|
||||||
|
||
|
Home > Security tools software |
Related keywords: security, tools, Tools, UML Tools, Modelling Tools, Security, computer security, internet security, security software, webmaster tools |
|
|
201. | EZ Macros 5.0A (americansys.com) | ||
macro utility. The intuitive interface makes EZ Macros the perfect tool for both new and experienced users. And EZ Macros can help you to automate all of the repetitive tasks you face each day! With EZ Macros you can "record" keystrokes and/or mouse movements or you can create macros manually. Hundreds of possible macro hot keys are available. When you create or edit a macro, EZ | |||
Updated: 9, 2005 | Rating: 48 | Author: Matt Porter | Size: 758 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
202. | Armor System5 2.2.2 (ambitware.com) | ||
encryption program for everyone who is serious about data security. The program includes three modules: File Encryption Module, Text Encryption Module (with built-in word processor), and Email Encryption Module. Each module takes a full advantage of the 40 industry-standard encryption algorithms and eliminates the need of user management of encryption keys. Keys are generated | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
203. | I-Cipher AP 2.2.2 (ambitware.com) | ||
documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It proves to be an invaluable | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
204. | IT Manager Helpdesk 2.0 (168.144.45.89) | ||
be a piece of hardware, a staff member, a location, or a vendor. The tool was intended to track information relevant to everyday operations of IT departments in a way that nothing else ever has before. There is the ability to enter hardware and relevant component, application, and backup information | |||
Updated: 9, 2005 | Rating: 173 | Author: Ertugrul Akbas | Size: 43 kb | Commercial Go to category: Business > Helpdesk & Remote PC Similar programs | |||
205. | CHAOS Universal 6.2 (safechaos.com) | ||
CHAOS Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. CHAOS Universal is the utility program for safe distribution of the information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 1023 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
206. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
MS SQL Server(MSDE)2000 client tool, query analyzer and dba utility to design, create, query, backup, manage and monitor database from a web browser. Pure ASP script, no installation needed. Freeware for Educational and Personal usage. For DBA ( Database Admin ) o Maintain Operators, Categories, Alerts, Notifications, Jobs, Job Steps and Schedules. o Monitor connections | |||
Updated: 9, 2005 | Rating: 72 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
207. | Cheat Checker 2.03 (nine-patch.com) | ||
test results. Students have learned to breach the expected security given by multiple version tests. The current Cheat Checker examines all versions of a test as marked. The structure for each answer file is: nine character ID:one space:answer string. The answer key ID is 999000111. Student records follow the answer key. A Rule of Thumb for Cheating is five to seven | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
208. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in monitoring their business or their home, Visual Hindsight is a powerful, easy to use and affordable desktop video surveillance and | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
209. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to find | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
210. | WDumpEvt 2.2 (eventlog.com) | ||
is an administration tool that makes it easy to view and manage all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the log from any remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security tools software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|