|
||||||
|
||
|
Home > System configuration software |
Related keywords: system, System, system tray, configuration, encryption system, configuration management, SYSTEM, content management system, billing system, system cleaner |
|
|
31. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | Advanced Scrolling Text Software 4.5 (jpowered.com) | ||
viewing experience (unlike other scrollers which demand large system resources which only serve to hinder a visitor). Even with the incredible range of functionality we have still been able to pack this into a single very small file. At less than 8kb the load time of this applet is very quick (quicker than most image files!). This means your visitor will be reading your messages | |||
Updated: 2, 2006 | Rating: 318 | Author: Patrick OBrien | Size: 91 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
33. | Data Destroyer 7.31 (hermetic.ch) | ||
the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (and this may take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
34. | Remote Helpdesk 6.7 (gidsoftware.com) | ||
traffic, file transfer, audio chat, macro functions, display remote system information, send messages to remote user, clipboard transfer, definable hotkeys, definable IP port, full screen mode, reverse connection and optional proxy tunnel for connecting to users behind firewalls, optional input to allow users to specify help needs, mouse wheel support for MS mouse or equivalent | |||
Updated: 2, 2006 | Rating: 133 | Author: Glen Dean | Size: 1356 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
35. | POPcon 3.41 (christensen-software.com) | ||
based on day of week. * Monitor POPcons actions from any system in your network using "POPcon Control" included with the software. POPcon connects MS Exchange to POP3 and IMAP mailboxes. It acts as an e-mail collector that retrieves messages from POP3 mailboxes and delivers them to your Exchange Server mailboxes according to the intended user found in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Claus Christensen | Size: 6453 kb | Commercial Go to category: Communications > Other E-Mail Tools Similar programs | |||
36. | HSLAB HTTP Monitor 1.6.24 (hs-lab.com) | ||
in the web hosting industry. Basically, with HSLAB monitoring system administrators always know who is currently connected (via connection tree), server operations distribution, amount of bandwidth being consumed, number of server requests per unit of time and other important server parameters. Most importantly, HSLAB HTTP Monitor is server-independent. That is the server | |||
Updated: 2, 2006 | Rating: 0 | Author: Oleg Golub | Size: 3189 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
37. | Desktop Surveillance Personal Edition 6.0.3 (omniquad.com) | ||
the Internet, while providing a safety net. You can customise the system so that all the information is within reach, while harmful content is inaccessible. This means that other people can use your system while you stay in control. Prevent misuse by blocking illicit material or unwanted or harmful activities from your computer and avoid exposure to undesired material | |||
Updated: 2, 2006 | Rating: 42 | Author: Daniel Sobstel | Size: 2675 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
38. | AntiSpy 4.4.2 (omniquad.com) | ||
programs from your computer. Spywares snooping on your system, secretly monitoring and broadcasting your computer activities pose serious security and privacy issues. Most of these spywares are installed without your permission on your computer. AntiSpy scans system memory, registry, hard, and removable drives for a variety of spywares like annoying ad-wares | |||
Updated: 2, 2006 | Rating: 39 | Author: Daniel Sobstel | Size: 10164 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
39. | Mail Snoop Pro 1.12.30 (rainbow-innov.co.uk) | ||
and alerting you when there is new mail you need to see. The filter system rapidly checks new emails for any suspicious items. Beginning by checking if the sender is a "Friend", followed by checks for blacklisted senders, subject field, senders field, message header, message text, attachments and | |||
Updated: 2, 2006 | Rating: 0 | Author: John Hudson | Size: 3264 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
40. | Detective 2.1e (omniquad.com) | ||
is Omniquad's solution for organizations and individuals who are concerned about how and for what their computer systems were used. It examines computer activity BACKWARDS, detects illicit content and then displays a detailed log for inspection describing what illicit material was stored, when and where. In addition to the existing extensive vocabulary set, user input is | |||
Updated: 2, 2006 | Rating: 16 | Author: Daniel Sobstel | Size: 1239 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > System configuration software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|