|
||||||
|
||
|
Home > Security system software |
Related keywords: security, system, Security, System, system tray, computer security, internet security, security software, encryption system, SYSTEM |
|
|
471. | Tweaking Toolbox XP 1.60 (tweakingtoolbox.com) | ||
Prevent others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options, even choose which applications can or can't be run on the computer. You can change Windows XP system performance, by selecting to keep the Windows XP core system in memory, and not paged to disk (advisable only if you have 512MB RAM or | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 953 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
472. | TweakSEC 1.0 (ltn.lv) | ||
is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network | |||
Updated: 9, 2005 | Rating: 0 | Author: Karlis Blumentals | Size: 529 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
473. | Undelete Server and Professional 4.0 (execsoft.com) | ||
between backups, if the tape is corrupted, or if you have no backup system to begin with, your file is gone and you're out of luck. NEW Undelete 4.0 is more than a file-recovery utility - it provides real-time data protection with instant recovery for your servers and workstations. If your data is important and valuable, you need Undelete! With Undelete 4.0 installed on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
474. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
475. | User Control 2005 (salfeld.com) | ||
applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a few mouse clicks. Network and multi-user capacity. Lock also your desktop and disallow moving, renaming or deleting icons or changing wallpapers. User Control allows you to block any undesired | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
476. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory program. Other inventories, e.g. faxes, photocopiers and other associated equipment, can also be recorded manually in the program. Using | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
477. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
and automatic record-on-connect. Visual Hindsight is a multi-user system, with support for concurrent users, user access rights and administrator functions, and encrypted databases. Also included is the Automatic Retention Monitorâ„¢ to control the amount of disk space allocated for recording purposes through user-defined values for maximum file age and total file size. Visual | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
478. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few tools to find out who or what made it happened. Besides critical | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
479. | Watcher 2.21 (digi-watcher.com) | ||
inexpensive and complete audio/video surveillance and broadcasting system for home security or office security. Standalone, Watcher does motion detection, auido/video logging, broadcasting and more. Used together with the RemoteView(free), you can do real time remote surveillance. Key features of Watcher are: - Watcher is very stable, it can monitor your home 24 hours a | |||
Updated: 9, 2005 | Rating: 178 | Author: Mable Ryan | Size: 1597 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
480. | WDumpEvt 2.2 (eventlog.com) | ||
and manage all the informations from Windows NT/2000 logs: Ask for system, security, application log or file information. View, print or dump the list of events, user, failure or ras sessions, or print jobs. Dump the data to a file in ASCII-delimited, CSV or html format. You can study the | |||
Updated: 9, 2005 | Rating: 0 | Author: Isabelle Vollant | Size: 395 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security system software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|