ADD TO FAVORITES l SUBMIT SOFTWARE     
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

password securitypdf password securitynetwork security password
folder passwordlost word passwordNetwork Security Tools
sa password resetrecover Windows7 passwordnetwork password
account password recoverySecurity boosterforgot rar password
admin passwordfind passwordrecovery password pdf

   

TypeTeller 2006 1.45

TypeTeller 2006 is a free keyboard logger for Windows. It allows you to keep a chronological record of everything that is typed on the keyboard, including chat, email and passwords. In addition, TypeTeller identifies and reports the title of the active window. You can use TypeTeller to recall your own keyboard entries or to monitor the online and offline activity of your children or your employees.

See also: logging security password monitoring keyboard children kids employees

Download TypeTeller 2006 1.45 (Size: 848 KB)


PC Security Explorer 1

PC Security Explorer highly improves your computer's security. You get powerful tool that monitors loaded programs and Internet traffic, and also cleans your computer up from security threats and make backup of your documents. "Computer Control" section provides four applications. "Internet Security" section provides seven applications. "Additional Tools" section provides four additional applications

See also: password, clean, popup, anti, analyzer, protection, blocking, optimize, optimizer, scanner, autostart, monitoring, whois, firewall, explorer, security

Download PC Security Explorer 1 (Size: 823 KB)Buy PC Security Explorer 1 (only $29.00)


Internet Deadbolt 6.0

?The Internet Deadbolt is more than security software. It allows network administrators, and upper management to get control of their corporate networks by restricting employees downloading of software that may have viruses or worms,? said Anthony Johnson, president of ICC Software. ?It has been on the market since 2002. It?s currently in use in banks and financial institutions to help increase security. ?

See also: administering, monitoring employees, monitoring, network, network monitoring, access control software, monitoring software, network security, Internet Deadbolt, internet, control, download, activity recorder, password, secure, protect

Download Internet Deadbolt 6.0 (Size: 2929 KB)Buy Internet Deadbolt 6.0 (only $69.99)


WinSyslog 6.0

WinSyslog is an enhanced syslog server for Windows. It works much like a Unix syslog daemon but offers enhanced features. Among others, it writes syslog messages to a flat file, database or sends them as email-alerts. Runs as a background service or Windows GUI application. Basic features are free to use, enhanced features require a registration. The enhanced features can be tried for free for 30 days.

See also: logging, network, security, events, syslog, monitoring

Download WinSyslog 6.0 (Size: 9460 KB)Buy WinSyslog 6.0 (only $49.00)


WinSyslog 7.3

WinSyslog is an enhanced syslog server for Windows. Receives messages from routers and firewalls (e.g. PIX, NetGear, ...). Writes messages to file, database, sends them as email, alerts, starts programs on message reception and much more. Supports UDP and TCP syslog, compression and SNMP. Comes with a web interface for remote message viewing. Helps troubleshoot network problems quickly and easily. Runs as a background service.

See also: monitoring, syslog, events, security, network, logging, database, snmp, rfc3164, rfc3195, compression

Download WinSyslog 7.3 (Size: 11729 KB)Buy WinSyslog 7.3 (only $59.00)


Safetica BUSINESS 3.1.5

Your staff can threaten security of sensitive corporate data. Firewalls and antivirus software do not protect you from internal threats. Protect yourselves from data leakage from corporate computers and disks. Gain control over the staff?s access to sensitive data and increase their working attitude by monitoring their activity. Save access data safely and do not allow spyware to log your passwords. Administer your company?s security centrally.

See also: security, encryption, shredder, disk encryption, activity monitoring, parental lock, access block, usb lock, pc lock, application lock, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key, DLP

Download Safetica BUSINESS 3.1.5 (Size: 45382 KB)Buy Safetica BUSINESS 3.1.5 (only $84.95)


Rohos Welcome 1.3

Rohos establishes a new login way into Windows - by using a USB flash drive. It's just like carrying a key for your house. Whenever you temporarily steps away, you can lock the computer by simply unplugging the USB key. Advantages: Estimates work hours spent on the computer; Add or remove specific users to the welcome screen; personalizing login screen with your digital photos and caption text; Good for security and time save;

