|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
431. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
432. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
433. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
and surveillance tool for personal PCs. It is professional software that captures all users activity on the | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
434. | PCWash 3.2 (pcwash.com) | ||
clean and secure. Maximize Your Privacy With This Simple To Use Software Designed To Easily Secure Your Computers Information and Data About You! Simply, safely and securely erase the secrets your computer is keeping about you. PCWash erases/deletes index.dat, internet history, cookies, and more. Easy to use and customize to clean only what you want. Automatic scheduler | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
435. | PECompact 2.75 (bitsum.com) | ||
smaller than if they had been compressed by modern data compression software such as RAR. This is accomplished by restructuring and pre-processing that make modules more compressible. Compression also adds a layer of security to modules that resists tampering and reverse engineering. PECompact supports multiple compression formats, including LZMA, through the use of CODEC | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
436. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
437. | PrivacyWatcher 1.20 (managebytes.com) | ||
of freedom, superior to other similar products! PrivacyWatcher is software that cleans up the history of your computer activity and protects your computer from the unauthorized access. It cleans up the tracks left by Internet Explorer, Windows, Netscape, Mozilla, Opera, MS Office and | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
438. | Privilege Master 1.0 (shareware-promotion.com) | ||
every IT manager knows, security is a trade-off between usability and the level of protection required. For example, to prevent users making unauthorised configuration changes to their system, users are normally given only basic security rights to their system. This is fine until the user has a legitimate reasons to make changes to their system. Perhaps to install a | |||
Updated: 9, 2005 | Rating: 16 | Author: Blue Square Software Blue Square Software | Size: 9085 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
439. | ProBot 2.5.0 (nethunter.cc) | ||
system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
440. | Program Protector 2.1 (blumentals.net) | ||
Protector is state of art security utility, which allows you to password protect programs. You can password protect any Windows application. This functionality is achieved using a special algorithm which modifies executable file of the application, so that it requires to enter valid password before program can start. Program Protector is very easy to use and does not require any | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security software software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|