|
||||||
|
||
|
Home > Security technology software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, technology |
|
|
1. | Active ERASER 4.01 (active-eraser.com) | ||
DoD 5220.22-M, to even more sophisticated methods such as Gutmann's. You can erase files, folders, CD-RW discs, logical drives, and entire physical drives. The program also wipes out deleted files, which Windows just renders invisible, from your disk. It cleans the tracks of your Internet and local activities, such as cookies and temporary files. The log lets you control the process | |||
Updated: 9, 2005 | Rating: 489 | Author: Data Security | Size: 1030 kb | Demo Go to category: System Utilities > Other Similar programs | |||
2. | Boomer Audio 5.0 (segon.com) | ||
Create Flash movies taking advantage of the new Flash MX compression technology. Produces at your option a complete web page with the necessary HTML code generated by Boomer Video. Faster load times, smaller file sizes, more security for the authors, and a free format unlike other formats | |||
Updated: 9, 2005 | Rating: 134 | Author: Ivan Daunis | Size: 1670 kb | Shareware Go to category: Graphic Apps > Animation Tools Similar programs | |||
3. | eBook Pack Express 1.75 (caislabs.com) | ||
features provided by eBook Pack Express are: . Enhanced ebook security options, encrypt e-books with up to 3 security modes. . Full text search. . Highly optimized eBook viewer. . Multiple ebook expiration settings. . Fully customizable user interface. . Toolbar buttons can be customized. . XP look and feel in Windows XP . Open eBook without temporary files | |||
Updated: 9, 2005 | Rating: 48 | Author: Steinar Cai | Size: 2120 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
4. | iGo Incognito 1.2 (igo-incognito.com) | ||
iGo Incognito - the most secure instant messaging system available. iGo Incognito provides encrypted instant messaging, private chats and open forums. The iGo Incognito network is built on a combination of public key encryption and the US Advanced Encryption Standard (AES). If you want to be sure that | |||
Updated: 9, 2005 | Rating: 48 | Author: Paul Roigan | Size: 1541 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
5. | Private Pix 2.93 (tropsoft.com) | ||
Pix utilizes new technologies to keep your pictures and movies safe while keeping them password protected and encrypted. Advanced security features include name scrambling and variable key length. Private Pix has an easy to use interface that makes organizing and viewing of your pictures easier than ever before. Try Private Pix worry free as it does not change any system | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 910 kb | Demo Go to category: Graphic Apps > CAD Similar programs | |||
6. | General Knowledge Base 2.2 (baltsoft.com) | ||
knowledge sharing, it provides an easy access to an organization's knowledgebase either on LAN, VPN, WAN or over Internet and yet it does not compromise on security. The application's Client Server technology provides better data integrity and overall system reliability. Although all the information may be stored in one database, General Knowledge Base allows | |||
Updated: 2, 2006 | Rating: 42 | Author: Tomas Rutkauskas | Size: 7323 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
7. | go1984 3.0.3.6 (logiware.de) | ||
servers or capture cards. Companies with existing analogue video technology are therefore able to join the digital world by a “smart change” and to integrate already existing hardware. Thus “go1984” is an important contribution to investment protection. go1984 supports the hardware of many | |||
Updated: 9, 2005 | Rating: 1029 | Author: Ralf Kronemeyer | Size: 7443 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | JD Punch Clock 2.63 (employeepunchclock.com) | ||
run on a MS Access or SQL Server Database giving you the added security to know that your information in safe from missed indexes, deleted text files, and prying eyes. JD Punch Clock is designed with you and your business in mind so whether you have 5 or 5,000,000 employee's we have a solution to fit YOUR needs. Unlike other applications JD Punch Clock understands that your | |||
Updated: 9, 2005 | Rating: 82 | Author: John Spiker | Size: 4370 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
9. | Print Studio ID Badge Maker Software 2E (jollytech.com) | ||
makes managing membership information, photographs, and other security data an easy task. Print Studio ID badge maker software also incorporates a fully functional database editor to manage existing databases as well create new custom databases. Quickly and accurately acquire photographs or any other type of images at high resolutions using Print Studio ID badge maker | |||
Updated: 9, 2005 | Rating: 42 | Author: Jolly Technologies | Size: 15625 kb | Demo Go to category: Business > Other Similar programs | |||
10. | Print Studio Photo ID Card Software 2E (jollytech.com) | ||
makes managing membership information, photographs, and other security data an easy task. Print Studio photo ID card software also incorporates a fully functional database editor to manage existing databases as well create new custom databases. Quickly and accurately acquire photographs or any other type of images at high resolutions using Print Studio photo ID card | |||
Updated: 9, 2005 | Rating: 16 | Author: Jolly Technologies | Size: 15625 kb | Demo Go to category: Business > PIMS & Calendars Similar programs | |||
|
Home > Security technology software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|