|
||||||
|
||
|
Home > On line security software |
Related keywords: security, Security, line, command line, computer security, on line, internet security, security software, off line reader, information security |
|
|
51. | Royal Dice Casino $150 Free! 2005V (best-on-line-casinos.com) | ||
Royal Dice Casino's software is using state of the art security features to provide its players with a 100% full proof secured environment. Any delicate information, which is transferred between the software and the casino servers, is being encrypted using the latest encryption technologies. All of the financial transactions in the Royal Dice Casino are being | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Black | Size: 140 kb | Freeware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
52. | SpyPC 7.0 (xelerate.biz) | ||
and will surpass the simple surf control software that is included on your PC. Spy PC not only offers you rigorous access control to the Internet, it also effectively restricts access to certain parts of the PC. With its stealth surveillance functions, you can see what your kids or an intruder really accesses on your PC. Spy PC allows you to Log all keystrokes in chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
53. | RemoteExec 3.07 (isdecisions.com) | ||
It allows you to remotely execute the same program simultaneously on multiple computers, without requiring preinstalled agents on target machines. RemoteExec® will dramatically minimize, simplify and secure all software and operating system administration tasks (Application and upgrade deployment, script and batch launching…), without disrupting on-going production | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
54. | Credit Card Knight 1.3 (fspro.net) | ||
by carders. Most Internet Explorer users have autocomplete settings on. When you are shopping on-line and filling an order form, Internet Explorer saves the data you have entered into a safe place (Windows Protected Storage). Protected Storage, however, is not so safe and it is possible | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 776 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
55. | PAL PC Spy 2004 3.01 (palsol.com) | ||
its kind available that allows parents and businesses to engage in on-line surveillance that incorporates a computer monitoring system with the latest web filtering technologies. PAL will automatically record everything your spouse, children and employees do online. Features include: email monitoring (incoming/outgoing), chat rooms, instant messages complete keystroke logging | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1677 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | Privilege Master 1.0 (shareware-promotion.com) | ||
every IT manager knows, security is a trade-off between usability and the level of protection required. For example, to prevent users making unauthorised configuration changes to their system, users are normally given only basic security rights to their system. This is fine until the user has a legitimate reasons to make changes to their system. Perhaps to install a | |||
Updated: 9, 2005 | Rating: 16 | Author: Blue Square Software Blue Square Software | Size: 9085 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
57. | QuickWiper 7.6.3 (aks-labs.com) | ||
typed URLs, temporary and recent files. QuickWiper has several security modes. You can use simple windows deletion, wipe files with single pass wiping or use most secure NSA erasure algorithm. Using QuickWiper you can decide whether you want to wipe file names. Command line support. QuickWiper has build-in options to support a command line usage. - You can | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
58. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
59. | Identity Knight 1.3 (fspro.net) | ||
new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > On line security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|