نتائج البحث - Hour

Cayo Policy Manager for Active Directory 1.0.1

Cayo Policy Manager for Active Directory 1.0.1 إصدار مجاني 4853 

Cayo Policy Manager(tm) provides the missing layer of automated IT Policy and business rule enforcement for Active Directory (AD). Demanded…

File Access Scheduler 5.1292

File Access Scheduler 5.1292  3628 

Protect your files from being executed, viewed, changed and deleted. It will automatically enable a chosen protection based on currently…

SecurityPlus for MDaemon 4.1.2

SecurityPlus for MDaemon 4.1.2  4607 

Antivirus and spam protection for MDaemon Email Server. Provides real-time spam, Recurrent Pattern Detection Technology, Zero Hour Virus Outbreak Protection,…

Parental Control PRO 2.36

Parental Control PRO 2.36  3334 

Parental Control PRO is a stealth application that can secretly record information on your PC: records websites visited, usernames, passwords,…

Video Surveillance Monitor 3

Video Surveillance Monitor 3  3117 

Video Surveillance Monitor is an advanced video surveillance software. Users can effortlessly monitor home, office, cradle, parking area, storehouse, UFO…

Copysafe PDF Protection 3.0

Copysafe PDF Protection 3.0  2984 

CopySafe PDF provides the most secure copy protection for eBook and PDF documents and it is the only solution that…

Passware Encryption Analyzer Professional 4.3

Passware Encryption Analyzer Professional 4.3  3016 

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you…

Passware Encryption Analyzer 4.3

Passware Encryption Analyzer 4.3 إصدار مجاني 3004 

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you…

Trojan Killer 2.1.54

Trojan Killer 2.1.54  3822 

Once malware is detected, it is added to Trojan Killer database in 2-12 hours. Up-to-date databases and smart Trojan Killer’s…

AccessPatrol 4.2.0.6

AccessPatrol 4.2.0.6  3200 

Access Patrol provides a comprehensive solution for securing company devices to minimize unauthorized access to proprietary information. Also provides an…

1 Next » Last »