|
||||||
|
||
|
Home > Facility security software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
191. | R-Guard 2.2 (r-tt.com) | ||
protection beyond the limited scope of standard Microsoft Windows security services R-Guard allows users to set access rights not only for users but for applications and system processes as well. R-Guard Host based Intrusion Detection System shields users’ files from viruses, spyware, Trojan horses, and other unwanted and potentially disastrous intruders. Most common applications | |||
Updated: 9, 2005 | Rating: 0 | Size: 3020 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
192. | CryptOne 1.1 (eniksoft.com) | ||
or let the program generate it for you. For increasing password security you can set to hide password with (*). The program uses 2048 byte key for encode data. It means high security level for your files. To break password it needs billion and billion of years. We recommend to use for password combiantion of up and down case chars and numbers. The program can also be used to | |||
Updated: 9, 2005 | Rating: 48 | Author: Nikolas Ehrenberg | Size: 421 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
193. | iGo Incognito 1.2 (igo-incognito.com) | ||
iGo Incognito - the most secure instant messaging system available. iGo Incognito provides encrypted instant messaging, private chats and open forums. The iGo Incognito network is built on a combination of public key encryption and the US Advanced Encryption Standard (AES). If you want to be sure that | |||
Updated: 9, 2005 | Rating: 48 | Author: Paul Roigan | Size: 1541 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
194. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
Chilkat Crypt .NET is an advanced encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
195. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
196. | EasyHues Pro 2.1 (easytools.com) | ||
EasyHues Pro, a program that lets you create color schemes and explore the world of colors. You can create your random color schemes from among 16 million colors with EasyHues Pro. Use the HEX value or the RGB value of the colors in your favorite image editing program. Are you fascinated about colors? Are | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 324608 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
197. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
Maintains your privacy by not allowing others to see which web sites you have visited or what you have done in Windows. All options can be cleared with just one click, or even automatically at startup, shutdown, or at a certain time of day. 12-Wash removes tracks deliberately, even where other programs fail | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
198. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
mixed up. You may choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. With this program | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
199. | TrojanShield 2.20 (trojanshield.com) | ||
Use Trojan Shield to protect yourself from hackers and Trojan viruses. If a hacker tries to break into your computer, Trojan Shield automatically warns you so you can take action against them. You don't need to be a computer expert to use Trojan Shield, Just install it and let it go to work. The trial | |||
Updated: 9, 2005 | Rating: 0 | Author: Lewis Guest | Size: 2072 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
200. | Snare Micro Server 1.2 (intersectalliance.com) | ||
Snare Micro Server is a program that provides a central collection facility for a variety of log sources, including Snare Agents for Windows, Solaris, AIX, Irix, ISA Server, IIS Server, Lotus Notes (and others), plus any device capable of sending data to a syslog server. Snare is currently used by hundreds of thousands of individuals, and organisations worldwide. Snare agents are | |||
Updated: 9, 2005 | Rating: 0 | Author: InterSect Alliance | Size: 439 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Facility security software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|