Try our new Live Software Search. Just start typing your keywords below and watch the software magically appear!
Super Network Tunnel
Super Network Tunnel = SocksCap+Bidirectional Http Tunnel +Remote Control. Normally used in building a network tunnel between the home and office computer,it's alias name is home2office.It is a person http tunnel solution,include client and server.
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, ZIPs, Bluetooth, etc.) on a local computer.
PDF-Recover Server Edition
pdf-Recover SE disables restricted operations on PDF files. It removes the master password and security settings with one click. If you can´t remember your password, pdf-Recover will allow to reset encrypted files and provide without any restriction
With Search Backups you can manage your copies for security or other CDs / DVDs. For that the folder and file structure is being read and saved completely.
This program will allow you to determine which websites your children (or users) can visit. This is not filtering software and does not block websites. You create users and lists of approved websites. You get total control.
MailScan for SMTP Servers
MailScan is installed on Windows machine to act as a Security Gateway between your Mail Server and the Internet.
Program Selector Pro NT
Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user-configurable password-protected list box of program names. Individual programs can also be password protected. Provides access control for computers.
IE Security Pro
Internet Explorer Security is an utility that customizes many aspects of the Internet Explorer Web browser. It's a snap to use and provides the tools you need to retain and manage your Web browser settings.
Adds for Outlook
Adds for Outlook is a plug-in component for Microsoft Outlook. This is a collection of nice improvements.
Make hardware keys for anti-piracy protection - using your ordinary computer! Software developers can now prepare a hardware key (dongle) from standard USB flash drive. The result is the media for software distribution and USB token at the same time.