|
||||||
|
||
|
Home > Security log software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
41. | Access Lock 2.83 (getfreefile.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Access Lock 2.83 (softheap.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
43. | Access Boss 2.2 (fspro.net) | ||
Boss is a unique easy-to-use tool, a real lifesaver for a system security administrator that enables you to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and choose which users' access time should be restricted. To do so, you simply mark the required hour(s) | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
44. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | 1 Click & Lock 2.83 (softstack.com) | ||
& Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log | |||
Updated: 2, 2006 | Rating: 56 | Author: IM Soft | Size: 1338 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
46. | SpywareStopper 10.0 (spyware-stopper.com) | ||
on your computer. With realtime cookie management complete with logs and alerts you'll never have another spyware or tracking cookie stored on your computer ever again. Coupled with powerful cleaning options , Home page hijacking prevention and Windows Services Control Panel, SpywareStopper is a very powerful application. SpywareStopper Prevents all Known spyware from loading or | |||
Updated: 2, 2006 | Rating: 0 | Author: Paul Kurland | Size: 2303 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
47. | Proxifier 2.00 (proxifier.com) | ||
restrictions. Besides, it lets you gain extra control over network security and add more power to network functionality. With Proxifier you can work with any Internet clients (browsers, ftp, ssh, ICQ, IRC, eMule,video/audio, games like World of Warcraf) from network that is separated from Internet by a firewall (only one open port is required). Proxifier will help secure your | |||
Updated: 2, 2006 | Rating: 3044 | Size: 685 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
48. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
individuals to track the use / abuse of PCs easily and invisibly. It logs screenshots, keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation, AOL and visited websites into a password protected encrypted file. In the stealth mode STARR does NOT | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
49. | Entry LE 2.72 (sparkleware.com) | ||
the security and robustness of your servers, via remote brute-force attack. - Compatible with HTTP, FTP, and POP3 servers - Internal word generator with character set selection - Supports all major wordlist formats - Coordinates attacks across multiple machines - Supports HTTP proxy servers - Track attack history in easy-to-read logs - Automatic save and | |||
Updated: 2, 2006 | Rating: 267 | Author: Chris Marshall | Size: 560 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
50. | wodFTPServer 2.1.9.0 (weonlydo.com) | ||
that implements server side of following protocols: FTP, FTP/S (FTPS or FTP+SSL) both in explicit and implicit modes, and SFTP (secure ftp subsystem on SSH2 secured channel). Support for all 3 protocol is transparent for your programming - you have same set of events, same set of properties and methods, same control over connected users - and just one property to change to | |||
Updated: 2, 2006 | Rating: 16 | Author: Kresimir Petric | Size: 2235 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Security log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|