|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
601. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
A sophisticated keyboard spying tool for personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
602. | Undelete Server and Professional 4.0 (execsoft.com) | ||
How valuable is the data on your servers and PCs? What if you or your users lost a critical accounting file, a major report, or even digital snapshots of the family? The Windows Recycle Bin doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
603. | Universal Shield 4.0 (everstrike.com) | ||
hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that information is money | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
604. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
605. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
606. | VisNetic AntiVirus Plug-in for VisNetic MailServer 4.6 (deerfield.com) | ||
Powered by Kaspersky Labs, its installed on the email server computer rather than dispersed on each client computer. Infected email can be deleted, quarantined, or forwarded to an administrator. Kasperskys continually updated virus signature list is designed to download only the necessary update information | |||
Updated: 9, 2005 | Rating: 0 | Author: Deerfield Com | Size: 6609 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
607. | VisNetic Firewall 2.3 (deerfield.com) | ||
peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced | |||
Updated: 2, 2006 | Rating: 0 | Author: Deerfield Com | Size: 4601 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
608. | Visual Audit Trail 2.0 (visual-audit.homeip.net) | ||
or save the entire records data before and after a update. It's up to you. Visual Audit Trail is also more flexible than other auditing solutions with "when and what" should get audited by using conditional expressions. The possibilities are almost limitless. One application handles both Centura and SQL Server databases. Why is auditing important? Allow database | |||
Updated: 3, 2005 | Rating: 42 | Author: Ben Rosato | Size: 4992 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
609. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
commercial property, private homes and more. Whether you're a security manager responsible for monitoring access to multiple sites, a school administrator who needs to ensure unauthorized people cannot gain access to your campus, or anyone interested in monitoring their business or their home, Visual Hindsight is a powerful, easy to use and affordable desktop video surveillance and | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
610. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|