Logan Pro Log Analyzer 1.6
Logan Pro is an advanced multithreaded job oriented log analysis tool. It is intended for both the novice webmaster as well as the veteran…
Page Links 1.0
Page Links is a simple MDI (Multi Document Interface) web browser based on Internet Explorer that allows the user to browse multiple sites…
 
   
   
     
Example:  ACDSee
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > Breaches software

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: 19.

1.Studio Surveillance 6.0 (studio86designs.freeserve.co.uk) free  Studio Surveillance download
a set time period continuous recording is possible. If a security breach occurs within the previous recording period the individual video files can be reviewed and the event found. Motion detection allows areas to be monitored and any movement recorded in a video file. Image sequence saving or overwriting is useful for updatingimages on a website Stop Motion mode can be used to…
Updated: 2, 2006 | Rating: 118 | Author: Rod Bottom | Size: 3430 kb | Shareware
Go to category: Audio & Multimedia > Video Tools
Similar programs
2.DeviceLock 5.73 (ntutility.com) free  DeviceLock download
is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire…
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo
Go to category: Security & Privacy > Access Control
Similar programs
3.DeviceLock 5.73 (protect-me.com) free  DeviceLock download
is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire…
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo
Go to category: Security & Privacy > Access Control
Similar programs
4.PortsLock 1.8 (protect-me.com) free  PortsLock download
connections. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock enhances access control possibilities for system administrators, helps them to build a more secure network environment, and protects corporate networks against attacks from the inside. PortsLock is absolutely transparent to users. Users do not have to set up rules in their…
Updated: 2, 2006 | Rating: 16 | Author: Ashot Oganesyan | Size: 1765 kb | Demo
Go to category: System Utilities > Other
Similar programs
5.SpyMyPC PRO 1.9 (benutec.com) free  SpyMyPC PRO download
corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Monitor your employee and management systems for espionage, theft, fraud, etc)…
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware
Go to category: System Utilities > Other
Similar programs
6.Cheat Checker 2.03 (nine-patch.com) free  Cheat Checker download
of multiple version test results. Students have learned to breach the expected security given by multiple version tests. The current Cheat Checker examines all versions of a test as marked. The structure for each answer file is: nine character ID:one space:answer string. The answer key ID is 999000111. Student records follow the answer key. A Rule of Thumb for Cheating is…
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware
Go to category: Education > Other
Similar programs
7.SpyMyPC 2.0 (benutec.com) free  SpyMyPC download
corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Stop Computer Espionage (Monitor your employee and management systems…
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs
8.System Shield 2.1c (iolo.com) free  System Shield download
data are also left wide open and vulnerable to all attempts at breaching security and recovering proprietary information. This information usually represents dire consequences should it "accidentally" fall into the wrong hands. System Shield uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL files that have been deleted are permanently…
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware
Go to category: Security & Privacy > Other
Similar programs
9.Protect Folder 98 3.0 (everstrike.com) free  Protect Folder 98 download
from unauthorized access because over 80% of reported security breaches come from within an organization, not from hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private, and confidential information. And because locking your files, folders makes them invisible, they cannot be deleted…
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware
Go to category: Security & Privacy > Access Control
Similar programs
10.Lock Folder XP 3.4 (everstrike.com) free  Lock Folder XP download
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files, folders and drives is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not…
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware
Go to category: Security & Privacy > Access Control
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: | 1 | 2 | Next »


301 Moved Permanently

301 Moved Permanently


nginx

Home > Breaches software

4Musics MP3 to WAV Converter 1.55
One-way MP3 to WAV converting at high converting Main Features: - converting in one click! - high speed; - setting resulting for…
IOSLoaderPro 4.42
IOSLoaderPro provides everything you need to ensure safe, fast and accurate upgrade of the Cisco IOS® software.
NetCollector 1.62
NetCollector- A powerful tool to save & manage web pages, build eBooks(Chm format).

Copyright © 2004 - 2010 allworldsoft.com Contact Page