|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
101. | SecurDesk! 5.32 (cursorarts.net) | ||
many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
102. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
103. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
104. | Password Administrator 3.0 (infintron.com) | ||
tool, auto-logon, minimize to system-tray, secure encryption, access log, password generator, import/export, and more. 10 fields including notes, web addresses, ID's, email, assign and expire dates. Simple to operate and fast when finding passwords accounts. Award-winning utility to manage password accounts. Features include grouping and sub-grouping, multiple databases | |||
Updated: 9, 2005 | Rating: 48 | Author: Jeff Carpenter | Size: 4762 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
105. | Password Officer DeLuxe 5.0 (compelson.com) | ||
storing, securing, changing, organizing, transporting and accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure. -universal Single Sign-on solution | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
106. | Password Spectator Lite 1.401 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
107. | Password Spectator Pro 3.10 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
108. | PCWash 3.2 (pcwash.com) | ||
auto complete, recent files lists, browser cache, browser history logs, site addresses, Windows temporary files, cleans recycle bin, frees up valuable drive space and securely deletes and overwrites any file you selectively choose. PCWash also prevents rogue website from changing your browsers homepage settings without permission. PCWash is easy to use and customize to clean only | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
109. | ProBot 2.5.0 (nethunter.cc) | ||
and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | ProBot SE 2.3.0 (nethunter.cc) | ||
watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for monitoring Internet activity because it enables you view all of the Web site URLs visited by a subject. ProBot SE is | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|