|
||||||
|
||
|
Home > Software security software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
401. | BatteryMon 2.0 1006 (passmark.com) | ||
battery charge level and other statistics for later analysis and the software comes with a comprehensive help file. Monitor the performance of laptop computer batteries and uninterruptible power supplies (UPS). Graphically see the charge / discharge rate, diagnose problem battery cells and compare your batteries performance with expected discharge | |||
Updated: 9, 2005 | Rating: 1082 | Author: David Wren | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
402. | BestCrypt 7.20.2 (jetico.com) | ||
is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
403. | BestCrypt Corporate 1.12 (jetico.com) | ||
algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic installation/uninstallation and update of BestCrypt on remote client computers, creation of central | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
404. | Bonodi XML Editor 2.12 (zero.ad.jp) | ||
features of Bonodi. Scripts are plain text files that contain software programs. Keyboard shortcut keys can be customized. Bonodi's search feature facilitates searching XML document(s) by XPath pattern and other search methods available in Bonodi. Bonodi's search feature can be applied to an opened XML document, or all opened XML documents, or all XML files in one or more | |||
Updated: 9, 2005 | Rating: 39 | Author: Yuji Ichikawa | Size: 3788 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
405. | Boss Key 1.6 (boss-key.com) | ||
using a hot key! Everybody should have such program for personal security. Imagine, you work with confidential information - maybe, just writing email to your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
406. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their hard | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
407. | Chameleon 2.0 (members.optushome.com.au) | ||
your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
408. | CHAOS Messenger 4.0 (safechaos.net) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
409. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
410. | Chaperone 4.0 (css-software.com) | ||
access to the entire computer. Additional features increase security by disabling Registry tools, preventing program installations, denying access to the control panel, and more…. Chaperone fully supports multiple users. Each user can have their own access rights, or can use the same rights as other users. These user accounts can even mirror the Windows login, preventing the | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Software security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|