|
||||||
|
||
|
Home > Network security software software |
Related keywords: software, security, network, Software, Security, Network, RAD Software, free software, spy software, network monitor |
|
|
21. | TradingSolutions 3.1 (tradingsolutions.com) | ||
is a financial analysis software package that combines traditional technical analysis with state-of-the-art artificial intelligence technologies. Use any combination of financial indicators in conjunction with advanced neural networks and genetic algorithms to create remarkable effective end-of-day or real-time trading models for the stock, futures and forex | |||
Updated: 9, 2005 | Rating: 0 | Author: NeuroDimension Incorporated | Size: 58568 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
22. | Trusted Messenger 2.7 (notepage.net) | ||
time messaging software designed for business use. Trusted Messenger is a peer to peer application, that allows network users to communicate in a fast effective manner, without the the delays associated with email. Companies that utilize Trusted Messenger, instant messaging software | |||
Updated: 9, 2005 | Rating: 0 | Author: NotePage, Inc. NotePage, Inc. | Size: 1068 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
23. | Access Developer Application Architect 1.04 (fcs-software.com) | ||
You can run Code, Forms, Reports or Queries. Our Menu has built in Security features using the Access Security module or you can ignore these features. Program and Data are split. Menu program handles the location of the backend data file. This can be local or networked location. Views | |||
Updated: 9, 2005 | Rating: 814 | Author: Howard Powell | Size: 4668 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
24. | cryptlib 3.0 (download.componentspot.com) | ||
by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
25. | gReg 4.55 (gitanosoftware.com) | ||
many people want your software, some are thieves. Don't take that chance, protect your work! gReg armors your software against thieves-and safeguards your revenues. Our protection is bulletproof! Our competitors offer only simple software licensing and authorization. gReg out-strips the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | Registrar Registry Manager 4.03 (resplendence.com) | ||
the registry on both the desktop as well as remote computers on the network. It offers the benefit of a one-stop registry management solution, a very rich set of tools which replaces a large range of separate utilities. It is safer than Regedit, the native Windows registry editoras this software offers registry backup and restore features as well as multilevel undo. The | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
27. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
28. | Smart Pix Manager 8.05 (xequte.com) | ||
can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in encrypted zips. Databases can be shared across a network and support for off-line sources is included (e.g. prompting for the correct CD-ROM). Features include: Wide Format Support, including all common Images, Sounds, Videos, Text | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
29. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
30. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the data passing through your dial-up connection or network Ethernet card, analyzes this data and then represents it in an easily readable form. SoftPerfect Network Protocol Analyzer is a | |||
Updated: 2, 2006 | Rating: 40 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Network security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|