|
||||||
|
||
|
Home > Protection software |
|
|
151. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and remote computer users. e-Surveiller allows you to view the screens of monitored | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
152. | DMUSB 2.8.0 (flenik.com) | ||
same time and not in sequence, giving you up to the last minute file protection. Furthermore, it can save you from a lot of backup space and the need for huge drive arrays, by keeping only one copy of common (among several computers) files. Easy to setup - Secure to operate You don't have to be | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
153. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
154. | DeviceLock 5.73 (protect-me.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
155. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
156. | D_back 1.60.3 (backupforall.com) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
157. | D_back 1.60.3 (svap.pp.ru) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
158. | CopyCat 4.1.27 (hahntech.com) | ||
Optional email confirmation of backup completions. Optional password protection on "zip" archives. CopyCat: Protect your valuable data and software! Easy to use, powerful backup utility with scheduling capability. Copy local or remote files and folders to local or remote destinations as files or as a zip | |||
Updated: 2, 2006 | Rating: 104 | Author: Tom Hahn | Size: 1184 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
159. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 16 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
160. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|