some space on your hard drive by removing the unnecessary files. As its name implies, Internet Cleaner can easily eliminate all records of | |||
Updated: 2, 2006 | Rating: 107 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Software > Security & Privacy > Popular |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|