|
||||||
|
||
|
Home > Business security software |
Related keywords: security, business, Security, Business, small business, business plan, computer security, internet security, security software, Small Business |
|
|
211. | Identity Knight 1.3 (fspro.net) | ||
network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
212. | iNeeda Password & Tracker 1.0 (msjsoftware.com) | ||
passwords and user name, or login ID, plus a description of what it's for. Save all your information in categories that you create yourself. You can use the password that is generated for you or modify it before you save it. You can add, edit or delete an entry in any category you select. Use the | |||
Updated: 3, 2005 | Rating: 16 | Author: Mike Jackson | Size: 2673 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
213. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
214. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
to create self-decrypting packages and mail them to your friends or business partners, you will be able to safely send the self-decrypting packages as zip files; a tool that allows you to transfer a password securely over the internet; a cryptboard to help you use the program from Windows Explorer and | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
215. | KGB Free Key Logger 1.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
216. | KGB Spy 3.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
217. | Lock My PC 3.4 (fspro.net) | ||
more and more each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private information on our hard drives. We install firewalls and anti-virus software to protect this data from outside | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
218. | Locked! 4.7.8 (jcmatt.com) | ||
combines simplicity of setup and use with a powerful two-tiered security system. Whether your system is powered off or on, Locked! securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
219. | Logbook 1.7 (home.t-online.de) | ||
===================================== Logbook fьr Windows 9x/ME Version 1.7 ===================================== Functions: ---------- Registration of working hours on PC including time of boot up, shut down, standby and user change. Resistant to manipulations. Detailed reports and totals of | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
220. | MicroLocked 1.6.3 (jcmatt.com) | ||
is a small, easy to setup, security program that locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered. Your system screen saver can be used normally or set to activate when your machine locks. Desktop icons and taskbar can be optionally hidden while locked. Ideal for personal or business | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 1630 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Business security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|