|
||||||
|
||
|
Home > Facility security software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
451. | SignStation 2.00 (com-and.com) | ||
SignStation is an innovative application that lets you apply a digital signature to a file, verify the digital signature on a signed file, encrypt and decrypt files and manage certificates, among other functionalities like email, hash, and file management. Using a two-ways approach interface, SignStation | |||
Updated: 8, 2004 | Rating: 0 | Size: 5956 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
452. | SoftPerfect Network Scanner 2.7 (softperfect.com) | ||
both system administrators and users who are interested in computer security. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on a network (including system and hidden). In addition, it allows you to mount shared resources as network drives | |||
Updated: 2, 2006 | Rating: 48 | Size: 670 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
453. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split files by | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
454. | SpyCapture 1.4.5 (tsm-soft.com) | ||
easily detected or terminate (even by pressing Ctrl-Alt-Delete), it's invisible! Only you will know how to terminate it, if you want. SpyCapture is an excellent PC Surveillance Software. Features: 1. High Invisibility, Password Protected, Encryption enabled and File Manager. 2. Capture all the | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Sun Min | Size: 428 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
455. | Startup Sentry 2.20 (digitalwidget.net) | ||
or Trojan Horse applications that install themselves in your system's registry. You'll learn about drivers that are still being loaded for hardware that you might have removed long ago. You'll see any application "extras" that load at startup which you might not use, but are consuming precious | |||
Updated: 9, 2005 | Rating: 0 | Author: Digital Widget | Size: 3125 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
456. | Super Recycle Bin 1.00 (4diskclean.com) | ||
German, and all other known published government-level data disposal security requirements. When you delete a file in any Windows system you're only informing the operation system the space in the disk the file uses can be overwrite in the future by another file. The content of a deleted file is still | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
457. | SuperCleaner 2.89 (southbaypc.com) | ||
Privacy features of SuperCleaner will let you erase your web browser's cache, history, cookies, and even the hidden index.dat files! If there are cookies you want to keep, you can use the built-in Cookie Manager to manage them. The Start menu cleaner can find items in your Start menu which are dead | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
458. | System Shield 2.1c (iolo.com) | ||
access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
459. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
460. | TK8 Safe 2.5 (tk8.com) | ||
TK8 Safe is the password manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Facility security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|