|
||||||
|
||
|
Home > Server based software |
Related keywords: server, Server, web server, mail server, SQL Server, proxy server, web based, sql server, server monitor, time server |
|
|
891. | Password Officer DeLuxe 5.0 (compelson.com) | ||
of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure. -universal Single Sign-on solution -fully handles logon to web-pages -fills in the URL, forms, clicks to buttons -detects and fills in any program window -automatically runs programs | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
892. | Password Safe and Repository 3.43 (passwordsafe.de) | ||
user creates a database account and a password after installation, based on which, the Password Safe generates a database, in which any number of data records consisting of names, passwords and remarks that can be freely formated as well as any number of user-defined fields can be stored. The database is encoded with your master password. You can choose, whether or not to view the | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Malchar | Size: 2423 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
893. | pdf stamp command line 2.0 (toppdf.com) | ||
integrate PDF Stamp into yourself programs (Include client side and Server side applications). PDF Stamp (PDF Watermark) lets you stamp watermarks such as "Confidential" on pages that include sensitive information or "Draft" on a preliminary PDF document to be distributed for review. You can stamp PDF document names, revision numbers, Date/Time stamps, pages numbers, contact | |||
Updated: 2, 2006 | Rating: 0 | Author: X H | Size: 403 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
894. | Personal Antispy 1.2 (blazingtools.com) | ||
keyloggers, trojans and other spy software. Personal Antispy is based on wide knowledge of spy software behavior and made by professionals in this area. Remember - antivirus is not enough! Antivirus software and firewalls cannot detect most keylogger programs. Top 7 reasons to own Personal Antispy: You have confidential information on your computer (bank account information | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
895. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
896. | Print Inspector 6.0 (softperfect.com) | ||
very beginning) and provides easy access to the printer and print server settings. Print Inspector also features powerful print auditing capabilities: it saves to the special database detailed statistics about all printed documents (including the document name, date and number of pages, job date and | |||
Updated: 2, 2006 | Rating: 34 | Author: Andrey Kotov | Size: 1838 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
897. | Privacy Master 3.9 (webroot.com) | ||
eyes. Powerful 128-bit encryption combined with a unique session-based program style provide the tools you need to secure your privacy on-line and off. Open a secure session in Privacy Master, and whether you are working on documents or browsing the Internet, everything you do during your session is secured in encrypted and password protected files that are hidden from view. Close | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
898. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
899. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging programs | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
900. | ProUpdater 5.00.03 (openwindow.com) | ||
v5.0, Open Window's latest release of its highly regarded file backup and synchronization program, makes it easy to set up a customized backup routine to protect your irreplaceable data files. In addition, the program excels at the task of keeping your various machines "in synch". Using this double-threat capability, the user can set up a backup routine and a multiple-machine | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Bryant | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Server based software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|