|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
21. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
22. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
23. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
24. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
25. | EXECryptor 2.3.7 (softcomplete.com) | ||
PellesC, Visual Basic, PowerBASIC, IBASIC, PureBasic. All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
26. | Power Clock 6.03 (powerclock.com) | ||
sites via the internet or any TCP/IP network. If you have a central office and several stores or job sites, your stores can connect to the home office via the internet and send all employee hours. Import and export to Intuit Quickbooks Pro, dBase, Text. Advanced change log. The | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
27. | EMS IB Manager 4.1 (ems-hitech.com) | ||
objects; - Advanced data manipulation tools; - Effective security management; - Excellent visual and text tools for query building; - Powerful stored procedure debugger; - Impressive data export and import abilities; - Powerful visual database designer; - Easy-to-use wizards performing InterBase and Firebird services. EMS SQL Manager 2005 for IB/FB is a powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
28. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
6.0 for MS-DOS), SAM (Ami Pro 3.0), WSD (WordStar 4.0/7.0), RFT (IBM's RFT-DCA), Clipboard; - supports batch conversion (registered version only); - command line support; - supports multiple charsets; - easy to use and easy to set up; - supports multiple PDF export options (document information | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
29. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
edition) is the comprehensive component collection for Internet security. Unlike other components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
30. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
(VCL edition) is the comprehensive component collection for Internet security. Unlike other components SecureBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries SecureBlackbox is split to several packages: * PKIBlackbox - offers support for Public Key Infrastructure | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|