|
||||||
|
||
|
Home > Business security software |
Related keywords: security, business, Security, Business, small business, business plan, computer security, internet security, security software, Small Business |
|
|
41. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
43. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
44. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
45. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
46. | Directory Watch 4.0 (lohja-associates.com) | ||
This makes it possible for you to quickly and easily launch business processes. For example, you have a mail, fax, print, or web server that accepts request in forms of files. The server application then operates on these files. If something goes wrong or you have to many requests, you can react to them. You use the Directory Watch application to monitor a file system and | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Lohja | Size: 731 kb | Demo Go to category: System Utilities > Other Similar programs | |||
47. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
security is one of the major concerns these days. Many of us have realized already that leaving our computers unprotected may result in data theft which in turn may affect privacy and business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | Access Lock 2.83 (getfreefile.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Access Lock 2.83 (softheap.com) | ||
Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | 4UOnly 1.2.7 (dillobits.com) | ||
XP with a unique feature that saves you time while promoting good security: No longer are you required to enter your master decryption password each time you need to access your password list. A built-in password generator is included to further enhance your security. Convenient automatic launching of login web pages is also provided to reduce you login time. In this era of | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Business security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|