|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
311. | Axessh Windows SSH Client 3.2 (labf.com) | ||
(apart from places where people aren't allowed to own cryptographic software). SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet ; cyber hackers stealing passwords and other important information. Axessh brings you | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
312. | BackRex Expert Backup 2.5 (backsettings.com) | ||
vulnerability! Imagine what would happen to your life if your social security data gets lost due to hardware crash… What would have happened to Tolstoy if he'd have lost his WarAndPeace.doc due to hard drive failure? Psychiatrists around the globe have already reported numerous hysteria and suicidal | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
313. | BatteryMon 2.0 1006 (passmark.com) | ||
battery charge level and other statistics for later analysis and the software comes with a comprehensive help file. Monitor the performance of laptop computer batteries and uninterruptible power supplies (UPS). Graphically see the charge / discharge rate, diagnose problem battery cells and compare your batteries performance with expected discharge | |||
Updated: 9, 2005 | Rating: 1082 | Author: David Wren | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
314. | Bazooka Adware and Spyware Scanner 1.13.03 (kephyr.com) | ||
and trackware components; sources of irritation that antivirus software does not deal with. The scanning process will only take a fraction of a second and tell you how to uninstall the unwanted software using simple step-by-step instructions or put you in contact with the vendor for the most up-to-date and safe uninstall instructions. Spyware and adware is often bundled with | |||
Updated: 3, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 750 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
315. | BestCrypt 7.20.2 (jetico.com) | ||
is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
316. | BestCrypt Corporate 1.12 (jetico.com) | ||
algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
317. | Bonodi XML Editor 2.12 (zero.ad.jp) | ||
features of Bonodi. Scripts are plain text files that contain software programs. Keyboard shortcut keys can be customized. Bonodi's search feature facilitates searching XML document(s) by XPath pattern and other search methods available in Bonodi. Bonodi's search feature can be applied to an opened XML document, or all opened XML documents, or all XML files in one or more | |||
Updated: 9, 2005 | Rating: 39 | Author: Yuji Ichikawa | Size: 3788 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
318. | Boss Key 1.6 (boss-key.com) | ||
using a hot key! Everybody should have such program for personal security. Imagine, you work with confidential information - maybe, just writing email to your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
319. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
320. | CD-DVD Lock 2.01 (getfreefile.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|