|
||||||
|
||
|
Home > Breaches software |
|
|
11. | Lock Folder 5.0 (realclicks.com) | ||
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
12. | Lock Folder XP 3.4 (everstrike.com) | ||
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files, folders and drives is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
13. | Windows Password 5.0.1258 (lastbit.com) | ||
is an application for Windows NT system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. Windows Password also can be used to recover lost passwords of particular users. Really fast: search speed is | |||
Updated: 9, 2005 | Rating: 42 | Author: Vitas Ramanchauskas | Size: 349 kb | Demo Go to category: System Utilities > Other Similar programs | |||
14. | Protect Folder 98 3.0 (everstrike.com) | ||
from unauthorized access because over 80% of reported security breaches come from within an organization, not from hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private, and confidential information. And because locking your files, folders makes them invisible, they cannot be deleted | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
15. | SpyMyPC 2.0 (benutec.com) | ||
corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Stop Computer Espionage (Monitor your employee and management systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | System Shield 2.1c (iolo.com) | ||
data are also left wide open and vulnerable to all attempts at breaching security and recovering proprietary information. This information usually represents dire consequences should it "accidentally" fall into the wrong hands. System Shield uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL files that have been deleted are permanently | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
17. | Cheat Checker 2.03 (nine-patch.com) | ||
of multiple version test results. Students have learned to breach the expected security given by multiple version tests. The current Cheat Checker examines all versions of a test as marked. The structure for each answer file is: nine character ID:one space:answer string. The answer key ID is 999000111. Student records follow the answer key. A Rule of Thumb for Cheating is | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
18. | DeviceLock 5.73 (protect-me.com) | ||
is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
19. | SpyMyPC PRO 1.9 (benutec.com) | ||
corporations and government agencies - detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million ) ; Monitor Your System While You Are Away ; Monitor your employee and management systems for espionage, theft, fraud, etc) | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Breaches software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|