|
||||||
|
||
|
Home > Computer protection software |
Related keywords: computer, protection, computer security, data protection, password protection, computer game, Web Page Protection, Computer, Protection, file protection |
|
|
391. | ProBot 2.5.0 (nethunter.cc) | ||
is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
392. | ProBot SE 2.3.0 (nethunter.cc) | ||
allows administrators to keep track of all activity occurring on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
393. | Program Protector 2.1 (blumentals.net) | ||
Protector is very easy to use and does not require any special computer knowledge. Program Protector is unique, because unlike other protection software, it is safe against circumvention. Malicious users can not disable protection by renaming the protected program's executable file or even uninstalling Program Protector itself. Key features: * Protects | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
394. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them unreadable | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
395. | Quick Hide Windows 1.8.7 (cronosoft.com) | ||
Hiding the taskbar and desktop icons is just awesome. Password protection allows you to lock QHW to prevent intruders from trying to show invisible applications while you're gone. You can even lock your computer with QHW instead of a weak, easily hackable screensaver password. Quick Hide Windows by CronoSoft is great for hiding program windows with a press of a hotkey | |||
Updated: 9, 2005 | Rating: 154 | Author: Alex Adrian | Size: 994 kb | Demo Go to category: System Utilities > Other Similar programs | |||
396. | Remote Administrator 2.2 (radmin.com) | ||
reliable and secure, which enables you to work on one or more remote computers from your own computer. You see the remote computer desktop displayed either in a window or full screen on your computer monitor. All your mouse and keyboard functions are transferred to the remote | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
397. | SafeCryptor 1.5 (gemiscorp.com) | ||
or family. SafeCryptor is the encryption system where your own computer is your unique key, especially suitable for the secure transfer of passwords between two computers. Some of its features and benefits are: - Recipients just need their own computers for decrypting the information; their computers are their unique keys. - Robust and complex encryption scheme | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
398. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is performed automatically and transparently on the fly. You can do anything with a SafeHouse virtual drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
399. | SafeLogon 2.0 (gemiscorp.com) | ||
Export the whole program configuration to easily extend it from one computer to another one of similar characteristics. - Apply important security-related tweaks for controlling user access to key Windows components, such as Control Panel, Desktop and Explorer, Network, Start Menu and Taskbar, Display | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
400. | SecurDesk! 5.32 (cursorarts.net) | ||
you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Computer protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|