|
||||||
|
||
|
Home > Network security software |
Related keywords: security, network, Security, Network, network monitor, computer security, internet security, security software, network monitoring, network management |
|
|
191. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
192. | cPWD 2.6 (absolutedynamics.com) | ||
powerful Information Security Management tool that will protect the local administrator account across the network. Search Active Directory. Target multiple Administrator accounts based on the Security Identifier Descriptor (SID). Dynamically generate and apply C2-Compliant random | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 725 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
193. | CryptEnCrypt 1.10 (inetprom.com) | ||
from your computer by hackers, government, or global surveillance networks. CryptEnCrypt was developed and compiled outside of the US and is not a subject to US export restrictions. CryptEnCrypt is a powerful software applications designed for electronic data protection. It utilizes time-proven | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
194. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
195. | CSJami Minicom Pro 5.4.0.0 (csjami.netfirms.com) | ||
*Remote Modem *Scheduler *TimeCenter *Wake On Lan WOL *>128 bit security Password protected and optimised for easy use. TCP-IP and IPX enabled, 4,8, 16 bit color selection and multithreaded. Transit routing. Easily take control of remote PCs with Minicom over LAN dial-up or Internet connections | |||
Updated: 2, 2006 | Rating: 42 | Author: CSJami CSJami | Size: 5006 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
196. | Cybercafe Manager 2002 1.3 (alarit.com) | ||
management of user sessions while they use computers on the local network. Sessions costs are calculated using flexible tarif scales or using custom cost values. The program consists of two modules: 1) Cafe Control Panel (CafeCP) - the session management program that controls the | |||
Updated: 9, 2005 | Rating: 16 | Author: Konstantin Pavelko | Size: 496 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
197. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in various ways. You can hide them or prevent others from deleting | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
199. | Desktop Scout 4.0 (globalpatrol.net) | ||
in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
200. | DeviceLock 5.73 (ntutility.com) | ||
gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|