|
||||||
|
||
|
Home > Computer security software |
Related keywords: security, computer, Security, internet security, computer game, security software, Computer, information security, computer software, SECURITY |
|
|
481. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control program that enables you to work on one or more remote computers from your own. It is a complete remote control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
482. | Silver Key 3.3 (filecryption.com) | ||
encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
483. | Cheat Checker 2.03 (nine-patch.com) | ||
test results. Students have learned to breach the expected security given by multiple version tests. The current Cheat Checker examines all versions of a test as marked. The structure for each answer file is: nine character ID:one space:answer string. The answer key ID is 999000111. Student records follow the answer key. A Rule of Thumb for Cheating is five to seven | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Hart | Size: 258 kb | Freeware Go to category: Education > Other Similar programs | |||
484. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
485. | MultiNetwork Manager 7.2 (globesoft.com) | ||
domain, TCP/IP and other network settings. The need to connect your computer to different networks is growing as we enjoy the new possibilities of mobile working. Wireless networking is changing the way we work and live our lives. We expect to be able to connect and work from wherever we are. The | |||
Updated: 9, 2005 | Rating: 48 | Author: GlobeSoft AB | Size: 6930 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
486. | pcAudit 6.3 (pcinternetpatrol.com) | ||
web site” or “Your transaction on this page is secured” on your bank's web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer. Run pcAudit while on a secured web page and see for yourself that whatever you type while on a | |||
Updated: 9, 2005 | Rating: 0 | Author: ISA, Inc ISA, Inc | Size: 97 kb | Freeware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
487. | Safe Express Free 3.4 (netsafesoft.com) | ||
emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with user-friendly interface. It also supports unlimited number of accounts and users. Once you start using this software you won't need to | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
488. | Safe Express Home 4.2 (netsafesoft.com) | ||
emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with user-friendly interface. It also supports unlimited number of accounts and users. Once you start using this software you won't need to use any more secret passwords. You wont have to do any additional operations to make your | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
489. | Disk Investigator 1.32 (theabsolute.net) | ||
Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Undelete previously deleted files. Verify the effectiveness of file and disk | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Solway | Size: 522 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
490. | SiteKiosk 6.0.98 (sitekiosk.com) | ||
This feature-packed package is designed for public access stations and turns any PC into a kiosk. Users can only access sites, applications, and settings you approve through a shell you design. You can command SiteKiosk and extend its functionality via scripts, objects, and ActiveX controls, or simply | |||
Updated: 9, 2005 | Rating: 0 | Author: PROVISIO PROVISIO | Size: 11203 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Computer security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|