|
||||||
|
||
|
Home > Network security software |
Related keywords: security, network, Security, Network, network monitor, computer security, internet security, security software, network monitoring, network management |
|
|
201. | DeviceLock Me 1.42 (protect-me.com) | ||
Millennium Edition gives network administrators control over which users can access what removable devices (floppies, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Once DeviceLock Me is installed, administrators can control access to floppies, CD-ROMs or any other device, depending on the time of day and day of the week. DeviceLock Me enhances access control | |||
Updated: 9, 2005 | Rating: 16 | Author: Ashot Oganesyan | Size: 1167 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
202. | DMUSB 2.8.0 (flenik.com) | ||
the background). Based on client-server technology, DMUSB suits all networking environments, offering 365/7/24 data synchronization for multiple clients in parallel, that is, it monitors all clients at the same time and not in sequence, giving you up to the last minute file protection. Furthermore, it | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
203. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time. It stealthily records all keystrokes, Web site visits, all AOL, AIM, ICQ, MSN and Yahoo chat conversations, all windows | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
204. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
205. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
206. | Find Protected 2.0 (aks-labs.com) | ||
to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
207. | Event Log Janitor 1.0 (streiff-is.com) | ||
and you can optionally clear them. Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration. Requires the MS.NET Framework from Microsoft's | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
208. | FitoNT 1.0.0.0 (netnet.ca) | ||
today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers, unexpected hard drive or hardware crashes, and any other dangers that | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
209. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
210. | Folder Security 2.5 (folder-security.com) | ||
Security is a software program designed to password-protect folders. It lets you prevent people from viewing, printing, or altering your confidential documents. Folders remain protected should your PC be rebooted into Windows Safe Mode or DOS. A nice feature is the ability to include a password hint. Choose something sensible and it will prompt you to remember your password, without | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicole Collet | Size: 755 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Network security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|