|
||||||
|
||
|
Home > Files security software |
Related keywords: security, files, Security, computer security, internet security, hide files, security software, Files, PDF files, compare files |
|
|
811. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
812. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
813. | pdfMachine 9.2 (broadgun.com) | ||
affordable way to produce great quality PDF files with ease! If you know how to print a document then you already know how to use pdfMachine. It works with virtually any windows application - just print to the pdfMachine. A fraction of the cost of Adobe Acrobat. Supports Multilingual fonts, Mail Integration, PDF Editing, Small File Sizes, Ease of Use, PDF Stationery | |||
Updated: 9, 2005 | Rating: 0 | Size: 19456 kb | Demo Go to category: System Utilities > Other Similar programs | |||
814. | PowerKey 2.11.01.22 (elcor.net) | ||
easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool designed to | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
815. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
816. | RSHUT PRO 2.8 (rtsecurity.com) | ||
RSHUT may do all your daily work concerning computer power management. Use this to shutdown/reboot your computer or remote computers over your network/Internet instantly,schedule your actions.Supports password protection and many additional features. Are you have to shutdown many computers at the same time | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vardugin | Size: 593 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
817. | S.O.S.Automation 1.01 (sosautomation.com) | ||
Its installation is extremely simple and takes a few minuet. S.O.S.Automation serves also as a standard automatic answering machine. This enables S.O.S.Automation to share any telephone line with any other use. S.O.S.Automation supports also be directional communication. You can call S.O.S.Automation at any time and gain the same | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
818. | SecurDesk! 5.32 (cursorarts.com) | ||
many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
819. | SecureWord 1.5 (cezeo.com) | ||
for storing important information such as logins, passwords and files. Taking into consideration that somewhat similar programs exist, let us explain you why you should choose SecureWord and in what ways we enhanced and developed our program for your convenience. We are using modern and secure encryption algorithms. The main method, used in SecureWord is AES, Advanced Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
820. | Security Folder 2.0 (security-folder.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Files security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|