|
||||||
|
||
|
Home > Detecting software |
Related keywords: metal detecting software |
|
|
331. | Password Officer DeLuxe 5.0 (compelson.com) | ||
logon to web-pages -fills in the URL, forms, clicks to buttons -detects and fills in any program window -automatically runs programs -allows to define and run keyboard macros -one-click to your favorite password -quick search for right password -complex, yet easy to use stylish interface -secure storage for credit card numbers and all secrets -Terminal Server and Linux | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
332. | PC DoorGuard 4 (astonsoft.com) | ||
trojan horses and is constantly updated. Using PDG you will easily detect and remove all known trojan horses running on your PC with a click of a | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
333. | Personal Antispy 1.2 (blazingtools.com) | ||
- antivirus is not enough! Antivirus software and firewalls cannot detect most keylogger programs. Top 7 reasons to own Personal Antispy: You have confidential information on your computer (bank account information, credit card information, employee records, etc. You are suspecting your spouse is spying on your online activity. You like to cyberchat with the opposite sex, and | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
334. | PestPatrol 3.0 (safersite.com) | ||
the entire corporate network. PestPatrol defeats the threat by detecting and eliminating: * Trojan horses: denial-of-service attack agents, remote access trojans (RATs), and more * Hacker tools: Password crackers, key loggers, port scanners, and more * Spyware: Rogue applications that phone home user and system information without permission. These pests create back doors | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
335. | Port Flash 3.0 (webroot.com) | ||
on the network has setup a rogue FTP or HTTP server, PortFlash can detect it. PortFlash is the affordable, easy-to-use TCP/IP port scanner tool for network administrators and computer security professionals. It is a unique and specialized tool that normally could only be acquired as a component of a more expensive | |||
Updated: 3, 2005 | Rating: 42 | Author: Steve Thomas | Size: 1409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
336. | PrintSniffer 1.0 (geocities.com) | ||
setup to limit printing, it works in undercover mode and cannot be detected. Future versions of PS will allow to take into consideration contents of the documents printed and thus prevent employees from printing classified company's information and taking it home. In real-time PrintSniffer displays the following information about printing jobs: -Name of the user who created the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ilya Solnyshkin | Size: 160 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
337. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
the PrivacyKeyboard, keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
338. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
the PrivacyKeyboard, keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
339. | ProBot 2.5.0 (nethunter.cc) | ||
Detailed reporting, flexibility, and e-mail delivery may help to detect data loss from electronic espionage and investigate computer | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
340. | ProBot SE 2.3.0 (nethunter.cc) | ||
on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Detecting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|