|
||||||
|
||
|
Home > System security software |
Related keywords: security, system, Security, System, system tray, computer security, internet security, security software, encryption system, SYSTEM |
|
|
331. | !Remove Access Passwords! 2.0 (e-tech.ca) | ||
you have a password protected Access Data file (MDB)? Is your system administrator unavailable, and you need access to your data. Do you need to modify your MS Access program code, and the programmer isn’t available? Do you like to hack? Do you have a database with user-level security | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Britto | Size: 1515 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
332. | SafeCryptor 1.5 (gemiscorp.com) | ||
customers, friends or family. SafeCryptor is the encryption system where your own computer is your unique key, especially suitable for the secure transfer of passwords between two computers. Some of its features and benefits are: - Recipients just need their own computers for decrypting the information; their computers are their unique keys. - Robust and complex encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
333. | SafeLogon 2.0 (gemiscorp.com) | ||
and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its Administrator to: - Restrict access to Windows to certain users, optionally controlling the days of the week and the time of the day the user is allowed to | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
334. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail client to pick up e-mail locally. Other users (hackers) cannot read your username / password across the LAN or the Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
335. | SecurDesk! 5.32 (cursorarts.net) | ||
or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
336. | Secure Disk 1.1 (wekasoft.com) | ||
which can create encrypted virtual disks on Windows operation systems to protect your files or data from been accessed by others. Using the powerful and proven cryptographic algorithm it can provide the best security. After installing SecureDisk, you can choose to create a virtual disk file which acts as a container that contains data and when been mounted by SecureDisk, a | |||
Updated: 9, 2005 | Rating: 0 | Author: weka zhang | Size: 1682 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
337. | Security Folder 2.0 (everstrike.com) | ||
as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. >From private messages to | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
338. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
339. | ShutDown NOW! 4.6 (dworld.de) | ||
for sure perfectly working together with modern Microsoft operating systems, like MS-Windows 2000 and XP. - SHDN! can shut down your computer comfortable, professional and securely, supporting all capabilities provided by the installed operating system, and additionally offers a big variety of tricky features, you never will find elsewhere. - SHDN! has built-in more than 5 | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
340. | PAL PC Spy 2004 3.01 (palsol.com) | ||
in on-line surveillance that incorporates a computer monitoring system with the latest web filtering technologies. PAL will automatically record everything your spouse, children and employees do online. Features include: email monitoring (incoming/outgoing), chat rooms, instant messages complete keystroke logging, filtering by meta tags, url and keywords and more. Up to now, other | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1677 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > System security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|