Sec Software

ProxyShare is new generation of P2P software.

ProxyShare
 

Globalnet S.R.L.
 

Welcome to ProxyShare P2P What is ProxyShare? ProxyShare is new generation of P2P software. Its fully designed for security and speed. Why the name is ProxyShare? Unlike all other P2P network we take full advantage of internet proxy servers to hide your IP and gain speedy downloads. Every client in this network can act as a proxy server. What are the key advantages from other P2P software? * very high download spee

Software Keywords: encryption fully proxy its

 
Don't give away your old sensitive data.

East-Tec FormatSecure
 

EAST Technologies
 

Don't give away private information with the floppy, ZIP or hard disks you exchange with your co-workers or friends. East-Tec FormatSecure prevents people from recovering your old backup copies of your financial records or business plans or your private files and e-mail messages. All these sensitive documents are not removed when you perform a disk format, they are only marked as being deleted, and they can easily be recovered by anyone.

Software Keywords: protection e-mail unerase delete floppy format

 
Be Owner Of Your Files Wherever They Go.

CHM OwnerGuard
 

Armjisoft
 

With CHM OwnerGuard you can Create, Distribute and Sell your valuable Documents, EBooks, Trade Secrets, Research Papers, Reports or any other kind of Information in CHM format while OwnerGuard protects Digital Ownership Rights for them. This product is made specially for publishers of high value information published in CHM format.

Software Keywords: data ownership limit printing print controls copyright protection chm ownerguard microsoft compiled html

Converts presentations (PPT) into PDF

PPT To PDF Scout
 

ByteScout
 

PPT To PDF Scout converts PowerPoint presentation into searchable PDF documents. Converts PowerPoint presentations into PDF documents with Adobe Acrobat or any other PDF software not required!. Security options include user and master passwords, ability to prohibit printing, high resolution printing, assembling, copying or modifying of generated PDF document.

Software Keywords: ppt pdf powerpoint presentation

Automatic staff scheduling, compact and easy.

Shift Scheduler Continuous Excel
 

Bizpep
 

Build a roster to your specifications, allocate staff automatically, and generate a printable roster, all at the click of a button. Compact and user friendly with default values for ease of use. You can set maximum hours worked, maximum continuous hours, minimum break, maximum days worked in a row, and force a Yes or No work status. Print an easy to read schedule table and quickly build consecuative rosters. Full operational instructions.

Software Keywords: support continuous bizpep 24hr

CHAOS made the security simple.

CHAOS For Security
 

Security Resources Group
 

Encrypt and compress individual files and folders. Drag and Drop support. CHAOS for security of your secrets.

Software Keywords: chaos safety el gamal blowfish gost

an anti-copy security utility

File Anti-Copy
 

HihiSoft
 

Protect your file with File Anti Copy V 3.1. No body will be able to open, copy and delete your files without your permission. Download and try it to make sure your files is secure. File Anti-Copy is a anti-copy security utility working at the Windows kernel level. Without your password,nobody can copy your files away. This guarantees the program will never lose your data.

Software Keywords: access file anti-copy lock copy

Bring together html files into one file.

Join (Merge, Combine) Multiple (or Two) HTML Files Into One Software
 

Sobolsoft
 

Combine multiple htm / html files together into one file. Load a group of files into the list and click 'Join'. You decide what the name of the result file will be. The joining process takes only a few seconds.

Software Keywords: first together joining them merging htm

PC Security Restrictions Administration

PC Security Manager
 

Amov Research Ltd.
 

PC Security Manager is a registry tool allowing you to restrict access to your PC in a way you want. It includes many of restrictions you could apply to your system and/or your applications. These restrictions will stop others from tampering with your PC. The utility could be password protected. You could restrict access to Control Panel, Network Settings, Desktop, etc... You could control programs that start automatically when Windows start.

Software Keywords: restrict privacy tools admin ui enhancements

wodTelnetDLX is a telnet client component

wodTelnetDLX
 

WeOnlyDo! Inc.
 

wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own Terminal GUI that supports VT100 and Linux emulation

Software Keywords: protocol ftps component telnet com activex

 

Page 1 out of 100    1 2 3 4 5 6 7 8 9 10 ...100


 

Copyright © 2003-2012 TverSoft Software