security breaches shareware downloads


Search results for «security breaches»:

Windows Password 6.0.1509 Windows Password 6.0.1509
… trators with good understanding of NT security model. Note: Previous versions of Windows Password were released as NT Password. Windows Password features The unregistered DEMO versions displays only first two characters of the found password.… 

LinkScanner Pro 2.5.0.0045 LinkScanner Pro 2.5.0.0045
… th major anti-virus, anti-spyware, and firewall products Limitations 15 day trial… 

LASsie 4.5 LASsie 4.5
… lication security system where users are relatively unsophisticated, or where application data is not of a highly classified nature. Requirements Access 97, 2000, 2002/XP, and 2003… 

ComputerSafe 3.0.0.503 ComputerSafe 3.0.0.503
…  IP address of its location. This data can be used to physically locate the computer.… 

Service Hawk 3.1 Service Hawk 3.1
… ch service (Automatic, Manual, Disabled) Optionally include low-level Kernel and System Driver services Supports both HTML and plain text email notifications Add one or more file attachments to email notifications Limitations 30 days trial… 

Advanced Drive Protector 3.8 Advanced Drive Protector 3.8
…  AutoRun feature for them to ensure both security and privacy. This software lets you apply a range of security options to individual drives ranging from hiding options to access security restrictions. The Autorun feature is one of the worst security breaches in any Windows system. If a user… 

SeeNx 1.2.1 SeeNx 1.2.1
… swering machine, security, mobility and cost. Our customers value the ease of use and the lower costs of communications. The SeeNx video phone utilizes a proprietary compression / decompression (CODEC) algorithm. This is the key to preventing security breaches and improves performance while s… 

PortsLock 2.0 PortsLock 2.0
… of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming and outgoing connections. PortsLock is a useful security tool that lets you to block ports and much more. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock… 

FolderAccess 2.0 FolderAccess 2.0
… k Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organizatio… 

FoolProof Security 5.0 FoolProof Security 5.0
… eficial use of their computer learning experience. FoolProof Security features The leading desktop security solution Allows multiple Security Groups Locks applications and Control Panels Directs file saving Provides internet access security… 


Related: security breaches  disable programs security parental control security audit  Chili Security Internet Security  security software security tool  encryption security security file utilities encryption tools shredder utility hide files hide folder