|
||||||
|
||
|
Home > On line security software |
Related keywords: security, Security, line, command line, computer security, on line, internet security, security software, off line reader, information security |
|
|
61. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
recorder. It displays the current window or program that is running on your computer. All information is stored in strongly encrypted, compact log files, that can be easily archived. ActMon can hide the logs on the monitored PC or send them via network or email. The monitoring can be opted | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
62. | Innovatools Audit MP3s 1.5 (whatsonmycomputer.com) | ||
MP3s allows you to easily see the MP3 and other media files you have on your computer, on any drive, folder, MP3 CD, ZIP or other removable disks, or on your network servers, workstations or user folders and get detailed information about each file (location, size, song title, artist | |||
Updated: 9, 2005 | Rating: 0 | Author: Dominic Dan | Size: 784 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
63. | BackToZIP 7.10 (aborange.de) | ||
confess: there are a lot of backup utilities on the market. But when I was searching for a tool for my daily and weekly backups, I quickly realized that the available tools were either too complicated, too expensive or had other disadvantages. Clearly, these disadvantages would not only have | |||
Updated: 2, 2006 | Rating: 0 | Author: Mathias Gerlach | Size: 3217 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
64. | Backup Forever 2.6 (schulers.com) | ||
extra information as possible to recover all information recorded on the backup even if a failure destroys some file regions. There are two versions: graphic and command line. FAQ: Can I backup my entire Hard Disk including the system operational using Backup Forever? Yes. However, Backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Joгo Schuler | Size: 1552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
65. | Comm-Logger 1.0 (wcscnet.com) | ||
is ideal for logging serial data from applications like PBXes, security systems, or any application in which serial data must be recorded to a file for archive purposes, data import, or any other use. Comm-Logger's graphics interface allows for easy and intuitive use. Comm-Logger's command line interface can be started from the scheduler, startup, or anywhere | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
66. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
67. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
68. | DLOCK2 2.01 (eBible.org) | ||
is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2 | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
69. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
70. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > On line security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|