|
||||||
|
||
|
Home > Defense software |
Related keywords: AA Defense, self defense |
|
|
61. | 1-st Virtual Promotional Clock 2.3 (promoclock.com) | ||
This 3D animated desktop clock offers 80 different models, designed in a wide range of popular themes, and shows the time in a virtual analog display, including hours, minutes and seconds. Unique promotional product - These clocks may also be customized with promotional material and distributed as free gifts | |||
Updated: 9, 2005 | Rating: 128 | Author: Michael Ginzburg | Size: 720 kb | Freeware Go to category: Desktop > Other Similar programs | |||
62. | Ham University 2.002.06 (aidsoft.com) | ||
Ham University - Morse Training and Testing QST Review by Dan Miller November 2001 Actual Morse code lessons are accessed by clicking on “Lessons.” You must first put a Lesson Plan together. This is easily accomplished following the directions guided by Morris the Cat—an animated cat who assists by describing | |||
Updated: 9, 2005 | Rating: 292 | Author: Michael Crick | Size: 1275 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
63. | The Bible Collection 1.0 (cardsrightnow.com) | ||
The Bible Collection provides a personal library of beautiful note cards and greeting cards that feature inspirational quotes from the Bible accompanied by wonderful pictures of birds in their natural settings. Quotes are in chronological order from Genesis to Maccabees. These cards are formatted and ready to | |||
Updated: 9, 2005 | Rating: 0 | Author: Lee Grant | Size: 564 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
64. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
Opera. Asmw Eraser Pro completely implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standards, You can then completely overwrite files with random characters making them unrecoverable by undelete or un-erase utilities giving you confidence that once deleted with Asmw Eraser Pro, your file data is gone forever and cannot be recovered, It Supports | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
65. | BPS Windows Trace Remover 5.0 (bulletproofsoft.h4host.com) | ||
strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be a dangerous weapons in the wrong hands. Wipe out incriminating evidence (not that there is any, of course) with Windows Trace Remover, a | |||
Updated: 9, 2005 | Rating: 77 | Author: Naglaa Elbanhawy | Size: 5479 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
66. | HTTP Weazel 1.09 (httpweazel.com) | ||
Tool for ripping whole Websites. Through the use of the latest cuting-edge technologies (JavaScript, Macromedia FLASh (tm)) it is possible to view the downloaded sites locally as if you were on-line. Additionally you can share projects over you LAN via the integrated HTTP Server. You can automate your | |||
Updated: 3, 2005 | Rating: 0 | Author: Magnus Jungsbluth | Size: 1425 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
67. | JBMail 3.2 (jbmail.pc-tools.net) | ||
attachment support, advanced junk filtering, address books, and defenses against destructive attachments. It is naturally immune to HTML and scripting attacks. With its secure design, small size, and SSL support this client is ideal for the road warrior or security-conscious remote mail user. JBMail is a compact and portable secure e-mail client that supports SSL/TLS encrypted POP3 | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
68. | KFSensor 2.0.1 (keyfocus.net) | ||
This approach complements other forms of security and adds another defense against the growing security threat faced by all organizations. KFSensor is a host based Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers by simulating vulnerable system services and trojans. The system is highly configurable and features detailed logging, analysis of | |||
Updated: 9, 2005 | Rating: 0 | Author: KeyFocus Team | Size: 1052 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
69. | MacWasher X 1.1 (webroot.com) | ||
Software's MacWasher® X provides security on Macintosh OS X by allowing you to power-wash your activity history, protecting your privacy online and offline. Many people do not realize that the operating system and other software programs store information about what they have done, what applications they've launched, what documents they've used, what web sites they've visited, and | |||
Updated: 9, 2005 | Rating: 23 | Author: Steve Thomas | Size: 4583 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
70. | Norton AntiVirus Professional 2004 (nct.symantecstore.com) | ||
Norton AntiVirus 2004 Professional is the world’s most trusted antivirus solution†with advanced protection. It combines award-winning virus defense with tools to help you recover important files and securely delete sensitive information. And it comes with a license for two computers, so it’s perfect for home offices. Norton AntiVirus detects and | |||
Updated: 9, 2005 | Rating: 24 | Author: Jennifer Leonard | Size: 27977 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Defense software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|