|
||||||
|
||
|
Home > Security system software |
Related keywords: security, system, Security, System, system tray, computer security, internet security, security software, encryption system, SYSTEM |
|
|
321. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
322. | Easy Menu 8.1.1 (easysoftwareuk.com) | ||
are many hard disk menu systems but none as simple and flexible as Easy Menu. Unlike most systems which only allow you nine items to a page, Easy Menu can accomodate up to 200 and any of those can call sub menus which can also hold up to 200 items. You can select programs from Easy Menu by the arrow keys, by typing the number or with full alphabetic search. Easy Menu | |||
Updated: 9, 2005 | Rating: 0 | Author: John Turnbull | Size: 200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
323. | Enforcer 6.2 (posum.com) | ||
provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
324. | Event Log Janitor 1.0 (streiff-is.com) | ||
and you can optionally clear them. Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration. Requires the MS.NET Framework from | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
325. | Evidence Destructor 2.14 (emailarms.com) | ||
all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security when you use all these features. If somebody | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
326. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
327. | EXEsafe 2 (members.aol.com) | ||
It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the information, and decide | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
328. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
329. | File & Folder Protector 2.33 (softheap.com) | ||
Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
330. | File Monster 2.6.7 (nstarsolutions.com) | ||
Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Security system software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|