|
||||||
|
||
|
Home > On line security software |
Related keywords: security, Security, line, command line, computer security, on line, internet security, security software, off line reader, information security |
|
|
71. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
72. | FastSplit Gold 2.5 (piquest.com) | ||
FastSplit Gold to backup large files to fit on any media. You can run FastSplit Gold from a window, command line or batch file. Its intuitive interface makes it very easy even for beginners to backup their work to removable media. Later when you need to restore your critical files, FastSplit | |||
Updated: 9, 2005 | Rating: 0 | Author: Omer Paran | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
73. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | Identity Knight 1.3 (fspro.net) | ||
new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
76. | Logbook 1.7 (home.t-online.de) | ||
Functions: ---------- Registration of working hours on PC including time of boot up, shut down, standby and user change. Resistant to manipulations. Detailed reports and totals of months. For self-control or children-control. After installation you can see a small clock icon in the taskbar. If you click this icon (right mouse button) you can see: - how long are | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
77. | Wondercam 1.01 (intranet.wonderlabs.info) | ||
an eyectly from your mobile phone, PC or PDA keep an eye on what's going on in your house while you're away. Simple installation: You will have operative your WonderCam application completely for Windows in minutes.Only you will have to follow a simple assistants . The application is automatically configured. Mobility: Access to the realtime images from | |||
Updated: 3, 2005 | Rating: 0 | Author: Wonderlabs | Size: 3593 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
78. | PAL PC Spy 2004 3.01 (palsol.com) | ||
its kind available that allows parents and businesses to engage in on-line surveillance that incorporates a computer monitoring system with the latest web filtering technologies. PAL will automatically record everything your spouse, children and employees do online. Features include: email monitoring (incoming/outgoing), chat rooms, instant messages complete keystroke logging | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1677 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
80. | Privacy Master 3.9 (webroot.com) | ||
program style provide the tools you need to secure your privacy on-line and off. Open a secure session in Privacy Master, and whether you are working on documents or browsing the Internet, everything you do during your session is secured in encrypted and password protected files that are hidden from view. Close your session and your personal information vanishes and is | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > On line security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|