|
||||||
|
||
|
Home > Desktop security software |
Related keywords: security, desktop, Security, Desktop, desktop utility, desktop enhancements, computer security, internet security, security software, desktop publishing |
|
|
171. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
172. | Remote Administrator 2.2 (radmin.com) | ||
computers from your own computer. You see the remote computer desktop displayed either in a window or full screen on your computer monitor. All your mouse and keyboard functions are transferred to the remote computer. You work with the remote computer as if you are sitting in front of it. The remote computer can be located anywhere on the Internet or LAN. It is a complete remote | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
173. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
provides transparent on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is performed automatically and transparently on the fly. You can do anything with a SafeHouse | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
174. | SafeLogon 2.0 (gemiscorp.com) | ||
to another one of similar characteristics. - Apply important security-related tweaks for controlling user access to key Windows components, such as Control Panel, Desktop and Explorer, Network, Start Menu and Taskbar, Display, and so on. Furthermore, SafeLogon is completely administrable through an easy-to-use, familiar interface and is 100% compatible with all 32-bit | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
175. | SecurDesk! 5.32 (cursorarts.net) | ||
many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
176. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
works independently from all your web based email accounts and desktop email applications. Create secure files that carry your encoded contents. Use your browser to decode. Symmetric keys are employed for your email and HTML encryption, as well as for the binary file encryption. Includes a File Shredder. Max. 6144-bit depth of | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | PAL PC Tracker Lite 1.01 (palsol.com) | ||
the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. Additionally, it will post a second message on to our servers containing the exact location for extra | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
178. | Palm Desktop Utilities 1.3 (palmosworld.com) | ||
Palm Desktop Utilities version 1.3. Palm Desktop Utilities was created by two PalmOS handheld Technical Support Agents who understand the importance of backing up, copying, and restoring your valuable and irreplaceable Palm Desktop data. Never lose your important Palm Desktop data again because of a hard drive crash, file corruption, or hotsync error | |||
Updated: 9, 2005 | Rating: 1906 | Author: Kevin Steele | Size: 8301 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
179. | Password Book 5.1 (primasoft.com) | ||
the program; -Generate any number of passwords; Password Book: It's an information manager that lets you easily keep track of all your passwords, access codes, important numbers, ..... The similar format to a regular note book makes the program very easy to use and | |||
Updated: 9, 2005 | Rating: 0 | Author: Marek Kosznik | Size: 300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
180. | Password Protected Lock 2.91 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Desktop security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|