|
||||||
|
||
|
Home > Security products software |
Related keywords: security, Security, computer security, internet security, security software, information security, sell products online, SECURITY, products, file security |
|
|
271. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
272. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
so that no programs are affected by its operation. Safety and security were our No. 1 concerns when we designed this program. Protect your privacy by removing Internet Explorer-saved cookies, the visited-pages history, and the recently opened files list for more than 100 popular applications, including Microsoft Office, Windows Media Player, ICQ, MSN, WinZip, RealPlayer, Kazaa, and | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
273. | Invisible CHAOS 5.1 (safechaos.net) | ||
product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
274. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
275. | lock and go 1.0 (aidsoft.com) | ||
lockngo (lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
276. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
277. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, ESCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
278. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
279. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
280. | Find Protected 2.0 (aks-labs.com) | ||
protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
|
Home > Security products software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|