|
||||||
|
||
|
Home > Product information software |
|
|
441. | LanHunter 1.50 (waterfallsoft.com) | ||
LanHunter makes it easy to search for files on your local network (LAN). When you use LanHunter, you can specify several search criteria. For example, you can search for files by name, date, size and text in a file. With a big number of details you will find everything you want on your network! LanHunter | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vdovin | Size: 1017 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
442. | Lannouncement 2.0f (tarosoft.com) | ||
Software's Lannouncement bulletin board system (BBS) lets you post emergency must-read messages that automatically appear to the LAN user on login or pops-up no matter what application they are in! Lannouncement also functions as a complete bulletin board and discussion group application for your local area network. It is easy to use and inexpensive, ideal for small organizations | |||
Updated: 9, 2005 | Rating: 0 | Author: Linda Vale | Size: 2572 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
443. | lock and go 1.0 (aidsoft.com) | ||
will enable you to feel completely confident about taking valuable information with you wherever you go. lockngo is the key to your peace of mind. Let lockngo ensure that your information will not fall into the wrong hands. lockngo (lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
444. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
445. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
446. | Find Protected 2.0 (aks-labs.com) | ||
protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
447. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
removes infected attachments automatically. * New! Virus news. Get information about latest threats from F-Secure. Stops even new viruses An average of eight to 10 new viruses are found each day and the rate seems to grow. With its sophisticated virus detection technology combined with a fast | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
448. | DataLock 1.0 (unicorntech.net) | ||
people store their information on their computer and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to remember many passwords - easy 3 step process - Eliminates unauthorised access | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
449. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
450. | Dekart SIM Manager 1.09 (dekart.com) | ||
edit, and backup phonebook entries using your PC and stop typing in information using the mobile phone's keypad. Manage your PIN codes, transfer data from one SIM/USIM to another, backup and export/import all phonebook entries using any compatible smart card reader. Dekart SIM Manager is a | |||
Updated: 9, 2005 | Rating: 79 | Author: Dekart | Size: 828 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
|
Home > Product information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|