|
||||||
|
||
|
Home > Business security software |
Related keywords: security, business, Security, Business, small business, business plan, computer security, internet security, security software, Small Business |
|
|
251. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
252. | TK8 Safe 2.5 (tk8.com) | ||
TK8 Safe is the password manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
253. | Too Many Secrets 0.3.1 (fdsoftware.it) | ||
You can print or export your password to various format. There's a lite systray only version also included. Version 0.3.1 -New and changed- 1. Rewrite of the Help System. 2. Context-sensitive Help in some windows. 3. Program translation in Italian finished (now i've to do the translation of this help). 4. New Field with Email address for each service defined. 5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Francesco Duranti | Size: 1948 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
254. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Top Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
255. | Total Text Security 1.0 (softsphere.com) | ||
your correspondences, your competitors could strike at your business? Do you want to be sure the message you received was sent by your partner, and not by somebody else? Then you should use Total Text Security! Simply type your message in the editor window of your e-mail client, ICQ client (or any other program), and Total Text Security will encrypt the message you | |||
Updated: 9, 2005 | Rating: 0 | Author: Iliahu Rabinovich | Size: 463 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
256. | venta-sign 2.0.0.142 (ventasoft.de) | ||
high-security signature and encryption with smartcards and soft token (PKCS#12). All german qualified Trustcenter supported. This programm is evaluated and certified by "ITSEC E2 high"(european security standard & Level). venta-sign is a suite for cryptography with 2 main components: venta-sign - shell extension (easy sign & encrypt) venta-container - application (sign | |||
Updated: 9, 2005 | Rating: 0 | Author: F. Byszio | Size: 14489 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
257. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
258. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in monitoring their business or their home, Visual Hindsight is a powerful, easy to use and affordable desktop video | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
259. | WhatChanged for Windows 2.0 (prismMicroSys.com) | ||
and viewing actions can be restricted in compliance with existing security rules. Change reports provide detailed information, useful when interacting with vendors. The friendly Change Browser permits easy traversal of the file and registry. Powerful filtering capabilities are available to exclude any subtree. Configurable options include the frequency and number of automated | |||
Updated: 9, 2005 | Rating: 0 | Author: Prism Microsystems | Size: 4783 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
260. | WIDO Logbook 1.3 (home.t-online.de) | ||
WIDO Logbook for Windows NT, 2000 and XP Version 1.0 from 10.02.2003 Copyright © Witold Domogala http://www.wido-software.de Email: domogalla@t-online.de --------------------------------------------- 'WIDO Logbook' consists of 2 programs: 1. LogbookService.exe 2. LogbookReports.exe REGISTRATION | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Business security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|