Security Breach Database


Advertisement

ExeOutput for PHP  v.1.4.1.0

Easily construct software from your existing PHP code and turn PHP websites into Rich Internet Applications (RIA), custom web browsers, database apps, games, interactive catalogs, and much more by combining the power of PHP, HTML and JavaScript into ...

Editors Toolbox for NeoBook  v.5 7

It offers all basic paragraph and character formatting and a number of advanced features like Live Spell Checking, built in dialog boxes, multi language support, HTML and Adobe Acrobat® PDF export, formatted text in database memo fields and hyperlinks ...





Advertisement

Password Recovery Console  v.2.52.05050

In addition to Domain or Active Directory security, each Windows desktop and server system in the company also has local security; this means that every system has a local Administrator account that allows access to that system, and potentially exposes ...

EPrivacy Suite  v.3 1

ePrivacy Suite - The Ultimate Content Encryption Solution
Protecting intellectual property and customer data are top security concerns for any business today. Whether in transit over a network or at rest on a system, encryption helps secure information, ...

Exchange Mailbox Reports  v.13.05.01

Lepide Exchange reporter software analyzes Exchange server database and transactional log files. It helps in generation of different Exchange mailbox reports. Lepide Exchange reporter software is now empowered with advanced features that help Exchange ...

Computer Antivirus Software  v.3.0

Cyber criminals and malicious codes are fast evolving in present- day competitive environment, so are the security industry experts. Technocrats are actively introducing advanced computer antivirus software applications for treating most critical computer ...

InfoFind

InfoFind organizes a variety of files and data from different programs into one easy to use program.

MemoCode  v.6.0

MemoCode is a powerful tool useful for storing and easily retrieve code snippets (with syntax highlight), complex sequences of commands and various notes produced by programmers and System Administrators.

The software is also a great integrated ...

NeoBookADP  v.1.0

This plug-in provides NeoBook authors with access to the Intel® Atom™ Developer Program SDK, and the ability to create applications for Intel's new AppUp(sm) Center app store - www.appup.com

The AppUp Center is a software application storefront ...

Active Directory Change Audit Reporter  v.2.0

It enables forensics activity to ensure Enterprise Security and prevent Security Breach. . Auditreporter will help administrators to track all event and take necessary actions before the situation goes too far.

Pageonce - Money & Bills  v.2.1.0.0



Features:
• Bill management on the go
• Monitor credit card transactions
• Check bank account status
• View detailed bill statements
• Review investment portfolios
• Receive account activity alerts and push notifications
• Safe and secure
• Remote data destruct in case you lose your phone

Pageonce Security:
• Your ...

Studio Surveillance  v.8.1.0

If a security breach occurs within the previous recording period the individual video files can be reviewed and the event found. Motion detection allows areas to be monitored and any movement recorded in a video file. Image sequence saving or overwriting ...

Android Support Live Chat  v.1.9



eAssistance Pro software is secure and reliable to use as it’s equipped with 256-bit SSL security to prevent any kind of security breach. The software ensures that your IP address, logs, transcripts, etc. remain safe. The software supports ...

JiJi AuditReporter  v.2.5.0.2

It enables forensics activity to ensure Enterprise Security and prevent Security Breach. JiJi Auditreporter will help administrators to track all event and take necessary actions before the situation goes too far.

Advanced Port Locker Software  v.5.0.0.1

Therefore, in these conditions also security can be maintained by making the entire USB as READ ONLY, which means, only read operation can be performed onto and by the USB Drive, while no write operation is performed.

3. File Transfer Log ...

Pages : < 1 | 2
Newest Reviews