|
||||||
|
||
|
Home > Internet security software |
Related keywords: internet, security, Internet, Security, internet explorer, Internet Explorer, internet privacy, computer security, internet marketing, INTERNET |
|
|
151. | MoRUN.net Sticker 5.0 (morun.com) | ||
you can organize sticky notes in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats). MoRUN.net Sticker provides an easy way to write down important ideas and | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
152. | Secure Reminder 6.0 (securereminder.com) | ||
custom time interval) desktop reminders and send reminders over LAN/Internet. Secure Reminder will help you organize personal information, manage appointments and tasks, make to-do lists, quick notes, and more.You can quickly create two kinds of computer reminder notes (usual, secure) using different fonts and colors, set expiration time for any reminder note; organize notes and | |||
Updated: 9, 2005 | Rating: 102 | Author: SecureReminder. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
153. | EZ-Forms Express 5.50.ec.220 (ez-forms.com) | ||
too. Deskew and rotation keep things straight. Encrypt forms for security. Set cursor and type. Correct mistakes easily.. Many form templates included. The WYSIWYG (what-you-see-is-what-you-get) interactive screen is clear, intuitive and easy to use. Font size, typeface and printer options | |||
Updated: 9, 2005 | Rating: 77 | Author: Ed Marion | Size: 19217 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
154. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
155. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
cookies, temporary cached files, and the typed-address list of Internet Explorer, AOL, MSN, Netscape Navigator, and Opera. Many Windows options, as well as most-recently-used menus are wiped. It even deletes locked files (files that are in use, for example those ominous "index.dat" files). 12-Wash queues deletion for the next Windows restart when the files are no longer locked | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
156. | StrongDisk Pro 2.9 (strongdisk.de) | ||
on your computer. * Secret information can be transferred through Internet in protected disk image files. * Secure storage of backup copies and transportation of secret data on floppy and Zip disks, CDs and other removable media. Ease of Use * All means included in StrongDisk are well integrated into Windows interface. * User is not supposed to spend his time for additional | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
157. | Event Log Janitor 1.0 (streiff-is.com) | ||
and you can optionally clear them. Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration. Requires the MS.NET Framework from Microsoft's | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
158. | TrojanShield 2.20 (trojanshield.com) | ||
Use Trojan Shield to protect yourself from hackers and Trojan viruses. If a hacker tries to break into your computer, Trojan Shield automatically warns you so you can take action against them. You don't need to be a computer expert to use Trojan Shield, Just install it and let it go to work. The trial | |||
Updated: 9, 2005 | Rating: 0 | Author: Lewis Guest | Size: 2072 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
159. | m9P Phonebook2 2.1 (mental9Production.com) | ||
of exporting a database to a web form for use on the intranet or the internet. Phonebook records can have multiple forms of attachments, i.e., movie, sound, or text file. m9P Phonebook2 is also equipped with an internal media player, a web browser, and a text editor. m9P Phonebook2 can be used free | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 11348 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
160. | R-Firewall 1.0 (r-tt.com) | ||
It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages. Automatic configuration | |||
Updated: 9, 2005 | Rating: 54 | Size: 3399 kb | Freeware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
|
Home > Internet security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|