See also: flash drive authentication, USB flash authentication, USB flash drive authentication, flash drive login, USB flash login, USB flash drive login, network security, domain, access, usb flash drive, windows password, login, logon, welcome screen, shares, authentication, USB flash drive logon, USB flash logon, flash drive logon, Ctrl+Alt+Del

Download Rohos Welcome 1.3 (Size: 870 KB)Buy Rohos Welcome 1.3 (only $25.00)


R-Guard 2.2

Reliable data security tool for advanced access right control, encryption and audit, which extends them much beyond the scope of the standard Windows security services. R-Guard enables the user to control access rights to various file systems objects for users, for applications and system processes as well. R-Guard prevents data from disclosure, theft, modification, corruption, and deletion by another user or various malicious programs.

See also: Audit, Data Protection, File Encryption, Data Security, File Monitoring

Download R-Guard 2.2 (Size: 3020 KB)Buy R-Guard 2.2 (only $39.99)


IE Internet Security 6.51

It customizes different features of the Internet Explorer Web browser, lets you disable changing your web browser settings, restrict access to certain tabs of Internet Options dialog box, as well as specific settings from each tab, disable certain menu items and buttons, and prevent others from editing your Favorites. Multi-user support allows you to apply security restrictions for each user personally. Password protection is also offered.

See also: free, screen, lock, restrict, privacy, protect, control, access, administrator, security, password, download

Download IE Internet Security 6.51 (Size: 1106 KB)Buy IE Internet Security 6.51 (only $49.00)


Data Nuker 2.0.0.0

Shreds sensitive files so they cannot be recovered or undeleted. Includes disk free space shredder - destroy previously deleted files on your hard drive. Shred Files, Folders, Recycle bin, drag & shred, DoD conform. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover the files! Also includes a scheduler & integrates with windows explorer for right click shred.

See also: tmp, swapfile, swap file, strong, stream cipher, source, ShredXP, shredding, Shredder, Shred, shareware, sensitive files, security, secure delete utility, secure, sanitize, sanitization, safety, remove, recursively, random, purge, protecting, protect, programs, privacy, permanent, perfect, password, paper, overwrite, numbers, number, NSA, microsoft, magnetic, line, kill, key, hard drive, generator, freeware, free, forensic, folders, folder, files, file wiper, file utility, file, Expert, Evidence Eliminator, evidence, EugeneSoft, Eugene, eraser, erase, encryption system, encrypt, eliminator, editor, edit, drive protect, drive, DOD-5220.22M, DOD 5220.22-M, documents, document, disk, directory, destroy, Deletor, delete, data wiper, data recovery, data, cryptography, cryptographic algorithms, crypto, compress, command, code, clean, chaos, cache, business, BRAUN, batch, Basta, backup, appz, application, app, undelete, unerase, warez, washer, win32, windoez, wipe, wipe disk, wipe files, word

Download Data Nuker 2.0.0.0 (Size: 3572 KB)Buy Data Nuker 2.0.0.0 (only $29.99)


Perfect Admin 1.0

A powerful and easy in usage program for system administrators which allows to fulfil remote monitoring and control of the work of users in a local area network. Features automatic control of launching of the applications by the users, blocking of launching of the prohibited applications under the title of the window, automatic locking of Active Directory account, on behalf of which the prohibited application was launched and many others.

See also: screenshot retrieving, Active Directory accounts, launching of applications, automatic locking, remote control, remote monitoring, prohibited applications, event logging

Download Perfect Admin 1.0 (Size: 1464 KB)Buy Perfect Admin 1.0 (only $69.00)


Network Password Manager 2.2

Network Password Manager is a program created especially for the enterprise. It helps employees to safely store and use passwords within the company, manage passwords and set access rights. It also provides the reliable security using 256-bit AES encryption. It works in multi-user mode and creates a common environment. Support of Windows user groups is included. A clear, user-friendly interface considerably simplifies the installation process.

See also: user, administrator, multi-user, access, login, storage, protection, encryption, 256 AES, enterprise, security, management, network, manage, password, keep

Download Network Password Manager 2.2 (Size: 1229 KB)Buy Network Password Manager 2.2 (only $50.00)


MacPhoneHome 3.0

PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.

