|
||||||
|
||
|
Home > Security software |
|
|
201. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
202. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
203. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
according to U.S. Department of Defense standards or custom user security levels. East-Tec DisposeSecure 2005 can be operated from a floppy disk, CD or DVD to sanitize any drive or partition from the computer, regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
204. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
205. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
Ram by 60-70%. In addition the program gives Windows powerful security and anti-hacking features, such as restricting access to dos, games, control panel, system settings, memory settings, display controls, desktop settings, 160 bit file encryption and desktop lock. Window Power Tool is the No. 1 System Optimizer for Windows 95/98/Me/NT4/2000/2003/XP. It not only increases Internet | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
206. | DMUSB 2.8.0 (flenik.com) | ||
your first backup set. DMUSB makes its best not to compromise your security policy. The only shares required are those of the installation folder and the backup target. These shares can be hidden from public view and known only to DMUSB. Clients do not need to share their drives, at all. Nevertheless | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
207. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
e-mail reporting, filtering, unicode filename, validation, transfer security attributes, transfer folder creation/modification time, keep deletion files, file revisioning, pre/post-sync process, error handling, path variables and detailed log, etc. The synchronization is based on the policy specified by user to copy those files which are different between source and target folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
208. | Directory Watch 4.0 (lohja-associates.com) | ||
You use the Directory Watch application to monitor a file system and react when a number of files in the directories exceed your threshold. This makes it possible for you to quickly and easily launch business processes. For example, you have a mail, fax, print, or web server that accepts request in forms | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Lohja | Size: 731 kb | Demo Go to category: System Utilities > Other Similar programs | |||
209. | DeviceLock 5.73 (ntutility.com) | ||
control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
210. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|