|
||||||
|
||
|
Home > Business security software |
Related keywords: security, business, Security, Business, small business, business plan, computer security, internet security, security software, Small Business |
|
|
91. | Professional PLUS Edition 3.2 (solarwinds.net) | ||
Profession Plus Edition contains 34 Network Discovery, Monitoring and Management tools. Build a DB of your network with NETWORK SONAR, Monitor traffic with the ADVANCED BANDWIDTH MONITOR, use WAN KILLER to generate traffic, SNMP BURTE FORCE ATTACK to test community strings, have the NETWORK MONITOR email you | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Rogers | Size: 50557 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
92. | Shift Scheduler Continuous Excel 12 (bizpeponline.com) | ||
The Shift Scheduler will build a roster structure to your specifications, allocate staff automatically, and generate a printable roster, all at the click of a button. It is compact and user friendly allowing you to add staff and shifts (maximum 150) with ease. Default values for continuous shifts mean that | |||
Updated: 9, 2005 | Rating: 0 | Author: David Morcom | Size: 250 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | ActiveX Windows NT/2000 group and account UserManager 2.03 (pstruh.cz) | ||
Complette COM interface to Windows NT/2000/XP local or domain account database. Contains simple powefull objects for creating, deleting, managing and enumerating user accounts, groups, servers and domains in ASP, WSH, IE, VBA, VBS/JS and T-SQL. You can change any of the user or group properties. Features | |||
Updated: 9, 2005 | Rating: 200 | Author: Antonin Foller | Size: 292 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
94. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
95. | Security Folder 2.0 (security-folder.com) | ||
information value increased dramatically. From private messages to business-critical data – every singe bit of valuable information we may have on our computers requires reliable protection. Despite the fact that there are many 3d party data security solutions on the market today, few of them offer an intuitively easy way to protect files and folders on local hard drive from | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
96. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
with an adult stranger? Are your employees emailing your business secret to your competitors? If you do worry about these issues, SpyAnytime PC Spy is the right choice! Allows you to secretly monitor and record all activities of computer users with just a simple click, e.g. keystroke, email, online chat, password, web site, and take screen snapshot at set intervals but does | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance. The award-winning WinTasks 5.0 Professional is the most reliable and intuitive software that enables you to fully take charge of your computer. While running Windows and common applications, your computer is also silently operating a vast number of | |||
Updated: 9, 2005 | Rating: 0 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
98. | Anti-BO 1.5b (swiftprogramming.com) | ||
Anti-BO is a listening device which sits in your system tray awaiting hack attempts from Trojan programs like Back Orifice and Netbus. The program works my making your system look vulnerable to those who scan the internet for infected machines, and logs attempts of entry with your attackers IP address & | |||
Updated: 9, 2005 | Rating: 69 | Author: Ben Hynes | Size: 1100 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
99. | Clean Disk Security 7.37 (theabsolute.net) | ||
be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin Solway | Size: 650 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | File Shredder 2.0 (mazepath.com) | ||
easily recovered, including your financial information and sensitive business documents. Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Business security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|