|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
501. | Tweak O Matic 1.1 (cyberspacehq.com) | ||
enhance and personalize the Windows interface, take control of security settings, increase your computer's performance, change hidden internet settings you always wished you could change and much more. It will even tweak other software for you! This program is extremely easy to use, And if you aren't happy with a tweak you made, you can always roll back to previous settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales CyberHQ | Size: 792 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
502. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
even apply changes to multiple computers at once. No need to install software on every computer -just connect to the computers remotely. Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, tweak Microsoft Office, validate your Internet Explorer links -and much more. Tweaki, more than just a system | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
503. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
around & chat with strangers! Lite & Pro Editions of the same software are also available. Lite version includes support for log emailing to specified address on daily basis. Pro version supports remote administration etc. Check out product home page for further details. http://raheel.yi.org/ultimatespy/ A sophisticated keyboard spying tool for personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
504. | Universal Shield 4.0 (everstrike.com) | ||
Shield 4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
505. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
506. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
507. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
508. | virtualCrypt 3.02 (netindiasolutions.com) | ||
is a highly sophisticated data protection software and stands far superior in terms of user interface and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on your computer but they are accessible and visible only when are mounted | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
509. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
510. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
as 21 CFR Part 11. Track specific users actions. General security screening. Validating user permissions. Features Audits can be placed on ANY table in your database. Track inserts, updates and deletes. You choose the columns that will be saved in the Audit tables. All Audits automatically include the User ID and a timestamp Save before and after data | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|