|
||||||
|
||
|
Home > Protection software |
|
|
981. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, ESCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
982. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
emailed to you for analysis + more! Other features include password-protection, peer-to-peer network support, remote monitoring updates and a comprehensive user-activity log viewer. Monitor the activities of local and remote computer users. e-Surveiller allows you to view the screens of monitored | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
983. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
984. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
985. | Easy File Protector 4.14 (softstack.com) | ||
your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, unmodifiable, and unexecutable. With the wild cards feature, you can protect all files that have the same extension (such as EXE, DLL, DOC, etc.) Easy File Protector also provides password protection, user-dependent | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
986. | Eazy Backup 3.0.1 (ajsystems.com) | ||
The Eazy Backup utility is designed to make it easy for all users with any level of expertise to create a backup or archive file of popular applications. More importantly, Eazy Backup makes it easy to restore data from a backup or archive file. Eazy Backup knows where the critical data is located and knows | |||
Updated: 2, 2006 | Rating: 0 | Author: Al Price | Size: 6856 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
987. | EldoS KeyLord 4.0 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates with your web browser and helps you store login information not in insecure Windows Password Storage (for which browsers and crackers exist), but in encrypted KeyLord file. EldoS KeyLord lets you arrange confidential information (passwords, account | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
988. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, print it and store it in secure encrypted file. You can store any data including files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
989. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
990. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|