|
||||||
|
||
|
Home > Information security software |
|
|
381. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
382. | SecurPad 1.2 (intellisoftdesign.com) | ||
used to send encrypted documents over email or to protect sensitive information such as passwords, credit card numbers, or any other confidential data. The editor utilizes 256-bit Advanced Security Standard (AES) symmetric encryption based on the Rijndael algorithm, which guarantees high | |||
Updated: 3, 2005 | Rating: 0 | Size: 670 kb | Shareware Similar programs | |||
383. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
384. | 1st Evidence Remover 2.14 (softheap.com) | ||
use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the other detailed information about your activities can be easily extracted and used | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
385. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage and system failures. - Supports NTFS, FAT32 and FAT16 protected disks. - Compatible with MS Windows 95/98/Me/NT/2000/2003/XP. StrongDisk Pro is the most proven and reliable on-the-fly encryption software exists on the market. It makes a plain hard | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
386. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. Features: - Recording of user logon name, date, time and computer name - Monitoring of active tasks list - Handling of critical programs list - Sending of SMS alerts to | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
387. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
388. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
389. | File Shredder 2.0 (mazepath.com) | ||
are gone, but they can be easily recovered, including your financial information and sensitive business documents. Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
390. | Hide Files 3.4 (spydex.com) | ||
you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|