|
||||||
|
||
|
Home > Software deployment software |
Related keywords: software, Software, RAD Software, free software, spy software, backup software, dating software, shopping cart software, outlook software, photo software |
|
|
531. | #Remove Access Security 3.0 (e-tech.ca) | ||
security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords, corrupted workgroup files, forgotten passwords etc. This is the first software ever developed which works with | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
532. | SafeOffice 1.1 (codetek.com) | ||
to protect your important data from human attackers and malicious software that take advantage of flaws in common internet applications (web browsers, e-mail clients, instant messengers, etc.). SafeOffice is designed to protect you and your data from attacks in as unintrusive a manner as possible; | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
533. | SANDRA Standard 2002.68.97 (3bsoftware.com) | ||
SANDRA (System Analyzer Diagnostic and Reporting Assistant) is a set of system diagnostic and benchmarking tools designed to help you keep your computer running at peak performance. It provides diagnostic, benchmarking, and performance tune-ups for different hardware devices and subsystems, including CPUs | |||
Updated: 9, 2005 | Rating: 0 | Author: 3B Software | Size: 2360 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
534. | SC-KeyLog Free 2.25 (soft-central.net) | ||
all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An optional mailing feature allows you to automatically send the logfile to a specified email address on a user defined interval. Use this | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
535. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail client to pick up e-mail locally. Other users (hackers) cannot read your username / password across | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
536. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Backup Professional is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
537. | Security Folder 2.0 (everstrike.com) | ||
from unauthorized access. Introducing Security Folder by Everstrike Software, the unique folder data protection system intended to make your life times and times easier, while making sure your private and sensitive data are kept away from prying eyes! Security Folder represents the new generation of computer safeguard tools and is intended for hiding your files, folders and entire | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
538. | Security Task Manager 1.6f (neuber.com) | ||
functions and more. That process viewer recognizes virtual driver software, services, BHOs and stealth processes hidden from the Windows Task Manager. You can choose to terminate any process, delete it, or alternately quarantine it, which will disable it from running again without actually deleting it | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
539. | Send It Here! 1.0 (camtech2000.net) | ||
but is seldom used because of its extremely limited function. Few software authors install a shortcut there and it seems like the ones that do are virtually useless shortcuts. However it can be a very useful and time saving tool with some modifications and that's' where "Send To Here!" steps | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Campbell | Size: 1487 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
540. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
Pro is the complete network monitoring software. It offers IT administrators full control over the IT infrastructure by monitoring all event sources and notifying the occurrence of all critical events for corrective measures to be taken, manually or automatically, thus avoiding any undesired consequences. Sentry Pro Version features customized monitoring objects for servers (MS | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Software deployment software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|