|
||||||
|
||
|
Home > Site access software |
Related keywords: access, site, Access, access control, web site, ms access, remote access, dating site, microsoft access, MS Access |
|
|
551. | PCWash 3.2 (pcwash.com) | ||
complete, recent files lists, browser cache, browser history logs, site addresses, Windows temporary files, cleans recycle bin, frees up valuable drive space and securely deletes and overwrites any file you selectively choose. PCWash also prevents rogue website from changing your browsers homepage | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
552. | Perfect Privacy 2.0 (blumentals.net) | ||
usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks that are stored to your computer as you use it. You can eliminate all traces or specify a selection. Cleanup can be done with a single click; it can be also executed automatically at specified | |||
Updated: 9, 2005 | Rating: 16 | Author: Karlis Blumentals | Size: 955 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
553. | PestPatrol 3.0 (safersite.com) | ||
lose passwords, customer data, intellectual property - even your web site or, if you telecommute and connect to your office via a VPN, the entire corporate network. PestPatrol defeats the threat by detecting and eliminating: * Trojan horses: denial-of-service attack agents, remote access | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
554. | ProBot SE 2.3.0 (nethunter.cc) | ||
a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
555. | Protector Plus for Windows Me/98 7.2.H03 (protectorplus.com) | ||
infected email. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus will automatically download the virus database updates from the developer's web site free of cost. The updates are released every week and also in case of emergencies. Protector Plus is easy to install and use | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Watson | Size: 5959 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
556. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords, corrupted workgroup | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
557. | SafeData Technology Suite 1.0 (codetek.com) | ||
create a virtual safe for totally private document storage. SafeFile’s™ virtual safe prevents anyone else who uses the same computer from being able to access any files you place inside the virtual safe. SafeClean™ quickly removes Internet history files and caches that can allow others to find out what you have been doing on the Internet, possibly revealing personal and | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Thompson | Size: 2365 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
558. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
559. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
560. | SkimStart 1.05 (skimsoft.com) | ||
is a system tray utility program that helps you to have one-click access to all your favourite files, folders, sites. It helps you to organize your notes and quick start hidden windows utilities. Skimstart supports shortcut copying and drag&drop with windows explorer. SkimStart is a powerful Windows utility program that helps you to have one-click access to all your | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Sheremetev | Size: 81 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Site access software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|