|
||||||
|
||
|
Home > Technologies software |
Related keywords: conversion technologies, ADS Technologies, comet video technologies, Kryloff Technologies, neuropower technologies GmbH |
|
|
951. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
952. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
953. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
pop-ups will be automatically blocked after a few seconds. The technology is invisible to sites that try to detect and foil blockers. Its design isn't based on a specific browser so it will work on most computers. There is no need to install any proxy servers or plug-ins. The Pro edition includes common features such as a "White list" and the classic "Instant-Blocker". Our task | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
954. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
955. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
956. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
a serial port from a PC or a terminal. Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has the like solution: it is a product for the | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
957. | Extractor 1.1 (calcom.de) | ||
JAR and TAR archive files. Platform independent due to pure Java technology. Help included. Freeware. Java VM | |||
Updated: 8, 2004 | Rating: 0 | Author: Ulrich Hilger | Size: 87 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
958. | EzCrypt+ 2.01 (kmgi.com) | ||
data as simple as a mouse click. KMGI is a leading Internet technologies company whose innovations have been acclaimed as "The cutting edge" (CNN) and "The Future of the Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
959. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
and the rate seems to grow. With its sophisticated virus detection technology combined with a fast and automated updating mechanism, your PC is protected within a few hours after a new virus has been found in the world. Easy to install and use F-Secure Anti-Virus 2004 is extremely easy to | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
960. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
protection against viruses and hackers. Coupled with the industry's fastest update services and the most powerful personal firewall, it prevents intrusions and keeps your computer virus free at all times. The intuitive user interface is also extremely easy to use, but yet offers a rich set of features for advanced users. Key features: Complete protection for your PC F-Secure | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Technologies software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|