|
||||||
|
||
|
Home > File level security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
201. | Remote Desktop Spy 4.0 (global-spy-software.com) | ||
to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop | |||
Updated: 9, 2005 | Rating: 1872 | Author: Global Spy | Size: 1297 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
202. | Security Department 1.9 (rayslab.com) | ||
Security Department is a resident file system protector for Windows 95 and Windows 98. It provides several levels of protection for different folders and files. You can prevent various actions for folders and files: copying, moving, deleting, renaming and so on. In addition | |||
Updated: 9, 2005 | Rating: 48 | Author: max sazonoff | Size: 754 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
203. | BriefAudit 1.0c (peccatte.karefil.com) | ||
every user can easily see document changes history. It selects files modifications events keeping only the essential informations: Date and time of file modification, Modifier's identification into comments area = file properties. Just right click on the file FOO and select Properties-using Windows 2000 Explorer or Command-using Macintosh finder | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2712 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
204. | Snoop 1.1 (yoursnoop.com) | ||
Help Keyword notification reports Activity Reports Log files by keywords or date. or all log files Works with Modems, Cable Modems, and DSL. Can be automatically or manually configured for browsers and e-mail clients. Snoop is built for Windows XP, Windows 98, Windows ME, and Windows 2000. Who Uses Snoop? As a parent, you no longer have to wait until you | |||
Updated: 3, 2005 | Rating: 0 | Author: Snoop Internet Security | Size: 1390 kb | Freeware Similar programs | |||
205. | iTrack Workgroup 2.1 (softopia.com) | ||
LAN or Internet mail. It is a fully multi-user system with definable levels of security and access privileges, supporting any network supported by Windows 95 or Windows NT. Because the database is stored in Microsoft Access format, you can use any of the features available in Access to manipulate your data. Any query can be exported to Excel XLS, HTML, or a formatted text | |||
Updated: 3, 2005 | Rating: 0 | Author: Mark Chenault | Size: 13680 kb | Shareware Similar programs | |||
206. | PrivacyWatcher 1.11 (managebytes.com) | ||
for protecting your privacy: - Highly reliable encryption of files using 448-bit Blowfish algorithm - Secure files deletion to prevent their recovering with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing the unauthorized access to your PC Without privacy there is no freedom | |||
Updated: 3, 2005 | Rating: 0 | Author: Mikhail Yurasov | Size: 995 kb | Shareware Similar programs | |||
207. | SabaBrowse 1.1.0 (sababrowse.com) | ||
your server, setup a few parameters (mainly database connection and security) and you can immediatly access your DBMS with an Internet browser. In a second time and if required you will be able to customize SABAbrowse so that it exactly fits to your needs. Custon SQL queries. You can define, store | |||
Updated: 3, 2005 | Rating: 0 | Author: reg CanaBase | Size: 1500 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
208. | Cloak 8.0 (insight-concepts.com) | ||
is an award winning security package designed to safeguard your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
209. | Smash! 1.3 (brokenmolds.com) | ||
friendly encryption and decryption utility, complete with Government level file wiping, and Government approved cryptography. When it comes to keeping your files secure, safe, and out of unwanted hands, Smash! is the answer to your every security need. Sporting familiar | |||
Updated: 3, 2005 | Rating: 0 | Author: Broken Molds | Size: 1086 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
210. | Super Password Guard 3.1 (topaim.net) | ||
also backup all this data at once just by copying single database file. Main features: 1. Fast, compact and easy to use program with familiar interface similar to Windows Explorer. 2. Encrypted password database files, accessible only via user selectable master password (for enhanced security, master password is used as encryption/decryption key only and is not | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > File level security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|