|
||||||
|
||
|
Home > Computer security software |
Related keywords: security, computer, Security, internet security, computer game, security software, Computer, information security, computer software, SECURITY |
|
|
261. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
Computers play significant role in our everyday life. We rely on tireless machines in almost every aspect of our business and private life. Everything from important corporate budget planning to vacation photos comes digital. And as we enjoy this new electronic world we sometimes seem to forget how | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
262. | CDLock 1.4 (protect-me.com) | ||
lets you set up rules for the local computer, defining when any removable disks which support auto-eject feature can be used and by whom. You can control access to any removable disks, such as CD-ROMs, optical disks, or anything else depending on the time of day and day of week. CDLock even allows controlling access to the Audio CDs so you can build secure but user-friendly | |||
Updated: 8, 2004 | Rating: 16 | Author: Ashot Oganesyan | Size: 749 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
263. | CHAOS Shredder 3.0 (safechaos.net) | ||
"about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22). CHAOS Shredder will completely erase files from | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
264. | Chaperone 4.0 (css-software.com) | ||
that there are users who shouldn't have complete access to the computer all the time. Using advanced scheduling techniques completely control of how and when the computer is used is easily obtained. Most common methods of controlling what programs can be run are based on preventing the program from running at any time. Chaperone gives the added flexibility of enhancing | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
265. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
"tap-dancing" required when you cannot remember a chat partner's details. So, with this in mind this software was created. No more jotting down peronal chat partner information on loose pieces of paper or yellow stickies. Have your database open and ready whenever you go online. Add new chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
266. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
267. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
268. | Cipherlok 2.1 (softlok.com) | ||
is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
269. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control program that enables you to work on one or more remote computers from your own. It is a complete remote control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
270. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
name suggests, ComputerSafeTM provides an internal Safe inside your computer where you can store your vital information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Computer security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|