|
||||||
![]() |
![]() |
|||||
![]() |
||||||
|
||
|
Home > Computer security policy software |
Related keywords: security, computer, Security, computer security, internet security, computer game, security software, Computer, information security, computer software |
|
|
41. | Security Folder 2.0 (everstrike.com) ![]() | ||
days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
42. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) ![]() | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
43. | PAL PC Tracker Lite 1.01 (palsol.com) ![]() | ||
PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
44. | Password Protect 3.4 (password-protect-software.com) ![]() | ||
security and confidence. That's what you get when you install Password Protect. The program protects your confidential information against ending up in the wrong hands. You can protect folders on your hard drive, USB and flash, removable and network drives. Password Protect is easy to use. Right-click a folder, select Protect This Folder and enter your password | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Tolliver | Size: 760 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | PC PhoneHome 3.0 (pcphonehome.com) ![]() | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
46. | ProBot 2.5.0 (nethunter.cc) ![]() | ||
is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Enterprise Accelerator 3.0 (smartalec2000.com) ![]() | ||
stack for network performance - Optimize TCP/IP stack for network security: - Optimize system core for application performance - Optimize system core for application stability - Enable dynamic processor cooling - Quick access to manage computer, analyse/defrag/clean-up disk drives, manage group polices, back up system files, and much much more This program has been | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Wong | Size: 1772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | Protector Plus for Exchange 7.2.F02 (protectorplus.com) ![]() | ||
all types of viruses, trojans and worms before they reach the user's inbox. Protector Plus for Exchange is packed with many useful features like remote management, email alerts, InstaUpdate, quarantine, compressed files scanning and many more. Protector Plus antivirus software can be remotely managed from anywhere in the network. The remote management software can be used to monitor | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 2949 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
49. | PwdDoubleCheck (Passwords) 1.0.1 (doubleupsoftware.com) ![]() | ||
using Microsoft s internal infrastructure. PwdDoubleCheck is an easy to use application to check the strength of your passwords on Windows based systems. Whether you are a security expert of a large multi-national corporation or a home computer user you should test your computers password strength. Once you have created your security policies | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel M. | Size: 2527 kb | Commercial Go to category: Security & Privacy > Password Managers Similar programs | |||
50. | MacPhoneHome 3.0 (pcphonehome.com) ![]() | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Computer security policy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|