|
||||||
|
||
|
Home > Computer security software |
Related keywords: security, computer, Security, internet security, computer game, security software, Computer, information security, computer software, SECURITY |
|
|
51. | wodSmtpServer 2.2.2.0 (weonlydo.com) | ||
All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC2821. Use your favorite mail client (such as Outlook Express or Eudora) to send mail to other users on your network . How? That's easy part: just put SmtpServer control on your form, add | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 794 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
52. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
multipart messages, different encodings and stuff like that. It's almost the same for wodMailbox - it's light, quick and fully supports all mail related RFC's. You can look on using wodMailbox for three main purposes: When you want to access mail messages in the mailbox When you want to access and parse one mail message When you want to prepare and create new | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
53. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
this component to work - encryption will take place between local computer (running wodSSHTunnel) and SSH server of your choice. It can work in both sides - it can accept local connections and forward them to the server, or can initiate connections towards local services when notification is received from SSH server for 'remote port forwarding' request - based on your previous | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
54. | Silver Key 3.3 (filecryption.com) | ||
encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
55. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | Silver Key 3.3 (kryptel.com) | ||
encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for corporate usage. If you want to protect your data according to the HIPAA privacy regulations, our software lets you easily incorporate | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
57. | BackToZIP 7.10 (aborange.de) | ||
would not only have been an obstruction for me, but for many other computer users as well, preventinmg them from doing the necessary data backups. This gave birth to BackToZip, which aims at making manual or automated backups Simple and Easy. Working with BackToZip is so simple: Select entire folders, individual files and/or file types, specify the target folder and off you go! The | |||
Updated: 2, 2006 | Rating: 0 | Author: Mathias Gerlach | Size: 3217 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
58. | SpywareStopper 10.0 (spyware-stopper.com) | ||
Prevents all Known spyware from loading or running on your computer. With realtime cookie management complete with logs and alerts you'll never have another spyware or tracking cookie stored on your computer ever again. Coupled with powerful cleaning options , Home page hijacking prevention and Windows Services Control Panel, SpywareStopper is a very powerful | |||
Updated: 2, 2006 | Rating: 158 | Author: Paul Kurland | Size: 2303 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
59. | X-SecurePro Secure X-Server for Windows 7.9 (labtam-inc.com) | ||
standard PC into a fully functional X-terminal. Providing encryption security using the SSH standard from PC to host machine. X-SecurePro Package Includes: Secure SSH-2 connection Ciphers: 3DES, Blowfish, DES, RC4 Authentication using password Authentication RSA Connection forwarding, including full | |||
Updated: 2, 2006 | Rating: 82 | Author: Submit Submit | Size: 18077 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
60. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
Secretmaker combines several tools: a security watchdog, a intruder blocker, a spam fighter, a pop-up blocker, a banner blocker, a movie blocker, a privacy protector, history cleaners, a worm hunter and a cookie eraser. Security Watchdog recognizes malicious "mysteryware" and parasites that may assault your computer. Intruder blocker protects from Spyware | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Computer security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|