|
||||||
|
||
|
Home > Electronic security software |
Related keywords: security, Security, computer security, internet security, electronic, security software, electronic form, information security, SECURITY, Electronic File Management |
|
|
11. | StrongDisk Pro 2.9 (strongdisk.de) | ||
password, which is specified during disk creation, and/or insert electronic key or diskette with key file. Without required password and/or a key nobody, including developers, can access the secret data on the protected disk, even if intruders possess the physical media. After the password is entered, the disk is mounted, and you can write any data to and read from the disk in | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
planning to vacation photos comes digital. And as we enjoy this new electronic world we sometimes seem to forget how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
13. | Chameleon 2.0 (members.optushome.com.au) | ||
files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the Chameleon application on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
14. | Comm-Logger 1.0 (wcscnet.com) | ||
is ideal for logging serial data from applications like PBXes, security systems, or any application in which serial data must be recorded to a file for archive purposes, data import, or any other use. Comm-Logger's graphics interface allows for easy and intuitive use. Comm-Logger's command line interface can be started from the scheduler, startup, or anywhere else. It has a | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
15. | CryptEnCrypt 1.10 (inetprom.com) | ||
is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
16. | Data Destroyer 1.5 (braintwist-studios.com) | ||
contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
18. | Identity Knight 1.3 (fspro.net) | ||
of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | Lock My PC 3.4 (fspro.net) | ||
However, according to reports by IT specialists, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Human factor is still the greatest security issue today. Co-workers and even our spouses can easily recover any bit of information we attempt to hide in vain on our computers simply by looking at the screen of an | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
20. | ArchiDoc (3035) (canteco.net) | ||
find, share and access all document types both scanned in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
|
Home > Electronic security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|