|
||||||
|
||
|
Home > Security utilities software |
Related keywords: security, utilities, Security, Utilities, computer security, internet security, security software, information security, SECURITY, internet utilities |
|
|
301. | Data Destroyer 1.5 (braintwist-studios.com) | ||
contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with Windows | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
302. | ScreenLock 9.0 (screenlock.com) | ||
to guess what the answer is. ScreenLock is an excellent PC & file security program providing easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
303. | Geometry 1.1 (palmway.ca) | ||
Features: Enhance OS 5 Free upgrades Help Docs Enhance security Calculate geometry figures as spheres, triangles, cones, trapezoids, circles and right cylinders. Also, it has an application in engineering as calculation of the flow in an open trapezoid | |||
Updated: 8, 2004 | Rating: 290 | Author: Alvaro Adarraga | Size: 130 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
304. | Port Invader 1.1 (triosade.com) | ||
open and closed ports. Port Invader is a simple, easy to use TCP/IP utility that will give you port information on any range or list of IP Addresses. Great for system administrators or security professionals. Scan a range or list of IPs for open and closed ports. Port Invader is a simple | |||
Updated: 8, 2004 | Rating: 0 | Author: Jordan DeLozier | Size: 2967 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
305. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your staff, children, spouse or significant other type on your computer when you are | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
306. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
both home and organizational levels. It is an effective monitoring utility which can locate your problem area without being located itself. It tracks all the computer activities and applications, including keyboard strokes, passwords, incoming and outgoing chat conversations, emails, and visited websites. Features which make it unique are its powerful keyboard logger - so powerful | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
307. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
308. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
309. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
File Sniffer is a powerful network security utility for logging SMB protocol (sometimes called NetBIOS over TCP) files operations and capturing file bodies, transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of logging: detailed and errors only; - intercept files transmitted within a LAN by SMB protocol (Windows and | |||
Updated: 8, 2004 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
310. | SnoopTrap 3.0.2 (snooptrap.com) | ||
to guess what the answer is. SnoopTrap is an excellent PC & file security program providing easy, yet secure access to your private data while denying other's attempts to access your computer. Optional | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 5405 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Security utilities software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|