|
||||||
|
||
|
Home > Breaches software |
|
|
11. | Windows Password 5.0.1258 (lastbit.com) | ||
is an application for Windows NT system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. Windows Password also can be used to recover lost passwords of particular users. Really fast: search speed is | |||
Updated: 9, 2005 | Rating: 42 | Author: Vitas Ramanchauskas | Size: 349 kb | Demo Go to category: System Utilities > Other Similar programs | |||
12. | Lock Folder 5.0 (realclicks.com) | ||
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
13. | FolderAccess 2.0 (lockfolder.net) | ||
from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
14. | DriveScrubber 2.0a (iolo.com) | ||
data are also left wide open and vulnerable to attempts at breaching security and recovering proprietary information from old or unused drives. This information usually represents dire consequences should it unintentionally fall into the wrong hands! DriveScrubber uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL data on ANY drive is | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
15. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption Select | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
16. | i3Connect Merlin 1.1 (i3connect.com) | ||
Digital ID support. Merlin is also designed to prevent security breaches such as spam and viruses. For those customers who need to archive messages to meet corporate HR policy or regulatory requirements such those from SEC or HIPPA, Merlin provides extensive message logging. Messages are stored in a standard relational ODBC database for easy integration with existing reporting | |||
Updated: 9, 2005 | Rating: 42 | Author: i3Connect, Inc | Size: 379 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
17. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
database, you could minimize the possibility of such potential breaches, but you should understand that we do not guarantee that such a breach will never occur. That being said, LASsie can serve quite well as an application security system where users are relatively unsophisticated, or where application data is not of a highly classified nature. LASsie (Light Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
18. | Yapp the project calculator 2.0 (plexityhide.com) | ||
warnings on common rule violations like resource overuse, deadline breach, and dependency violations, information that is crucial to you in order to build a realistic and working project plan. Export and import to Excel Yapp the project calculator, Keep track of what to do and who's doing it. Rule based planning allows you to get some real help and not only a controlled drawing | |||
Updated: 9, 2005 | Rating: 73 | Author: Hans Karlsen | Size: 6785 kb | Shareware Go to category: Business > Project Management Similar programs | |||
19. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
More than an AntiVirus product, BitDefender Professional ensures antivirus protection, as well as data confidentiality, active content control and Internet filtering. BitDefender Professional is an ICSA Labs certified solution for Microsoft Windows XP, allowing users to enjoy their data protection as they solution for Microsoft Windows XP, allowing users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus protection, features as Internet filtering or | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Breaches software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|