|
||||||
|
||
|
Home > Information security software |
|
|
21. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
subsystem to facilitate remote, real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. Log data is converted to text format, and delivered to a remote Snare Server, or to a remote Syslog server with configurable and dynamic facility and | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
22. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
Button Sales Totals & Reports, On the Fly Inventory Entry, Password Security, Quotes, Rentals, Inventory Control, Billing, Mailing Lists, Terms, Invoicing, Packing Slips, Automatic Sale Discounts and more. Import and export products, customers list and sales information. Send/Email all | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
23. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
24. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. Invisible Secrets Encryption Software 4 features: strong encryption algorithms; | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
26. | EXECryptor 2.3.7 (softcomplete.com) | ||
may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen. EXECryptor supplies you | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
27. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
6.0 for MS-DOS), SAM (Ami Pro 3.0), WSD (WordStar 4.0/7.0), RFT (IBM's RFT-DCA), Clipboard; - supports batch conversion (registered version only); - command line support; - supports multiple charsets; - easy to use and easy to set up; - supports multiple PDF export options (document information, 40/128 bits PDF encryption, PDF security options, page size, page | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
28. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system inspection tool is designed to browse and edit hidden data stored in undocumented Windows Protected Storage. Find IE form autocomplete data, passwords to protected web sites, account and identity passwords, internet | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
29. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system inspection tool is designed to browse and edit hidden data stored in undocumented Windows Protected Storage. Find IE form autocomplete data, passwords to protected web sites, account and identity passwords, internet | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
30. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system inspection tool is designed to browse and edit hidden data stored in undocumented Windows Protected Storage. Find IE form autocomplete data, passwords to protected web sites, account and identity passwords, internet | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|