|
||||||
|
||
|
Home > Registry security software |
Related keywords: security, registry, Security, Registry, computer security, internet security, security software, registry cleaner, registry fix, information security |
|
|
1. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
2. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
to add and delete certificates from certificate stores found in the registry, filesystem, or even directly in memory. Chilkat Crypt is an advanced ActiveX encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
3. | Chilkat Encryption .NET Component 2.2.0 (chilkatsoft.com) | ||
to add and delete certificates from certificate stores found in the registry, filesystem, or even directly in memory. Chilkat Crypt is an advanced .NET encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. Works with C#, ASP.NET | |||
Updated: 9, 2005 | Rating: 42 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
4. | NTSet 1.14 (sam-solutions.net) | ||
used; - Assign access rights for files on NTFS; - Configure registry security settings; - Control the privileges given to the users; - Verify users'credentials against Windows NT Domain; - Retrieve and set a variety of setting for network computers; - Send messages over the network to a remote computer; - Browse network resources and connected devices; - Monitor | |||
Updated: 9, 2005 | Rating: 0 | Author: SaM Solutions | Size: 1196 kb | Shareware Go to category: Development > Delphi Similar programs | |||
5. | Registrar Registry Manager 4.03 (resplendence.com) | ||
Registry Manager is a complete registry management solution with a wealth of powerful features. It is intended as a complete and safe solution for administrators and power users for maintaining the registry on both the desktop as well as remote computers on the network. It offers the benefit of a one-stop registry management solution, a very rich set of | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
6. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
other programs fail, for example, cleaning related traces in the registry. With the optional shredder not even finest magnetic tracks are left of any compromising or confidential information. Removes history, cookies, temporary cached files, and the typed-address list of Internet Explorer, AOL, MSN, Netscape Navigator, and Opera. Many Windows options, as well as most-recently-used | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
9. | Advanced Administrative Tools 5.92 (glocksoft.com) | ||
you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over. Protect your data, privacy and valuable computer system with AA Tools. AATools investigates and | |||
Updated: 2, 2006 | Rating: 173 | Author: Alex Markov | Size: 3087 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
10. | Atelier Web Security Port Scanner 4.61 (atelierweb.com) | ||
of tools, some of them unique, for in-depth assessment of Network Security: * High-speed TCP Connect scanning engine, with adjustable maximum number of simultaneously opened ports and no-connection time-out adjustment. * High-speed TCP Syn scanning engine for Windows 2000 platforms with TCP/IP and ICMP packet capture, report on Open/Retransmits, Close, Filtered ports, ICMP | |||
Updated: 9, 2005 | Rating: 48 | Author: Jose Pascoa | Size: 1366 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Registry security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|