Is a software-only solution to your security needs. Is a utility that allows you to protect your personal computer from unauthorized access. With a password * Block access to your computer on boot process, on Windows loading or as a screen saver.
Software for lawyers, law firms, corporate law and IT security departments, licensed investigators, and law enforcement agencies. Evidor is also an excellent tool for proving the presence or absence of confidential data on computer media, either to detect a security leak or confirm a lack thereof.
Designed for Windows XP PortsLock is a personal firewall for Windows NT/2000/XP that fully supports user-level security. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock is an easy-to-use security solution that fully protects corporate networks against attacks from the inside.
Flagship software application Anti- keylogger(TM) for Microsoft® Windows® NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized keylogging software, both KNOWN and UNKNOWN. These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network.
Designed for Windows XP Remote Task Manager is a systems control interface that can be run from any remote Windows NT/2000/XP computer. RTM adds the ability to lock/shutdown/reboot and to create processes on remote computers. An Event Viewer lets the Administrator view all events as though they were being run on the host computer.
It helps you increase performance and manage your system using various tweaks and utilities for settings including Windows, Hardware, Security, Network and Software. The import and export feature enables to create an export file, that contains specifically selected settings and tweaks.This export file can later be imported into WINner Tweak on the same computer, or to another computer with WINner Tweak.
DeviceLock Me gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Keep in mind that almost 80% of all security breaches come from the inside!
87. OutlookFolders - 1 Server + 1 User (Reseller 30%)
One or more computers in your network will be configured as Server computers by installing and running our server software. OutlookFolders is using the TCP/IP protocol for communication between the server and the client, this enables a connection to any computer in your intranet or to any computer on the internet. DetailsDownload trialBuy now ($88.79) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: QUESTER
Outpost Firewall PRO provides Security, Control, Privacy and Ease of Use. Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
91. Client for Remote Administrator 2.1
Those who is already familiar with program Remote Administrator, know, that its address book is not too convenient for work with a plenty of computers, and program's feature set is not too large. Client for Remote Administrator lifts you on a new level of the network management, where your network consists of thousands of computers, adding to standard functionality of the RAdmin the following functions: DetailsDownload trialBuy now ($20.85) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: VolmSoft