|
||||||
|
||
|
Home > Files security software |
Related keywords: security, files, Security, computer security, internet security, hide files, security software, Files, PDF files, compare files |
|
|
31. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
32. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
Kazaa, ICQ2003 and many others. Additional features include a secure file-shredder, scheduled cleanups, Boss Key, and support for Netscape and Opera. Asmw Eraser Pro completely implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standards, You can then completely overwrite files with random characters making them unrecoverable by undelete or | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
33. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
34. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
35. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. Log data is converted to text format, and delivered to a remote Snare Server, or to a remote Syslog server with configurable and dynamic facility and priority settings. Snare is | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
36. | WebCam Monitor 3.54 (deskshare.com) | ||
to begin and complete recording on a predefined schedule. It's easy to upload your files to any FTP location periodically, or after an alarm condition is detected. In addition to capturing and transmitting video images and audio files, the software also maintains a detailed event log. Up to four camera/microphone units can be easily connected to the PC's | |||
Updated: 3, 2006 | Rating: 2799 | Author: Steve P | Size: 8783 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
37. | Atrex 11.10 (atrex.com) | ||
postal codes, bar code printing, cash drawer support, and menu level security. The Atrex database engine is network ready, multi-user, and includes client server capabilities. Context sensitive cross-referenced help and a full users guide is included with the download. A separate module provides an | |||
Updated: 3, 2006 | Rating: 110 | Author: Terry Swiers | Size: 12600 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
38. | Masker 7.0.6 (softpuls.com) | ||
files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
e-learning platforms. The process of transforming local file presentations into online content is easier, faster and cheaper with iMediaCONVERT than with any other application on the market. With just one click, iMediaCONVERT delivers high-quality multimedia content that can be directly integrated into your business communication, training or Learning Management System | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
40. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Files security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|