|
||||||
![]() |
![]() |
|||||
![]() |
||||||
|
||
|
Home > Network security software software |
Related keywords: software, security, network, Software, Security, Network, RAD Software, free software, spy software, network monitor |
|
|
151. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) ![]() | ||
Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the data passing through your dial-up connection or network Ethernet card, analyzes this data and then represents it in an easily readable form. SoftPerfect Network Protocol Analyzer is a | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
152. | SSH client for windows SSHPro 2.9 (labtam-inc.com) ![]() | ||
encrypted communication between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
153. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) ![]() | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
154. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) ![]() | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
155. | AB Screen Locker 3.62 (ab_software.tripod.com) ![]() | ||
the desktop icons are hidden too. If the system is restarted, this software will automatically load with Windows and your PC will be locked. The password used to lock and unlock the screen can contain any type of character with any length (but minimum 3). The application is loading very fast and it has a nice, friendly GUI. A small utility that allows you to lock your screen. Any key | |||
Updated: 3, 2005 | Rating: 569 | Author: AB Software | Size: 1510 kb | Shareware Similar programs | |||
156. | Ascella Log Monitor 1.0 (filemonitor.net) ![]() | ||
users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates) Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN | |||
Updated: 9, 2005 | Rating: 0 | Author: AAR Software Ltd. | Size: 700 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
157. | CryptoForge 3.2.5 (cryptoforge.com) ![]() | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
158. | Desktop Scout 4.0 (globalpatrol.net) ![]() | ||
in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
159. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) ![]() | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
160. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) ![]() | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Network security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|