|
||||||
|
||
|
Home > Registry security software |
Related keywords: security, registry, Security, Registry, computer security, internet security, security software, registry cleaner, registry fix, information security |
|
|
51. | JBMail 3.2 (jbmail.pc-utils.com) | ||
POP3 and SMTP. The software has been designed for simplicity, security and on-line mailbox access meaning that mail is manipulated remotely and NOT stored locally. Delete spam or large attachments without having to first download them! This portable software does not require installation, registry keys or even temporary files. JBMail can be run from a CD or floppy disk, yet | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
52. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
feature allows you to easily assign any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
53. | System Key Wizard 2.1 (home.wol.co.za) | ||
with your own messages. 7. You can specify the name of the registry key you want to use. 8. Encryptkey prevents other users of the component from decrypting your keys. 9. The component is data aware. This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
54. | System Key Wizard 2.1 (continuumq.com) | ||
with your own messages. 7. You can specify the name of the registry key you want to use. 8. Encryptkey prevents other users of the component from decrypting your keys. 9. The component is data aware. This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
55. | Innovatools What's On My Computer 2.0 (whatsonmycomputer.com) | ||
it? Do other people know what this file on your computer is? Or this registry key? Or this deleted file you have in the Recycle Bin? Innovatools What's On My Computer has the answers that you are looking for! The software gives you access to information about any file, folder, or program on your computer, allowing you to easily search the Internet, newsgroups, FAQs, etc. for the | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1135 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
56. | WhatChanged for Windows 2.0 (prismMicroSys.com) | ||
what changed? Now get detailed data on changes to the file and registry of the networked PC with one mouse click. Restore and Undo Restore changes to the registry. WhatChanged for Windows captures detailed information (called snapshots) on the file and registry. A friendly graphical Explorer-like Change Browser allows easy traversal of directory or registry tree | |||
Updated: 9, 2005 | Rating: 0 | Author: Prism Microsystems | Size: 4783 kb | Demo Go to category: System Utilities > System Maintenance Similar programs | |||
57. | SpyPC 7.0 (xelerate.biz) | ||
modifications, disable all system functions such as editing the registry, accessing the control panel or command line and much more. WATCH YOUR EMPLOYEES, because you never know what gets done once you are out of the office. Protect yourself from false claims with evidence such as screen captures and keystroke logs. Confront marathon web surfers with their time spent on the web or | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
58. | Startup Sentry 2.20 (digitalwidget.net) | ||
Trojan Horse applications that install themselves in your system's registry. You'll learn about drivers that are still being loaded for hardware that you might have removed long ago. You'll see any application "extras" that load at startup which you might not use, but are consuming precious resources. Most systems load dozens, even hundreds of applications and drivers at startup | |||
Updated: 9, 2005 | Rating: 0 | Author: Digital Widget | Size: 3125 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | StormWindow 2000 3.02 (cetussoft.com) | ||
system of a Windows 2000 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 2000 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1285 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
60. | StormWindow 95 4.55 (cetussoft.com) | ||
and system of a Windows 95 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Registry security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|