|
||||||
|
||
|
Home > Windows security software |
Related keywords: security, windows, Windows, Security, computer security, internet security, Windows XP DDK, windows clipboard, windows ce, Windows 2000 |
|
|
131. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
visits, all AOL, AIM, ICQ, MSN and Yahoo chat conversations, all windows, applications, file changes etc. User-activity logs are periodically transferred, uploaded or emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
132. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
and boost performance up to 300% with this best optimizing suite for Windows. Window Power Tools optimizes Windows GUI to make windows run faster, it also makes your internet connection faster and decreases downloading time. It optimizes Modems, LAN, DSL, Cable, ISDN, T1 and Satellite connections. The modem dialing speed is boosted to three times as fast | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
133. | Directory Watch 4.0 (lohja-associates.com) | ||
You use the Directory Watch application to monitor a file system and react when a number of files in the directories exceed your threshold. This makes it possible for you to quickly and easily launch business processes. For example, you have a mail, fax, print, or web server that accepts request in forms | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Lohja | Size: 731 kb | Demo Go to category: System Utilities > Other Similar programs | |||
134. | DeviceLock 5.73 (ntutility.com) | ||
of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
135. | DeviceLock 5.73 (protect-me.com) | ||
of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
136. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
138. | Chop 1.504 (SinnerComputing.com) | ||
you are a spy, you can divide a file up and even semi-encrypt it for security reasons...) Using either a normal window or a wizard interface, files can be split by either the number of files that you want, the maximum file size, or you can use preset common sizes for EMailing, floppies, Zips, CDs, etc... The program can Chop and UnChop files in Wizard and normal interface, and | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 36 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
139. | BackToZIP 7.10 (OnlineTimer.de) | ||
- Creation of Backup Profiles - Scheduled backups with Windows Scheduled Tasks - Control via Command Line Parameters - File selection by File Date or Archive Flag - Definition of Exception Lists - Backup Reports - ... Easy-to-use BackUp Tool for manual or automated backups (ZIP Compatible). BackToZip also allows for archive distribution across multiple media, splitting into | |||
Updated: 2, 2006 | Rating: 0 | Author: Mathias Gerlach | Size: 3217 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
140. | Axessh Windows SSH Client 3.2 (labf.com) | ||
is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places where people aren't allowed to own cryptographic software). SSH is the | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
|
Home > Windows security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|