|
||||||
|
||
|
Home > Defense software |
Related keywords: AA Defense, self defense |
|
|
61. | Skip 2.34 (arrowtwins.com) | ||
GUI or console mode interactive or script driven SCSI/ATAPI device exerciser. User can send individual commands to an ATAPI or SCSI DVD CD Disk or tape device, read sectors, write sectors, change mode pages, etc. Completely programmable. GUI or console mode interactive or script driven SCSI/ATAPI device | |||
Updated: 9, 2005 | Rating: 0 | Author: Chuck Leis | Size: 945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
62. | Symantec AntiVirus for Handhelds Annual Service Edition 2004 (nct.symantecstore.com) | ||
files quickly and uses very little memory. It provides real-time defense against viruses when you download files or receive email attachments on a Pocket PC, or when a malicious program tries to execute on a Palm OS-based PDA. You can automatically scan to detect viruses acquired from synchronizing | |||
Updated: 9, 2005 | Rating: 0 | Author: Jennifer Leonard | Size: 13465 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
63. | System Cop 1.1 (mahaonsoft.com) | ||
System Cop is a universal, flexible and powerful tool for tuning and optimizating the work of the Windows operating systems. System Cop allows you to change a great number of standard and "hidden" (which are not available for editing by standard Windows tools) settings of the Windows operating systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Mahaon soft | Size: 718 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
64. | System Shield 2.1c (iolo.com) | ||
System Shield uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL files that have been deleted are permanently disposed of, beyond ALL possible techniques of recovery. It works by proactively finding files that have been deleted (which will still remain on your system) and eliminating the data that was once held within them, as well as | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
65. | ThmIndxr 01.22 (L5Software.com) | ||
publish the URL where you installed your new pages, or provide link(s) from your existing pages: As soon as the pages ThmIndxr(tm) creates are loaded onto the server, they are "ready to go." ThmIndxr(tm) is not "as is" software, but is guaranteed to perform as described in its manual and online | |||
Updated: 9, 2005 | Rating: 0 | Author: Fred Koschara | Size: 1988 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | My Firewall Plus 5.0 (webroot.com) | ||
knowledge. My Firewall Plus is an advanced, bi-directional intrusion defense system that's both easy to configure and easy to use. My Firewall Plus makes your computer impenetrable to the outside world. It installs easily and automatically detects your Internet connection and settings. Simply | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | Free Internet Eraser 2.05 (privacyeraser.com) | ||
cookies, address bar search history of your browser, and Window's temp folders, run history, search history, open/save history, recent documents and more. In addition, you can have Free Internet Eraser automatically clean your files when Windows is started or shutdown. Free Internet Eraser implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Kent | Size: 852 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
68. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
69. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
70. | CopyProf 1.40 (time-river.com) | ||
Brief description If you need to sort (copy, move) files basing on formal criteria often CopyProf will help you automate this process. CopyProf is implemented as a console application (works under Win32 - v1.40, DOS and OS/2 - v1.11). Incoming files are placed in user defined archive formed basing on If you need to sort (copy, move) files basing on formal criteria often CopyProf will help you automate this process. CopyProf is implemented as a console application (works under Win32 - v1.40, DOS and OS/2 - v1.11) | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Sobolev | Size: 156 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Defense software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|