|
||||||
|
||
|
Home > Information security software |
|
|
181. | Norton Personal Firewall 2003 (nct.symantecstore.com) | ||
Norton Personal Firewall 2003 keeps hackers out and personal data in. Its robust defenses include intrusion detection, application control, and privacy protection — all in one easy-to-use program. Right out of the box, Norton Personal Firewall hides your PC on the Internet to keep hackers from seeing it. That action alone can prevent many attacks. In addition | |||
Updated: 9, 2005 | Rating: 0 | Author: Jennifer Leonard | Size: 766 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
182. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. Features: - Recording of user logon name, date, time and computer name - Monitoring of active tasks list - Handling of critical programs list - Sending of SMS alerts to | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
183. | System Key Wizard 2.1 (home.wol.co.za) | ||
that the component use to create the key and to extract the information from the key like Activation Date, Expiry Date,Number Of Users,Serial Number,Software Type,Software Function List and the Last Date The Software was used are exposed to you for use if you would like to write automated key generators. The component has a chipper encryptor on top of the custom encryption | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
184. | System Key Wizard 2.1 (continuumq.com) | ||
that the component use to create the key and to extract the information from the key like Activation Date, Expiry Date,Number Of Users,Serial Number,Software Type,Software Function List and the Last Date The Software was used are exposed to you for use if you would like to write automated key generators. The component has a chipper encryptor on top of the custom encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
185. | Metadata Miner Catalogue PRO 4.2.6 (peccatte.karefil.com) | ||
lines, words, characters, notes, slides, Manager, Company, Category, Security flags, Creation, Last accessed, print date, Edition time - Standard or User-defined ie customized file properties, Mac comments, - Windows 2000 file propertes, - PDF documents properties, - OpenOffice.org, StarOffice | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2980 kb | Shareware Go to category: Development > Other Similar programs | |||
186. | Alkonost ContraCopy 3.00 (alkonost.com) | ||
ordinary 1.44 MB floppy drive. ContraCopy diskettes contain unique information, that is readable only by your application. This means that every software protected via Alkonost ContraCopy will be have an unique key diskette, that must be placed to the floppy drive when your program is running. No | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
187. | Apocgraphy - Full spectrum e-mail protection 1.0.1 (Apocgraphy.com) | ||
to analyze your e-mail including keyword analysis, collaborative information sharing, adaptive algorithms, heuristics, blackholes, automatic whitelisting and blacklists. Apocgraphy comes preset defaults suitable for most users. Zero configuration is required. Just install and forget about it. Key features are: - Spam protection. - Virus protection. - Hoax protection | |||
Updated: 9, 2005 | Rating: 16 | Author: sean kahil | Size: 2336 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
188. | pcAudit 6.3 (pcinternetpatrol.com) | ||
web site” or “Your transaction on this page is secured” on your bank's web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer. Run pcAudit while | |||
Updated: 9, 2005 | Rating: 0 | Author: ISA, Inc ISA, Inc | Size: 97 kb | Freeware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
189. | IT Manager Helpdesk 2.0 (168.144.45.89) | ||
manage change and growth in IT Manager resources and other vital information on a daily basis allowing that information to be added, modified, or viewed with minimal effort. A resource can be a piece of hardware, a staff member, a location, or a vendor. The tool was intended to track | |||
Updated: 9, 2005 | Rating: 173 | Author: Ertugrul Akbas | Size: 43 kb | Commercial Go to category: Business > Helpdesk & Remote PC Similar programs | |||
190. | CHAOS Universal 6.2 (safechaos.com) | ||
Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|