|
||||||
|
||
|
Home > Computer network security software |
Related keywords: security, network, computer, Security, Network, network monitor, computer security, internet security, computer game, security software |
|
|
101. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
102. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
103. | Find Protected 2.0 (aks-labs.com) | ||
to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
104. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
105. | Hide Files 3.4 (hide-files.biz) | ||
images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
106. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
of printing activity. The program monitors the print tasks on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
107. | Identity Knight 1.3 (fspro.net) | ||
computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | IntraMail 2003.01.20 (dplanet.ch) | ||
exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
110. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Computer network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|