|
||||||
|
||
|
Home > Network security software |
Related keywords: security, network, Security, Network, network monitor, computer security, internet security, security software, network monitoring, network management |
|
|
91. | iNet Shaper 2.191 (winfiles32.com) | ||
sharing software solution covering the variety of expensive networking equipment fuctions. It performs internet connection sharing, internet traffic accounting (billing). Software router performs network address translation (NAT), traffic shaping (optional bandwidth management for each user), has filtering capabilities, powerful user access accounting and restriction | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
92. | Internet Access Scheduler 2.0 (winutility.com) | ||
Internet Access Scheduler (IAS) is a firewall that offers user-level access controls for Windows 9x/Me. IAS enhances the standard Windows access management and once installed, administrators can assign permissions to TCP/IP connections. Internet Access Scheduler lets you control which users can access what | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
93. | Internet Security Tweak Pro 2.2 (1securitycenter.com) | ||
Security Tweak is an utility that customizes different features of the Internet Explorer Web browser. It's a snap to use and provides the tools you need to retain and manage your Web browser settings. It lets you disable individual menu items and disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. It prevents others from | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Mihailov | Size: 987 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
94. | Internet Timer 3 3.0.348 (internet-timer.co.uk) | ||
desktop, as well as supporting minimised and hidden states. Strong security features such as task list hiding, process protection, directory protection, DOS program hiding, application restrictions (based on path or titlebar, supporting wildcards) guarantee the integrity of iT3 tracked data. Network features include real-time TCP/IP transmission of log data between iT3 | |||
Updated: 9, 2005 | Rating: 39 | Author: Peter Chamberlin | Size: 4332 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
95. | Invisible Chat 1.22 (mentis.com.ua) | ||
Microsoft Windows® application for sending messages using local network. Strong built-in security allows you to keep the private information in safety. Invisible Chat is a software for communication by LAN .You can make it "invisible" for prying eyes, when undesirable person is staying behind. You can change transparency, form, color, font and other | |||
Updated: 3, 2005 | Rating: 0 | Author: Alexander Fedotov | Size: 677 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
96. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
tray, task bar or task list. For remote surveillance of (internet-) networked PCs STARR can invisibly email the log file to another PC via any standard email account or save the log directly to the server. Contains installation wizard for extremely easy setup and use.With STARR you will know who is | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
97. | IPTunnelManager 1.3 (apbsoft.com) | ||
3 times less) decrease in the volume of data transferred via the network. Multithreaded, highly effective, streaming traffic processing produces practically no negative influence on the channel capacity. To create a secure connection, the program does not require opening additional ports and it does not transfer keys via the network (as it uses a synchronous algorithm to | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
98. | Irbis Firewall 1.5 (irbis-firewall.com) | ||
to protect computers running Microsoft Windows 2000/XP against network attacks. Irbis Firewall allows you to manage packet filters and control access to Internet easily. Compact in size and handy in use Irbis Firewall provides user-friendly GUI interface for exercising control over the network access to your computer, and protects your computer against most of remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Artemy Kapitula | Size: 2765 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
99. | IzyMail Online 1.5 (izymail.com) | ||
equally well for users with a single computer, in a small home network, on an organizational's network, or a public server. IzyMail complements and extends the AOL, MSN, Hotmail or Yahoo browser interface with the capabilities of popular e-mail applications like Outlook, Eudora, IncrediMail, TheBat as well as specialized tools like SpamKiller, PDAs or handheld | |||
Updated: 9, 2005 | Rating: 0 | Author: Ulrich Schwanitz | Size: 263 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
100. | KFSensor 2.0.1 (keyfocus.net) | ||
about hackers, worms and trojans? Want to improve your Internet security? Want to detect intruders? KFSensor is a host based Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers by simulating vulnerable system services and trojans. The system is highly configurable and features detailed logging, analysis of attacks and security alerts | |||
Updated: 9, 2005 | Rating: 0 | Author: KeyFocus Team | Size: 1052 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|