|
||||||
|
||
|
Home > Security audit software |
Related keywords: security, Security, audit, computer security, internet security, security software, information security, SECURITY, file security, windows security |
|
|
41. | CryptoForm FM Professional 1.3 (aidsoft.com) | ||
FM Professional is a simple to use security solution that encrypts data entered through a web site. Excellent for collecting credit card details, sensitive information, etc.CryptoForm FM is the secure solution for online data capture. The CryptoForm FM solution is at the forefront of secure online data capture, and provides the power to provide your customers with the assurance | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Reynolds | Size: 4145 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
42. | Commodorecasino 5.30 (commodore-online-casino.com) | ||
payment options - Complete package of traditional casino games - Audited games to ensure fairness - Complete security and privacy of identity and casino transactions - Complete customer satisfaction - Arbitrator to handle all disputes Designed with the pleasure of the player in mind, Commodore elegant and user-friendly software offers a full suite of traditional interactive | |||
Updated: 9, 2005 | Rating: 0 | Author: Al Cord | Size: 132 kb | Freeware Go to category: Games & Entertainment > Board Similar programs | |||
43. | Engineers Edition 3.2 (solarwinds.net) | ||
Monitor, Config Viewer, Config Uploader, DHCP Scope Monitor, DNS Audit, DNS / Whois Resolver, Enhanced Ping, IP Network Browser, MIB Walk, Network Address Recovery, Network Monitor, Network Sonar, PING, Ping Sweep, Proxy Ping, Router CPU Load, Router Password Decrypter, SNMP Sweep, Subnet List, Watch it!, TCP Reset, Trace Route, TFTP Server, and Update System MIBs. This toolsets can | |||
Updated: 9, 2005 | Rating: 82 | Author: Doug Rogers | Size: 51286 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
44. | TradingSolutions 3.1 (tradingsolutions.com) | ||
and step-by-step tutorials, 3) Perform calculations on a single security or multiple securities at once, 4) Model optimal actions and predict future prices with exclusive time-based neural networks, 5) Implement your own functions, systems, and complete trading solutions, 6) Evaluate trading models for profit potential using historical backtesting, 7) Optimize your models for maximum | |||
Updated: 9, 2005 | Rating: 0 | Author: NeuroDimension Incorporated | Size: 58568 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
45. | Cynapse InfoCryptor 1.50 (cynapse.co.in) | ||
textual information, such as important notes, passwords, messages, security codes, large official documents, e-mail addresses and their passwords, credit card information, customer interface information, e-mails, etc. It also contains an advanced document editor, to store and edit rich formatted text | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | DriveCrypt 3.03a (drivecrypt.com) | ||
computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this product. As data is read from the hard disk | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | BriefAudit 1.0c (peccatte.karefil.com) | ||
BriefAudit selects files changes events in NT4/NT2000 standard Security Log and writes the selected events in the corresponding Windows 2000 and/or Macintosh files comments. Main features Runs on Windows NT 4.0/Windows 2000 running standard audit policy. Selects files modifications events in the standard Security Log, keeping only the essential informations | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 2712 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | Active ERASER 4.01 (active-eraser.com) | ||
Active ERASER utility supports a variety of sanitation standards, from simple methods such as One Pass Zero to the military-grade DoD 5220.22-M, to even more sophisticated methods such as Gutmann's. You can erase files, folders, CD-RW discs, logical drives, and entire physical drives. The program also wipes | |||
Updated: 9, 2005 | Rating: 489 | Author: Data Security | Size: 1030 kb | Demo Go to category: System Utilities > Other Similar programs | |||
49. | Secura Archiver 1.6 (cmfperception.com) | ||
that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 1509 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
50. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
quotas for printing! Print Logger is intended for control and auditing of printing activity. The program monitors the print tasks on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print Logger can also | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Security audit software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|