Resultado da Pesquisa - Hour

Cypheros TS-Doctor 1.2.100

Cypheros TS-Doctor 1.2.100 versão de teste 20837 

Muitos receptores de satélite e cabo modernos oferecem a capacidade de gravar programas de televisão e rádio por uma chamada…

Cayo Policy Manager for Active Directory 1.0.1

Cayo Policy Manager for Active Directory 1.0.1 versão gratuita 7693 

Cayo Policy Manager(tm) provides the missing layer of automated IT Policy and business rule enforcement for Active Directory (AD). Demanded…

File Access Scheduler 5.1292

File Access Scheduler 5.1292  5434 

Protect your files from being executed, viewed, changed and deleted. It will automatically enable a chosen protection based on currently…

SecurityPlus for MDaemon 4.1.2

SecurityPlus for MDaemon 4.1.2  6076 

Antivirus and spam protection for MDaemon Email Server. Provides real-time spam, Recurrent Pattern Detection Technology, Zero Hour Virus Outbreak Protection,…

Parental Control PRO 2.36

Parental Control PRO 2.36  5082 

Parental Control PRO is a stealth application that can secretly record information on your PC: records websites visited, usernames, passwords,…

Video Surveillance Monitor 3

Video Surveillance Monitor 3  4841 

Video Surveillance Monitor is an advanced video surveillance software. Users can effortlessly monitor home, office, cradle, parking area, storehouse, UFO…

Copysafe PDF Protection 3.0

Copysafe PDF Protection 3.0  4855 

CopySafe PDF provides the most secure copy protection for eBook and PDF documents and it is the only solution that…

Passware Encryption Analyzer Professional 4.3

Passware Encryption Analyzer Professional 4.3  4997 

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you…

Passware Encryption Analyzer 4.3

Passware Encryption Analyzer 4.3 versão gratuita 4668 

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you…

Trojan Killer 2.1.54

Trojan Killer 2.1.54  5467 

Once malware is detected, it is added to Trojan Killer database in 2-12 hours. Up-to-date databases and smart Trojan Killer’s…

1 Next » Last »