|
Access Manager 2.1.58 by: Citi-Software Ltd
|
![Access Manager icon](/img/noicon.gif)
|
Fast, easy and secure password management.
License: Freeware, Price: $0.00 US
[read more] [download]
|
Downloads: 310
Size: 2047 K
Date: 2007-01-29
|
Keywords: password manager, password managers, password, passwords, manager, managers, management, secure, security, private, software, encryption, free, freeware, keyboard, key, logger, logging
|
|
ViewPoint 5.01 by: Janusware Ltd.
|
![ViewPoint icon](http://www.janusware.com/img8/vp_icon.gif)
|
Viewpoint - double steganography, program and data hiding, file encryption.
License: Shareware, Price: $29.00 US
[read more] [download] [buy now]
|
Downloads: 277
Size: 2064 K
Date: 2007-01-18
|
Keywords: double steganography, program and information hiding, file encryption, hide files, encryption software, encrypt files, viewpoint, encryption, security soft, AES, rijndael, secure files, private files, protect privacy, shred, total steganography
|
|
Swapper 1.1 by: Height Systems
|
![Swapper icon](/img/noicon.gif)
|
Swapper changes your desktop wallpaper when you insert your U3 memory stick.
License: Freeware, Price: $0.00 US
[read more] [download]
|
Downloads: 315
Size: 12 K
Date: 2007-01-16
|
Keywords: Wallpaper, changer, U3, USB, memory stick
|
|
ShutDownOne 3.021 by: DimaWare
|
![ShutDownOne icon](/img/noicon.gif)
|
Auto Restart or ShutDown, AutoLogin, Schedule, Password Protect
License: Shareware, Price: $18.95 US
[read more] [download]
|
Downloads: 318
Size: 297 K
Date: 2007-01-12
|
Keywords: auto login, shutdown, power off, lock workstation, restart, reboot, force, schedule, timed shutdown, emergency, command line, password protection, activity timer, delete tmp files, delete cookies, delete history, XP, clear typed URLs
|
|
iShield 1.0.18.39 by: Guardware LLC
|
![iShield icon](/img/noicon.gif)
|
iShield is a web browser plug-in that accurately blocks Internet pornography
License: Shareware, Price: $24.95 US
[read more] [download]
|
Downloads: 216
Size: 4170 K
Date: 2007-01-10
|
Keywords: block pornography, internet filtering, parental control software, child internet protection, web browser plug-in blocking software, pornography filter, computer pornography, stop porn, block porn, block internet porn
|
|
Vaccine46 1.9.6.1 by: 46Soft.com
|
![Vaccine46 icon](/img/noicon.gif)
|
Dual-Core protection to secure your PC against privacy and security threats.
License: Shareware, Price: $0.00 US
[read more] [download] [buy now]
|
Downloads: 281
Size: 11655 K
Date: 2007-01-07
|
Keywords: anti-virus, anti-spyware, dual-core, computer protection, anti-trojan, privacy, security threats, malware
|
|
c:JAM - Central Jet Accounts Manager 1.5.0.3 by: J. Mueller IT Consulting
|
![c:JAM - Central Jet Accounts Manager icon](/img/noicon.gif)
|
Intuitive security- and user account-management tool for MS-Access
License: Shareware, Price: $299.00 US
[read more] [download]
|
Downloads: 164
Size: 2584 K
Date: 2007-01-01
|
Keywords: MS Access, Database, Security, User Account Management, Unified User Management, Distributed Workgroups, cJAM, Software, Shareware
|
|
SystemStateCreator 2.0.0 by: STEITZВ® IT-Solutions
|
![SystemStateCreator icon](/img/noicon.gif)
|
Create and manage Systenstatebackups
License: Freeware, Price: $0.00 US
[read more] [download] [buy now]
|
Downloads: 166
Size: 1 K
Date: 2007-01-01
|
Keywords: BackUp, Security, Restorepoint, Systemstate
|
|
LucidLink WiFi Client 2.2 by: LucidLink
|
![LucidLink WiFi Client icon](/img/noicon.gif)
|
LucidLink WiFi Client makes it easy to access secure WiFi networks
License: Freeware, Price: $0.00 US
[read more] [download]
|
Downloads: 240
Size: 19300 K
Date: 2006-12-31
|
Keywords: WiFi, Wi-Fi, WiFi Client, Wi-Fi Client, WiFi Security, Wi-Fi Security, Wireless, 802.11, Secuirty
|
|
TheLaptopLock 0.9.4 by: TheLaptopLock
|
![TheLaptopLock icon](/img/noicon.gif)
|
A stolen computer doesn't mean your data is no longer under your control.
License: Freeware, Price: $0.00 US
[read more] [download]
|
Downloads: 228
Size: 461 K
Date: 2006-12-27
|
Keywords: data protection, encryption, deletion on stolen computers
|
|
|