|
||||||
|
||
|
Home > Protect computer software |
Related keywords: protect, computer, computer security, computer game, Computer, Protect, password protect, protect files, computer software, computer backup |
|
|
391. | SecureWallet 1.01 (coolutils.com) | ||
Import are also present. SecureWallet main window displays a list of protected applications and user names. When you open an entry, you can view notes, instruct the program to generate a random password, or display the password. Different sets of passwords can be stored and opened, each with a default | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
392. | Security Folder 2.0 (everstrike.com) | ||
days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
393. | Security Task Manager 1.6f (neuber.com) | ||
detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk rating is based on an analysis that takes different aspects of the process into consideration, and indicates the likelihood of the process being | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
394. | SerialIP Utilities 1.3 (fogsoft.com) | ||
SerialIP Utilities can transfer the data from COM-ports of local computer to COM-ports of remote computers using TCP/IP and save received data on a disk of local or remote computer. The basic features of SerialIP Utilities: 1. Grant a remote access to any COM-port equipments across Internet, LAN or any TCP/IP connections. 2. Save information received from serial | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Lashin | Size: 1271 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
395. | Spy Lantern Keylogger 5.1 (spy-lantern.com) | ||
and duration of their work. Spy Lantern Keylogger records every user's logon, every power on and power off on your PC. Spy Lantern Keylogger is the first totaly invisible keylogger. So no one can determine that you are watching on him. Additionally Spy Lantern Keylogger is password protected. This means that no one can configure, view reports or even uninstall Spy Lantern | |||
Updated: 2, 2006 | Rating: 70 | Author: Eric Nilsson | Size: 1370 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
396. | SpyCapture 1.4.5 (tsm-soft.com) | ||
The SpyCapture is a small tool that enabled you to monitoring your computer when you are away. SpyCapture will capture the screen display, keystroke and mouse pointer in frequence that depend on your own choice. SpyCapture will then encrypt the picture and keystrokes and store it in somewhere on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
397. | StarLogger 1.4 (willebois.nl) | ||
buddy, colleague or employee is typing? What are they doing on the computer? StarLogger records every keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever your computer starts up. See everything being typed: emails, messages, documents, web pages, usernames, passwords | |||
Updated: 9, 2005 | Rating: 0 | Author: Maurijn van der Does | Size: 1327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
398. | StatWin Pro 7.1 (statwin.com) | ||
is a comprehensive computer activity monitoring solution for individuals and businesses. It gives you valuable statistics. It lets you analyze how effectively you or your employees are using computers. The software counts aggregate operation time, average operation time per day and per run for a given computer or user. You can even view statistics for a certain period | |||
Updated: 2, 2006 | Rating: 16 | Author: Vitaly Dvorak | Size: 1320 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
399. | Stealth KeySpy 2.0.0 (professionalglobalmarketing.com) | ||
parents, girlfriends, boyfriends, employers, teachers… ANYONE with a computer! * Have you ever suspected your spouse or partner of CHEATING online and wanted to know NOW? * Have you ever wondered what your kids are REALLY doing and seeing on the computer for hours on end? * Have you ever wondered if your students are ONLY using school computers for educational | |||
Updated: 9, 2005 | Rating: 48 | Author: Tom Eagar | Size: 700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
400. | StormWindow 2000 3.02 (cetussoft.com) | ||
degrees of protections to the desktop and system of a Windows 2000 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 2000 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1285 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Protect computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|