|
||||||
|
||
|
Home > Access security software |
Related keywords: security, access, Security, Access, access control, ms access, remote access, computer security, internet security, microsoft access |
|
|
191. | Sticky Notes Std 5.0 (morun.net) | ||
seen by others. MoRUN.net Sticker is organized to maintain three security levels, that allows overcoming the problem of varied access to the program and notes for different users and ensures safe operation in a multiuser environment. Furthermore, all information is encrypted using the strongest algorithms (with 256-bit key encryption). Desktop Sticky Notes software. Sticky | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
192. | MoRUN.net Sticker 5.0 (morun.com) | ||
seen by others. MoRUN.net Sticker is organized to maintain three security levels, that allows overcoming the problem of varied access to the program and notes for different users and ensures safe operation in a multiuser environment. Furthermore, all information is encrypted using the strongest algorithms (with 256-bit key encryption). Desktop Notes software. Sticky Notes | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
193. | Secure Reminder 6.0 (securereminder.com) | ||
a safe and secure manner. The program is organized to maintain three security levels, that allows overcoming the problem of varied access to the program and information for different users, ensures safe operation in a multi-user environment and lets you protect information from unauthorized access using passwords. Notes information is stored in the data file that is | |||
Updated: 9, 2005 | Rating: 102 | Author: SecureReminder. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
194. | R-Guard 2.2 (r-tt.com) | ||
protection beyond the limited scope of standard Microsoft Windows security services R-Guard allows users to set access rights not only for users but for applications and system processes as well. R-Guard Host based Intrusion Detection System shields users’ files from viruses, spyware, Trojan horses, and other unwanted and potentially disastrous intruders. Most common | |||
Updated: 9, 2005 | Rating: 0 | Size: 3020 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
195. | iGo Incognito 1.2 (igo-incognito.com) | ||
and registration is completely optional. Registration gives you access to huge encryption keys, ability to organise enormous chats/forums, a much larger offline store of messages and access to priority support. iGo Incognito - Secure communications using a public key infrastructure and the Advanced Encryption Standard (AES). Supports rich voice/text messages, offline and | |||
Updated: 9, 2005 | Rating: 48 | Author: Paul Roigan | Size: 1541 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
196. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
Card implementations from 3rd-party vendors. It also provides easy access to information about digital certificates and the ability to add and delete certificates from certificate stores found in the registry, filesystem, or even directly in memory. Chilkat Crypt is an advanced ActiveX encryption encryption with digital signatures as well as | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
197. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
198. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
mixed up. You may choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. With this program it's | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
199. | StrongDisk Pro 2.9 (strongdisk.de) | ||
disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during disk creation, and/or insert electronic key or diskette with key file. Without required password and/or a key nobody, including developers, can access the secret data on the protected disk, even if intruders possess the physical | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
200. | SignGen 1 (gjsmith.com) | ||
authenticate any document. SignGen is developed in Microsoft Access 2000 and is a fully compliant SQL data solution. This solution can reside on a server and provide rapid multiple user access. SignGen is a program that generates a unique electronic signature block that can be used to stamp a word document, e-mail or other electronic media as a valid document that | |||
Updated: 9, 2005 | Rating: 0 | Author: Garry Smith | Size: 2490 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
|
Home > Access security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|