|
||||||
|
||
|
Home > System security software |
Related keywords: security, system, Security, System, system tray, computer security, internet security, security software, encryption system, SYSTEM |
|
|
641. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
642. | SignStation 2.00 (com-and.com) | ||
a file manager: you can navigate between files and folders on your system, connect to a network path, delete, find and open files, also execute programs. Tips that you have learned using your system like drag and drop and right popup menus are also available on the classic interface. Operations that execute external programs are alerted to the user for its approval. A smtp | |||
Updated: 8, 2004 | Rating: 0 | Size: 5956 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
643. | SMB File Sniffer 1.0.0.1 (microolap.com) | ||
File Sniffer is a powerful network security utility for logging SMB protocol (sometimes called NetBIOS over TCP) files operations and capturing file bodies, transmitted within a LAN. SMB File Sniffer allows you to: - log SMB file operations with two levels of logging: detailed and errors only; - intercept files transmitted within a LAN by SMB protocol (Windows and non-Windows | |||
Updated: 8, 2004 | Rating: 0 | Author: microOLAP Technologies | Size: 1378 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
644. | Super Recycle Bin 1.00 (4diskclean.com) | ||
German, and all other known published government-level data disposal security requirements. When you delete a file in any Windows system you're only informing the operation system the space in the disk the file uses can be overwrite in the future by another file. The content of a deleted | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
645. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
Program will stay in hidden mode and automatically starts when the system is rebooted. This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
646. | WIDO Logbook 1.3 (home.t-online.de) | ||
Remark 1: The LogbookService starts automatically every time the system starts. Therefore, a report for the account 'LogbookService' represents the turn-on times of the computer! Remark 2: Change of system time does not influence the correct recording of the duration of the sessions | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > System security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|