See also: asset tracking, tracking, surveillance, computer theft, laptop theft, stolen laptop, stolen computer, computer security, laptop security, mac security, ipod security, ipod, monitoring, tracing

Download MacPhoneHome 3.0 (Size: 548 KB)Buy MacPhoneHome 3.0 (only $29.95)


Keywarden 1.4

Keywarden is an easy-to-use and highly secure password manager which stores your different passwords, login-information, credit card numbers and other security related data in a clearly arranged place. Keywarden optimally protects your data with the generally accepted Blowfish encryption. Your advantage with this: You simply use a single master password to access all your different passwords. You only need to remember this single password!

See also: Java, Deutsch, English, Browser Integration, Password Generator, Security, Secure, Blowfish, Encryption, Manager, Safe, Password Safe, Password Keeper, Passwords, Password, Account, Key, Key Manager, Password Manager, Linux, Mac

Download Keywarden 1.4 (Size: 380 KB)Buy Keywarden 1.4 (only $19.99)


Artumsoft Universal Password Generator 2.0

Program multiple accelerate recovery of password to any object protected with password by minimization of passwords amount for selecting on basis of any possessed or suggested information. Visually assigning common passwords structure composed from discrete blocks with their own flexible adjusted features. Generated list of passwords can be used as dictionary to any program selecting passwords to the object.

See also: generate, drive, disk, archive, ZIP, RAR, artumsoft, intellectual, clever, universal, smart, advanced, protected, crypt, ciphered, security, basis, former, mask, pattern, template, visual, restoration, remember, parole, generator, lost, forget, forgotten, recovery, password, word

Download Artumsoft Universal Password Generator 2.0 (Size: 602 KB)Buy Artumsoft Universal Password Generator 2.0 (only $50.00)


Program Sentry 1.0.0

Provides access control and usage management. Allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program NOT on the list is blocked. Individual programs can be password protected.

See also: password protect programs, computer access control, computer security, password protection, computer use control, control access

Download Program Sentry 1.0.0 (Size: 500 KB)Buy Program Sentry 1.0.0 (only $25.00)


Folder Protection 2.1

Folder Protection lets you control access to your folders. Secure your documents to prevent people from viewing, printing, or altering them. You can protect folders located on your hard drive, as well as on external USB and removable drives. Folder Protection is ideal for notebooks. Prevent confidential information from ending up in the wrong hands. A folder can be protected simply by right-clicking on it within Windows Explorer.

See also: security, protection, lock, protect, password, folders, folder

Download Folder Protection 2.1 (Size: 786 KB)Buy Folder Protection 2.1 (only $39.95)


Public PC Desktop 3.31

Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit childrens

See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download

Download Public PC Desktop 3.31 (Size: 2905 KB)Buy Public PC Desktop 3.31 (only $49.00)


SafeIT File Encryption 2006

SafeIT File Encryption is a user-friendly program that allows you to prevent unauthorized access to restricted documents. Encrypt sensitive documents and other private digital information you have on your computer. The encrypted files are are only accessible by entering the correct password. Ideal for encrypting e-mail attachments as it doesn't require any additional software from the recipient. Multiple secure formats to choose from.

See also: Encrypt, Secure, Attachment, Safe, Encryption, Password, Lock, Security

Download SafeIT File Encryption 2006 (Size: 8624 KB)Buy SafeIT File Encryption 2006 (only $29.95)


PrefixNE 3.5

PrefixNE - Power and control over your network assets all wrapped up in one complete solution. With PrefixNE you?ll know exactly what software is running on your network, and whether it's properly licensed. You?ll know precisely what hardware is installed on each of your network PCs, (including removable devices). You can be alerted in real time upon changes, and enforce PC utilization policies.

See also: network, management, hardware audit, pc management, usb security, license tracking, software metering, asset inventory, asset tracking, network security, data leakage, endpoint security, hardware inventory, monitoring, software inventory, system administration

Download PrefixNE 3.5 (Size: 279 KB)Buy PrefixNE 3.5 (only $3780.00)






© 2005-2013 Downloadery. All rights reserved. Terms of Use and Privacy Policy. Contact Us