|
||||||
|
||
|
Home > Facility security software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
471. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
472. | virtualCrypt 3.02 (netindiasolutions.com) | ||
and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on your computer but they are accessible and visible only when are mounted through authentication process. The data stored in these virtual drives is in encrypted format using strong 448 bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
473. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
convenience stores, gas stations, day care centers, retirement facilities, hospitals, laboratories, commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in monitoring their | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
474. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
475. | Watcher 2.21 (digi-watcher.com) | ||
complete audio/video surveillance and broadcasting system for home security or office security. Standalone, Watcher does motion detection, auido/video logging, broadcasting and more. Used together with the RemoteView(free), you can do real time remote surveillance. Key features of Watcher are | |||
Updated: 9, 2005 | Rating: 178 | Author: Mable Ryan | Size: 1597 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
476. | WebCam Monitor 3.54 (deskshare.com) | ||
to begin and complete recording on a predefined schedule. It's easy to upload your files to any FTP location periodically, or after an alarm condition is detected. In addition to capturing and transmitting video images and audio files, the software also maintains a detailed event log. Up to four camera/microphone units can be easily connected to the PC's USB ports | |||
Updated: 3, 2006 | Rating: 2799 | Author: Steve P | Size: 8783 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
477. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
and up-to-date protection against emerging spyware. Spy Sweeper’s advanced removal engine deletes the toughest spyware programs - even removing mutated or "rootkit" spies, some of the nastiest next-generation spyware threats - which are specifically designed to avoid detection and removal. This | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
478. | Win Control 2004 (salfeld.com) | ||
With Win Control you can not only define the access rights each of your users should have, you can also protect the Windows Desktop from unauthorized manipulation. You can even define access privileges to system functionality for each user. Finally make an end to deleted or moved links, unlicensed copies of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dierk Salfeld | Size: 2280 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
479. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit reports to help | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
480. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet Explorer and more. Also Includes SHA1 160 bit and MD5 File Encryption plus Ultra | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Facility security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|