|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
561. | Secure Disk 1.1 (wekasoft.com) | ||
powerful and proven cryptographic algorithm it can provide the best security. After installing SecureDisk, you can choose to create a virtual disk file which acts as a container that contains data and when been mounted by SecureDisk, a new logic driver will be created, you can look the new driver as a | |||
Updated: 9, 2005 | Rating: 0 | Author: weka zhang | Size: 1682 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
562. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
563. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
564. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
most advanced & powerful system security software of its type. In just a few mouse-clicks, even your kid can provide total freedom for your PC, from hackers, trojans, keyloggers, spying programs, all hidden & malicious stealth programs!! Features No matter whatever Stealth Algorithm a program is using, it cannot escape from Advanced AntiSpy Mode!! Searches all the | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
565. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
566. | Server Maintenance Portal 3.2 (absolutedynamics.com) | ||
assets across the network. SMP also works with Microsoft Baseline Security Analyzer to determine the security state of your Windows systems. Integrated with MBSA 2.0. Disk space monitoring and reporting. Easy-to-navigate web pages. Flexible reporting options. Intuitive Active Directory searches. Import/Export options. Easy to automate using command line parameters. IT Asset | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
567. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, SCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
568. | Service Center Operator 2.3 (newageit.com) | ||
shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, Service Center has great "Reports" section, covering all kinds | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
569. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, SCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
570. | SHA1files 1_6 (users.skynet.be) | ||
SHA1files is a 32 bits console application that computes the SHA1 digest of files under Windows. The main applications are    - the detection of any change in files (typically a web server directory to make sure no file has been altered - integrity check)    - the detection of duplicate files files under Windows | |||
Updated: 3, 2005 | Rating: 76 | Author: Christophe DAVID | Size: 36 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|