|
||||||
|
||
|
Home > Security software |
|
|
771. | DMUSB 2.8.0 (flenik.com) | ||
your first backup set. DMUSB makes its best not to compromise your security policy. The only shares required are those of the installation folder and the backup target. These shares can be hidden from public view and known only to DMUSB. Clients do not need to share their drives, at all. Nevertheless | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
772. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
Ram by 60-70%. In addition the program gives Windows powerful security and anti-hacking features, such as restricting access to dos, games, control panel, system settings, memory settings, display controls, desktop settings, 160 bit file encryption and desktop lock. Window Power Tool is the No. 1 System Optimizer for Windows 95/98/Me/NT4/2000/2003/XP. It not only increases Internet | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
773. | DriveCryptPlusPack 1.0c (securstar.de) | ||
training requirements, but it creates the foundation for enforceable security. The careful integration of boot protection and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents subversion of the operating system (via floppy bootup, for | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
774. | DriveScrubber 2.0a (iolo.com) | ||
operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
775. | dsCrypt 1.10 (members.ozemail.com.au) | ||
advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
776. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
777. | DynamicalPassword 1.1 (advmathappl.com) | ||
the date. It is also useful for discovering weak links in a complex security system with many passwords protected elements/units. With "Dynamical Passwords" you may generate passwords on any date (even each day). There is no need to remember or save all these generated passwords as far as you can remember you personal password (key) and the date. It is also useful for | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor | Size: 11 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
778. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
We can customize reports for our clients. ESCM also have strong security features, allowing assignment of proper Users to Groups accessing only to certain features of application. Also ESCM if fully language-customizable, so one can translate it quickly to his native language. ESCM was written using Microsoft Visual Basic 6.0, Microsoft SQL Server 7.0 (works under SQL 2000) | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
779. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
780. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|