|
||||||
|
||
|
Home > Security software |
|
|
41. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
42. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
Remove Internet tracks and past computer activities. It can quickly erase your cache, cookies, history, visited URLs, typed URLs, index.dat, Clean Forms Passwords data, temp folders and more. The cookie-cleaning and typed URLs feature allows you to specify which item to keep, so that you don't erase your | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
43. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
44. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
45. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new DNS, File Replication Service, and Active Directory logs are supported. Log data is converted to text format, and delivered to a remote Snare Server, or to a remote Syslog | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
46. | WebCam Monitor 3.54 (deskshare.com) | ||
WebCam Monitor turns your PC into a video surveillance system, that allows you to monitor your home/office from a remote location. WebCam Monitor lets you simultaneously monitor four cameras and microphones. With support for both motion detection and sound detection, the software lets you keep an eye on | |||
Updated: 3, 2006 | Rating: 2799 | Author: Steve P | Size: 8783 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
47. | Atrex 11.10 (atrex.com) | ||
postal codes, bar code printing, cash drawer support, and menu level security. The Atrex database engine is network ready, multi-user, and includes client server capabilities. Context sensitive cross-referenced help and a full users guide is included with the download. A separate module provides an | |||
Updated: 3, 2006 | Rating: 110 | Author: Terry Swiers | Size: 12600 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
48. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
Button Sales Totals & Reports, On the Fly Inventory Entry, Password Security, Quotes, Rentals, Inventory Control, Billing, Mailing Lists, Terms, Invoicing, Packing Slips, Automatic Sale Discounts and more. Import and export products, customers list and sales information. Send/Email all | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
50. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
your files, since iMediaCONVERT is integrated in PowerPoint. Security conscious, iMediaCONVERT allows you to maintain a high degree of content control - presentations cannot be copied or edited, protecting your material against unauthorized changes and/or copyright infringement. Converted files maintain the original structure and hierarchical features of your PPT presentations | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|