|
||||||
|
||
|
Home > Security tools software |
Related keywords: security, tools, Tools, UML Tools, Modelling Tools, Security, computer security, internet security, security software, webmaster tools |
|
|
231. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
232. | Remote Access 1.0 (nawab.1cis.com) | ||
1.0 is a cheap , powerfull , simple remote administration/monitoring tool with many advanced features like 128-bit encryption , IP Filtering , NT Security , Full control , file transfers , telnetting , remote shutdown , remote log-in/;log-off etc..and very cheap. It is a very essential | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahamed Abdulla | Size: 2558 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
233. | RemoteExec 3.07 (isdecisions.com) | ||
is a very powerful tool for remotely updating your Windows NT/2000/XP networks. It allows you to remotely execute the same program simultaneously on multiple computers, without requiring preinstalled agents on target machines. RemoteExec® will dramatically minimize, simplify and secure all software and operating system administration tasks (Application and upgrade | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
234. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
235. | Search Backups 1.2.2 (ab-tools.de) | ||
Search Backups you can manage your copies for security or other CDs / DVDs. For that the folder and file structure is being read and saved completely. After that you can move through the whole folder and file structer of all indexed CDs / DVDs the same as the CDs / DVDs were in you drive. Additionally you have the possibility to search for folders or files in all indexed CDs / DVDs | |||
Updated: 9, 2005 | Rating: 0 | Author: Andreas Breitschopp | Size: 1236 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
236. | Security Folder 2.0 (everstrike.com) | ||
protection. Despite the fact that there are many 3d party data security solutions on the market today, few of them offer an intuitively easy way to protect files and folders on local hard drive from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while making | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
237. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
238. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
Log, Wake on LAN, Run Script etc.). Sentry-Pro consolidates all security, application and system events into a single database of your choice - MSSQL Server, MySQL, MS Access. It contains Event Log, Syslog events, application history (tasks performed, success or failure in filtering events, etc.). The Configuration Wizard is the tool that allows the auto-detection | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
239. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
240. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
to thoroughly delete a file on your hard drive in a way no un-delete tool could ever restore it again. ShyFile works independently from all your web based email accounts and desktop email applications. Create secure files that carry your encoded contents. Use your browser to decode. Symmetric keys are | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security tools software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|