|
||||||
|
||
|
Home > Breaches software |
|
|
1. | Studio Surveillance 6.0 (studio86designs.freeserve.co.uk) | ||
a set time period continuous recording is possible. If a security breach occurs within the previous recording period the individual video files can be reviewed and the event found. Motion detection allows areas to be monitored and any movement recorded in a video file. Image sequence saving or overwriting is useful for updatingimages on a website Stop Motion mode can be used to | |||
Updated: 2, 2006 | Rating: 118 | Author: Rod Bottom | Size: 3430 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
2. | Yapp the project calculator 2.0 (plexityhide.com) | ||
warnings on common rule violations like resource overuse, deadline breach, and dependency violations, information that is crucial to you in order to build a realistic and working project plan. Export and import to Excel Yapp the project calculator, Keep track of what to do and who's doing it. Rule based planning allows you to get some real help and not only a controlled drawing | |||
Updated: 9, 2005 | Rating: 73 | Author: Hans Karlsen | Size: 6785 kb | Shareware Go to category: Business > Project Management Similar programs | |||
3. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
database, you could minimize the possibility of such potential breaches, but you should understand that we do not guarantee that such a breach will never occur. That being said, LASsie can serve quite well as an application security system where users are relatively unsophisticated, or where application data is not of a highly classified nature. LASsie (Light Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
4. | i3Connect Merlin 1.1 (i3connect.com) | ||
Digital ID support. Merlin is also designed to prevent security breaches such as spam and viruses. For those customers who need to archive messages to meet corporate HR policy or regulatory requirements such those from SEC or HIPPA, Merlin provides extensive message logging. Messages are stored in a standard relational ODBC database for easy integration with existing reporting | |||
Updated: 9, 2005 | Rating: 42 | Author: i3Connect, Inc | Size: 379 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
5. | PortsLock 1.8 (protect-me.com) | ||
connections. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock enhances access control possibilities for system administrators, helps them to build a more secure network environment, and protects corporate networks against attacks from the inside. PortsLock is absolutely transparent to users. Users do not have to set up rules in their | |||
Updated: 2, 2006 | Rating: 16 | Author: Ashot Oganesyan | Size: 1765 kb | Demo Go to category: System Utilities > Other Similar programs | |||
6. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
More than an AntiVirus product, BitDefender Professional ensures antivirus protection, as well as data confidentiality, active content control and Internet filtering. BitDefender Professional is an ICSA Labs certified solution for Microsoft Windows XP, allowing users to enjoy their data protection as they solution for Microsoft Windows XP, allowing users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus protection, features as Internet filtering or | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
7. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption Select | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
8. | DeviceLock 5.73 (ntutility.com) | ||
is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
9. | DriveScrubber 2.0a (iolo.com) | ||
data are also left wide open and vulnerable to attempts at breaching security and recovering proprietary information from old or unused drives. This information usually represents dire consequences should it unintentionally fall into the wrong hands! DriveScrubber uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL data on ANY drive is | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
10. | FolderAccess 2.0 (lockfolder.net) | ||
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Breaches software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|