|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
491. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
so that no programs are affected by its operation. Safety and security were our No. 1 concerns when we designed this program. Protect your privacy by removing Internet Explorer-saved cookies, the visited-pages history, and the recently opened files list for more than 100 popular applications, including Microsoft Office, Windows Media Player, ICQ, MSN, WinZip, RealPlayer | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
492. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
for IE Content Advisor. Content Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically useless, and may effectively block the usage of | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
493. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
494. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
495. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
upgrade to Windows XP they realize that Microsoft increased the security of the password boxes and all old password recovery tools no longer work. However, with the new iOpus Password Recovery XP users can reveal their forgotten passwords on Windows XP and Windows 2000 as easily as they did on Windows 98 or Windows ME. Limitations: This utility works well with most password | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
496. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
497. | KGB Free Key Logger 1.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
498. | KGB Spy 3.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
499. | Keylogger Hunter 2.1 (styopkin.com) | ||
which would play a role of a “second echelon” for your data security. Utility for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
500. | lock and go 1.0 (aidsoft.com) | ||
lockngo (lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|