Screenbook Maker 1.0.77
Screenbook Maker is free software that allows you to create, publish and print your own Screenbooks - and much more. A Screenbook is a…
AJC Directory Synchronizer 2.3.4
AJC Directory Synchronizer makes it easy to synchronize files and compare folders between any two locations. Synchronize large numbers of…
 
   
   
     
Example:  ACDSee
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Breaches software

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 19.

1.Studio Surveillance 6.0 (studio86designs.freeserve.co.uk) free  Studio Surveillance download
a set time period continuous recording is possible. If a security breach occurs within the previous recording period the individual video files can be reviewed and the event found. Motion detection allows areas to be monitored and any movement recorded in a video file. Image sequence saving or overwriting is useful for updatingimages on a website Stop Motion mode can be used to…
Updated: 2, 2006 | Rating: 118 | Author: Rod Bottom | Size: 3430 kb | Shareware
Go to category: Audio & Multimedia > Video Tools
Similar programs
2.Yapp the project calculator 2.0 (plexityhide.com) free  Yapp the project calculator download
warnings on common rule violations like resource overuse, deadline breach, and dependency violations, information that is crucial to you in order to build a realistic and working project plan. Export and import to Excel Yapp the project calculator, Keep track of what to do and who's doing it. Rule based planning allows you to get some real help and not only a controlled drawing…
Updated: 9, 2005 | Rating: 73 | Author: Hans Karlsen | Size: 6785 kb | Shareware
Go to category: Business > Project Management
Similar programs
3.LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) free  LASsie (Light Application Security) for MS Access download
database, you could minimize the possibility of such potential breaches, but you should understand that we do not guarantee that such a breach will never occur. That being said, LASsie can serve quite well as an application security system where users are relatively unsophisticated, or where application data is not of a highly classified nature. LASsie (Light Application…
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware
Go to category: Development > Other
Similar programs
4.i3Connect Merlin 1.1 (i3connect.com) free  i3Connect Merlin download
Digital ID support. Merlin is also designed to prevent security breaches such as spam and viruses. For those customers who need to archive messages to meet corporate HR policy or regulatory requirements such those from SEC or HIPPA, Merlin provides extensive message logging. Messages are stored in a standard relational ODBC database for easy integration with existing reporting…
Updated: 9, 2005 | Rating: 42 | Author: i3Connect, Inc | Size: 379 kb | Commercial
Go to category: Communications > Chat & Instant Messaging
Similar programs
5.PortsLock 1.8 (protect-me.com) free  PortsLock download
connections. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock enhances access control possibilities for system administrators, helps them to build a more secure network environment, and protects corporate networks against attacks from the inside. PortsLock is absolutely transparent to users. Users do not have to set up rules in their…
Updated: 2, 2006 | Rating: 16 | Author: Ashot Oganesyan | Size: 1765 kb | Demo
Go to category: System Utilities > Other
Similar programs
6.BitDefender Professional 6.4.3 (bitdefender.ro) free  BitDefender Professional download
More than an AntiVirus product, BitDefender Professional ensures antivirus protection, as well as data confidentiality, active content control and Internet filtering. BitDefender Professional is an ICSA Labs certified solution for Microsoft Windows XP, allowing users to enjoy their data protection as they solution for Microsoft Windows XP, allowing users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus protection, features as Internet filtering or…
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware
Go to category: Security & Privacy > Anti-Virus Tools
Similar programs
7.ComputerSafe 3.0.0.5 (com-guard.com) free  ComputerSafe download
and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption Select…
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware
Go to category: Security & Privacy > Access Control
Similar programs
8.DeviceLock 5.73 (ntutility.com) free  DeviceLock download
is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire…
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo
Go to category: Security & Privacy > Access Control
Similar programs
9.DriveScrubber 2.0a (iolo.com) free  DriveScrubber download
data are also left wide open and vulnerable to attempts at breaching security and recovering proprietary information from old or unused drives. This information usually represents dire consequences should it unintentionally fall into the wrong hands! DriveScrubber uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL data on ANY drive is…
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware
Go to category: System Utilities > File & Disk Management
Similar programs
10.FolderAccess 2.0 (lockfolder.net) free  FolderAccess download
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be…
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware
Go to category: System Utilities > Other
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: | 1 | 2 | Next »


301 Moved Permanently

301 Moved Permanently


nginx

Home > Breaches software

InterBack 1.80
InterBack automatically transfers your files off-site to an internet host of your choosing. InterBack automates the entire backup process…
ActualDoc Standard 3.1
Save creative mood and work time with recent documents manager ActualDoc. ActualDoc keeps track of the documents you are currently working…
BlazingTools Perfect Keylogger 1.6.1.0
Perfect Keylogger helps you to find out what they are doing on their PC. With this key logger you will receive their keytrokes, chats…

Copyright © 2004 - 2010 allworldsoft.com Contact Page