|
||||||
|
||
|
Home > System security software |
Related keywords: security, system, Security, System, system tray, computer security, internet security, security software, encryption system, SYSTEM |
|
|
421. | Backup Forever 2.6 (schulers.com) | ||
command line. FAQ: Can I backup my entire Hard Disk including the system operational using Backup Forever? Yes. However, Backup Forever is not intended to backup your entire HD and system operational. There are errors that Backup Forever will not recover by itself. Backup Forever will recover some kinds of system crashes. A system registry crash will not be | |||
Updated: 9, 2005 | Rating: 0 | Author: João Schuler | Size: 1552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
422. | BatteryMon 2.0 1006 (passmark.com) | ||
Batteries, given their chemical nature, are prone to wear, corrosion, leakage and outright failure due to events like short circuits and lightning strikes. Given their propensity to fail and to have decreased performance over time, it is important to be able to identify and monitor their performance. With | |||
Updated: 9, 2005 | Rating: 1082 | Author: David Wren | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
423. | BCWipe 3.07.2 (jetico.com) | ||
Windows 9x/NT/2000/XP and is highly integrated with the operating system. BCWipe ensures that another person will not restore files you have deleted from a disk. BCWipe uses military-grade procedures to shred deleted file contents. BCWipe wipes individual files/folders, free disk space, the swap file, directory | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
424. | BestCrypt 7.20.2 (jetico.com) | ||
data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
425. | BootLocker 7.85.11 (bootlocker.com) | ||
is a desktop security program that protects your computer from Windows startup. It does not allow intruders to access anything without a username and password. There is system tray support, password recovery, and locking screen saver. All in an easy to use interface. BootLocker is a desktop security program that protects your computer from Windows startup. It does | |||
Updated: 9, 2005 | Rating: 0 | Author: Steven Eppler | Size: 3148 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
426. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
- powerful wrapper for Remote Administrator v 2.1 If you are the system administrator or member of support team - then "Client for Remote Administrator" can interest you. === What is the Remote Administrator? Radmin (www.radmin.com) is an award-winning remote control program that enables you to | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
427. | Clipboard Clear 1.0 (posum.com) | ||
Clear allows you to secure your system by prohibiting the use of the PrintScreen key. It can also prohibit other general uses of the clipboard for greater security, if desired, so that no unauthorized user uses it. Clipboard Clear allows you to secure your system by prohibiting the use of the PrintScreen key. It can also prohibit other general uses of the | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 802 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
428. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
429. | Comm-Logger 1.0 (wcscnet.com) | ||
is ideal for logging serial data from applications like PBXes, security systems, or any application in which serial data must be recorded to a file for archive purposes, data import, or any other use. Comm-Logger's graphics interface allows for easy and intuitive use. Comm-Logger's command line interface can be started from the scheduler, startup, or anywhere | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
430. | Command Creator 3.0 (jiisoft.com) | ||
Create dynamic commands with parameters. - Manage already installed system commands. - The launch itself is handled by your OS. - Forget about shortcuts and the the Start Menu. Command Creator will help you create run-commands for use in the Start Menu´s Run dialog. The commands can launch programs | |||
Updated: 9, 2005 | Rating: 0 | Author: Jonatan Dahl | Size: 578 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > System security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|