|
||||||
|
||
|
Home > Facility security software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
501. | Xceed Zip Compression Library 6.0 (xceedsoft.com) | ||
Zip files as well as compress/uncompress data directly in memory. It's designed to offer the ultimate in flexibility while being the easiest to use product of its kind. It includes a state-of-the-art, fully documented ActiveX COM component that provides the industry's most complete feature set | |||
Updated: 9, 2005 | Rating: 272 | Author: Charles Duncan | Size: 36259 kb | Demo Go to category: Development > Active X Similar programs | |||
502. | Apocgraphy - Full spectrum e-mail protection 1.0.1 (Apocgraphy.com) | ||
Apocgraphy is a program that works with your current e-mail reader analyzing your e-mail and protecting you against a full range of damaging and time wasting e-mails. Apocgraphy utilizes a full range of methods to analyze your e-mail including keyword analysis, collaborative information sharing, adaptive | |||
Updated: 9, 2005 | Rating: 16 | Author: sean kahil | Size: 2336 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
503. | Chop 1.504 (SinnerComputing.com) | ||
you are a spy, you can divide a file up and even semi-encrypt it for security reasons...) Using either a normal window or a wizard interface, files can be split by either the number of files that you want, the maximum file size, or you can use preset common sizes for EMailing, floppies, Zips, CDs | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 36 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
504. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
505. | MultiNetwork Manager 7.2 (globesoft.com) | ||
establishes network connectivity. Enforcing corporate security policies Multi profiling. User interface with different views for different user groups. Complete Wlan client with WPA, radius support. Boot time application (BTA), allows you to select location at boot time Connect anywhere fixed or wireless, quickly and securely, using powerful multi-profiling | |||
Updated: 9, 2005 | Rating: 48 | Author: GlobeSoft AB | Size: 6930 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
506. | EZ Macros 5.0A (americansys.com) | ||
hourly, daily, weekly, and monthly. If you're concerned about security, EZ Macros lets you create "secure" macros. A secure macro is protected by a password created by you. Secure macros can only be edited, deleted, or scheduled by entering the password and no one can see the keystrokes that | |||
Updated: 9, 2005 | Rating: 48 | Author: Matt Porter | Size: 758 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
507. | Armor System5 2.2.2 (ambitware.com) | ||
encryption program for everyone who is serious about data security. The program includes three modules: File Encryption Module, Text Encryption Module (with built-in word processor), and Email Encryption Module. Each module takes a full advantage of the 40 industry-standard encryption algorithms and eliminates the need of user management of encryption keys. Keys are generated | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Vlach | Size: 5986 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
508. | CryptOne 1.1 (eniksoft.com) | ||
or let the program generate it for you. For increasing password security you can set to hide password with (*). The program uses 2048 byte key for encode data. It means high security level for your files. To break password it needs billion and billion of years. We recommend to use for password combiantion of up and down case chars and numbers. The program can also be used to | |||
Updated: 9, 2005 | Rating: 48 | Author: Nikolas Ehrenberg | Size: 421 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
509. | pcAudit 6.3 (pcinternetpatrol.com) | ||
web site” or “Your transaction on this page is secured” on your bank's web site, online merchants, governmental and other web pages. What you probably did not understand is that even though the web site is in fact secure, this security does NOT extend to your computer. Run pcAudit while | |||
Updated: 9, 2005 | Rating: 0 | Author: ISA, Inc ISA, Inc | Size: 97 kb | Freeware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
510. | SPAM Shredder 3.1 (safechaos.com) | ||
email client with effective spam filtering and good privacy and security protection. SPAM Shredder is an anti-spam email client that automatically classifies incoming emails as spam or | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Facility security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|