|
||||||
|
||
|
Home > Computer security policy software |
Related keywords: security, computer, Security, computer security, internet security, computer game, security software, Computer, information security, computer software |
|
|
51. | Masking Password Generator Pro 3.0 (accusolve.biz) | ||
strength password or number generator for the individual home computer user or the large corporation or organization. Generating strong, difficult-to-crack random numbers or passwords has never been easier! Create one or many millions of passwords using simple wizards or a complex and very flexible masking syntax. Generate extremely obscure passwords, pronounceable passwords, or | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Peckham | Size: 3205 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
52. | Hide Folders XP 2.2 (fspro.net) | ||
day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of being disclosed. Hide Folders XP in innovative file and folder hiding | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
53. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
54. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
55. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
56. | AntiSpy 2.11 (softvers.com) | ||
eliminates the traces of your internet activity and work on the computer. Clear History,Cookies,index.dat, Temporary Internet Files, Cache, Run and find history and a lot of other | |||
Updated: 9, 2005 | Rating: 34 | Author: DevelopEx _ | Size: 1231 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
57. | BoostXP 2.00 (systweak.com) | ||
a utility suite, that lets you tweak many Windows settings, enhance security and more. It also includes a cache and cookie manager as well as tools to split files, repair corrupt zip files and securely delete documents. A Maintenance Wizard can help you to perform most of the common cleanup and maintenance tasks with a single click. BoostXP has mind-blowing features to separate it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
58. | Chaperone 4.0 (css-software.com) | ||
that there are users who shouldn't have complete access to the computer all the time. Using advanced scheduling techniques completely control of how and when the computer is used is easily obtained. Most common methods of controlling what programs can be run are based on preventing the program from running at any time. Chaperone gives the added flexibility of enhancing | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
59. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) | ||
Innovatools ComputerWatermak you get a real chance to recover your computer in case it gets stolen, or make sure you have a proof in any dispute over the ownership of your computer or disk(s). Innovatools ComputerWatermark writes your name and address (or any other information you want) | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
60. | 1st Files Privacy Tool 2.4 (privacywindows.com) | ||
protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : 'Hidden', 'Read Only', 'Full Control'. It works with any Windows platforms : 9.x/ME/NT/2000/XP . 1st Files Privacy Tool can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Mihailov | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Computer security policy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|