|
||||||
|
||
|
Home > Security products software |
Related keywords: security, Security, computer security, internet security, security software, information security, sell products online, SECURITY, products, file security |
|
|
321. | PDF-XChange SDK For Developers 2.5 (docu-track.com) | ||
and the PDF-Tools SDK's are utilities to (for Merge/Split/Scan/Bookmark or direct conversion of Image formats to PDF) provide a simple and easy way to create native Adobe PDF files, with fully searchable text, with a variety of compression & Quality options, you can also design and add watermarks. With licensing options from 1 user to a worldwide Corporate license, PDF-XChange | |||
Updated: 9, 2005 | Rating: 0 | Author: John Verbeeten | Size: 3053 kb | Commercial Go to category: Business > Office Suites & Tools Similar programs | |||
322. | PECompact 2.75 (bitsum.com) | ||
make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC plug-ins. Custom loaders (decompression) stubs and API hook plugins are also able to be utilized. Advanced configuration includes selection of resource types that | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
323. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
324. | Port Flash 3.0 (webroot.com) | ||
TCP/IP port scanner tool for network administrators and computer security professionals. It is a unique and specialized tool that normally could only be acquired as a component of a more expensive solution. Webroot designed PortFlash to address the needs of system administrators. PortFlash encapsulates some very powerful features into a simple, time-saving network utility that is | |||
Updated: 3, 2005 | Rating: 42 | Author: Steve Thomas | Size: 1409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
325. | PowerKey 2.0 (gals1.chat.ru) | ||
with many unique features which you won't come across in other products of such a kind available online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
326. | Privacy Master 3.9 (webroot.com) | ||
within your computer that only you have access to. Whether it's an outside hacker, or someone sitting at your keyboard, you can rest assured that your personal information stays personal. Secure your personal information - Protect yourself from data theft - Guard your privacy on the Internet -- hide, lock, and encrypt your sensitive information and | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
327. | PrivacyWatcher 1.20 (managebytes.com) | ||
offers you a brand new level of freedom, superior to other similar products! PrivacyWatcher is software that cleans up the history of your computer activity and protects your computer from the unauthorized access. It cleans up the tracks left by Internet Explorer, Windows, Netscape, Mozilla, Opera, MS Office and | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
328. | Privilege Master 1.0 (shareware-promotion.com) | ||
every IT manager knows, security is a trade-off between usability and the level of protection required. For example, to prevent users making unauthorised configuration changes to their system, users are normally given only basic security rights to their system. This is fine until the user has a legitimate reasons to make changes to their system. Perhaps to install a software | |||
Updated: 9, 2005 | Rating: 16 | Author: Blue Square Software Blue Square Software | Size: 9085 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
329. | Enterprise Accelerator 3.0 (smartalec2000.com) | ||
stack for network performance - Optimize TCP/IP stack for network security: - Optimize system core for application performance - Optimize system core for application stability - Enable dynamic processor cooling - Quick access to manage computer, analyse/defrag/clean-up disk drives, manage | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Wong | Size: 1772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
330. | Program Protector 2.1 (blumentals.net) | ||
Protector is state of art security utility, which allows you to password protect programs. You can password protect any Windows application. This functionality is achieved using a special algorithm which modifies executable file of the application, so that it requires to enter valid password before program can start. Program Protector is very easy to use and does not require any | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security products software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|