Filetrix


Search in:   Description   Keywords   Title   Company


Search for:    


Match:   Any word   All words   Exact phrase



Category:  Security & Privacy::Other Sort by:    Title     Date     Size     Company     Category  

Matches:  185 First     Previous       Page 16 of 19       Next     Last

Recovery Toolbox for PDF Password
Shareware
Recovery Toolbox for PDF Password is a compact and affordable, yet extremely powerful and flexible reconstruction of PDF passwords that uses a user-defined mask and other recovery parameters for fulfilling the task. The software uses a friendly wizard-based interface that makes initial mask configuration and subsequent password reconstruction a snap. Try Recovery Toolbox for PDF Password for excellent flexibility and ultimate password recovery p

REFOG Keylogger
Shareware
With REFOG Keylogger, family hardware activities are no longer a secret. Instead, the keylogger software keeps track of what each user is typing, which sites are being visited, what software are being used, and what images are being viewed. All of this info is recorded by the undetected program that runs 24/7. With comprehensive reports on each user's activities, guardians no longer have to worry about their children's activities.

REFOG Time Sheriff
Freeware
If you are worried your kids are spending too much time using computer games or your staff are spending too much time using instant messaging programs, parental control software such as Time Sheriff is what you need. Using this software, you can set time limits to certain programs or set time limits for how long a certain user can be on the computer. You can also use it to set prohibitions or restrictions on users or whole groups.

Super Hide IP
Shareware
Use Super Hide IP to keep your IP address hidden, surf anonymously, protect your identity and other personal information against hackers, and provide full encryption of your online activity, all with a simple click of 'Hide IP' button. With it, you can send anonymous emails, un-ban yourself from forums and Blogs, etc. You can also choose to use fake IP from different countries. Super Hide IP works with Internet Explorer, Firefox, Opera and more.

REFOG Mac Keylogger
Shareware
Refog Keylogger for Mac removes the secrecy from family computer activities. Users worried about the safety of their children from Internet predators or of the sanctity of their marriage from cheating spouses can use this keylogger for Mac to monitor a comprehensive history of visited sites, opened applications, and typed messages without the user even knowing the software has been installed.

REFOG Personal Monitor
Shareware
Control employees and monitor activities of advanced computer users with REFOG Personal Monitor. The PC monitoring tool monitors and logs keystrokes, clipboard, records started software and Web pages opened by your employees or room mates. Immediate alerts by email when somebody enters any pre-defined keyword ensure fully involved, real-time operation.

Secure Oracle Auditor
Demo
Secure Oracle Auditor (SOA) the most comprehensive Risk Management Software for Oracle database security which conducts vulnerability assessments and security auditing within minutes, which is capable of scanning multiple Oracle database servers. This Oracle security software provides Oracle audit tools, Oracle password tools, database scanner software.

Secure SQL Auditor
Demo
Secure SQL Auditor (SQA) is State of the art software for risk assessment and management, it conducts security audit and security assessment for SQL database security within minutes, by using the most comprehensive SQL database security regulatory compliance tools.

Secure Windows Auditor
Demo
Secure Windows Auditor A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest tools which provides windows security auditing and assessment software which empower network administrators & IT security auditors to conduct in-depth security assessments of network based windows systems.

MultiHash
Demo
Generate hash values for files, directories, and entire drives. These hash values can be used to verify that two files or directory trees are identical, or to verify against published hash values when downloading. These hash values can be used to publish your own values so your customers can verify their downloads. Hash values can also be used to verify identical copies submitted for escrow or publication to CD.


Matches:  185 First     Previous       Page 16 of 19       Next     Last