|
||||||
|
||
|
Home > Protect server software |
Related keywords: server, protect, Server, web server, mail server, SQL Server, proxy server, sql server, server monitor, time server |
|
|
51. | HistorySweep 2.20 (historysweep.com) | ||
files, leaving them vulnerable to recovery. HistorySweep will protect your privacy in four of the top web browsers on the market (Internet Explorer, AOL Browser, Netscape, FireFox, and Opera) eliminating your history files beyond all practical recovery. The automation features included in HistorySweep will automatically remove your history files each time you boot your machine | |||
Updated: 2, 2006 | Rating: 16 | Author: Web Master | Size: 1425 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
52. | Spytector 1.2.8 (spytector.com) | ||
via Email or/and FTP. In the delivered logs are also included the Protected Storage passwords (Outlook, MSN and others) and URL history (visited websites). The keylogger is using advanced hooking and stealth techniques. Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into explorer.exe on the startup and | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrei Radu Poleacu | Size: 1006 kb | Shareware Similar programs | |||
53. | Link Commander Lite 3.0 (resortlabs.com) | ||
duplicate elimination, etc. A bookmarks collection can also be protected with a password. You can open bookmarks with any browser installed on your computer. For Link Commander, a Bookmark is not just a URL. When you add a bookmark, the program analyzes the page you bookmarked and retrieves additional info from it, such as title, short description, keywords, etc. This info helps | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Grishaev | Size: 3476 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
54. | StaffCop 1.9.5 (staffcop.com) | ||
web sites.??Features:?+ All actions, including installation to user's computer, can be carried out by system administrator remotely.??+ Automatic data saving (screenshots, visited web sites, and run programs) every certain period of time - may be useful for viewing employee's complete work day | |||
Updated: 2, 2006 | Rating: 0 | Author: StaffCop Software | Size: 2054 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
55. | Duplicate Finder 3.0 (ashisoft.com) | ||
to be excluded from scanning altogether. + Can use wild cards. + Protects the windows and system folders. + Skips the hidden files and folder. + Show file versions and properties. + Resizable popup picture viewer. + Save search session and results for future searches. + Results can be exported in two | |||
Updated: 2, 2006 | Rating: 4849 | Author: Ishtiaq Mohammed Hussain | Size: 1898 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
56. | Visual Drawing Maker 1.14 (xpcad.net) | ||
is needed to explore, print and postil a drawing. 3.Difficulties to protect company intelligent property rights and technique secrest when providing customers with source design drawings, etc. Developed on the CAD midware technique basis, under lots of operation systems, it can be used on various CAD platforms. Presently it can support AutoCAD R14 to R2006 , IntelliCAD 3 to 5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Yuan GaoFei | Size: 1883 kb | Shareware Go to category: Graphic Apps > CAD Similar programs | |||
57. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work - encryption will take | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
58. | Silver Key 3.3 (filecryption.com) | ||
and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate HIPAA-compliant encryption. Silver Key is the silver bullet for secure file transfer. It is a single-click solution if you want it simple, and offers a rich set of features when you want more power. Silver Key | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
59. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | Tray Safe 4.3 (traysafe.com) | ||
Tray Safe password manager is a proud holder of the world's most secure password keeper title because of its unique hardware ID feature. Basically, it means that the program works only on a single PC (yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Protect server software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|