|
||||||
|
||
|
Home > Computer security products software |
Related keywords: security, computer, Security, computer security, internet security, computer game, security software, Computer, information security, sell products online |
|
|
121. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
122. | Hide Files 3.4 (hide-files.biz) | ||
images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
123. | HSLAB Print Logger SE 4.3 (hs-lab.com) | ||
of printing activity. The program monitors the print tasks on the computer to which it is installed. HSLAB Print Logger SE's main task is to collect the information about the sizes of printed documents/images and to record this information to a database for subsequent analysis. Print | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 6105 kb | Shareware Go to category: Business > Other Similar programs | |||
124. | Identity Knight 1.3 (fspro.net) | ||
computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
125. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
powerful yet safe tool optimizes your registry, cleans your computer of useless data, and backs up your important system files. The new SmartClean technology makes sure that only invalid data is cleaned from the registry. Innovative System Optimizer adapts its scanning process to your version of | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
126. | PC LockUp 2.185 (getfreefile.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial. After 30 | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
128. | Logbook 1.7 (home.t-online.de) | ||
www.shareit.com Registers number of working hours on your computer. Stores the time of boot up, shut down, standby and user change.It is resistant to manipulations and recognises the time | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
129. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
130. | MicroLocked 1.6.3 (jcmatt.com) | ||
is a small, easy to setup, security program that locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered. Your system screen saver can be used normally or set to activate when your machine locks. Desktop icons and taskbar can be optionally hidden while locked. Ideal for personal or business | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 1630 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Computer security products software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|