|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
371. | Access Lock 2.83 (getfreefile.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
372. | Account Safe 1.04 (aidsoft.com) | ||
Account Safe stores information for all your accounts in a secure encrypted archive. You only need to remember one password to have access to the information for all of your usernames and passwords. Also stores server information and up to 1024 characters of notes for each account. The integrated PW Show | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Overton | Size: 861 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
373. | AceBackup 2.1.3 (hello-engines.com) | ||
With AceBackup you back up your precious data locally or on any desired storage device (e.g. hard disk, floppy disk, CD, DVD, zip, jazz, USB, Mo devices) as well as on the network or directly on FTP servers. The powerful functions of AceBackup and its user-friendly interface allow you to directly back up | |||
Updated: 9, 2005 | Rating: 53 | Author: AceBIT GmbH | Size: 5199 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
374. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
only an anti-spyware solution. It combines a number of the must-have security and privacy tools into one solution: - Internet clean-up: protects your Internet privacy removing traces of your surfing; - System clean-up: eliminates traces of your system activities; - Disk clean-up: securely destroys all the data on your old hard disk; - File shredder: makes your deleted data | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
375. | Active CHAOS 5.0 (safechaos.net) | ||
Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other | |||
Updated: 9, 2005 | Rating: 0 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
376. | Active Network Monitor 2.01 (ntutility.com) | ||
Active Network Monitor is a tool for the day-to-day monitoring of computers in the network. Active Network Monitor runs under Windows NT/2000/XP and allows Systems Administrators to gather information from all the computers (even from the Windows 9x/Me computers) in the network without installing server-side | |||
Updated: 9, 2005 | Rating: 0 | Author: Ashot Oganesyan | Size: 1947 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
377. | Active Kill Disk - Hard Drive Eraser 2.0 (killdisk.com) | ||
KillDisk is a quality security application that destroys data permanently from any computer that can be started using a DOS floppy disk. Access to the drive's data is made on the physical level via the Basic Input-Output Subsystem (BIOS), bypassing the operating systems logical drive structure organization. Regardless of the operating system, file systems or type of | |||
Updated: 9, 2005 | Rating: 985 | Author: LSoft Technologies Inc. | Size: 252 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
378. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
security is one of the major concerns these days. Many of us have realized already that leaving our computers unprotected may result in data theft which in turn may affect privacy and business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
379. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
access to the log files and screenshots using the strong U.S. government approved AES/Rijndael 256-bit encryption. The interface is comprehensive and user-friendly. It has a wizard-driven installation making it extremely easy to set up and use. The setup is password protected thereby preventing unauthorized uninstallation. The PRO Edition has flexible network functions to | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
380. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|