Search results for 'be harmful system configuration change maker'. The following words were ignored: 'be'.
2932 products found. Showing 63-77 in 10 groups sorted by relevance.
63. Resume Builder
Resume Builder allows to display the structure of a resume in a user-friendly format, so a user can choose what sections of resume he wants to publish and he can change the order of the Published Sections: Biographical Data, Objective, Employment History, Education History, Personal, Skill Areas, Publications, Honor/Awards, Summary, References. DetailsDownload trialBuy now ($24.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, French
Vendor: Sarm Software
Change startup properties (Automatic, manual, disabled) for NT Services. Backup your IIS configuration. Ll also get much more information about an IIS server configuration than using any default tools. NT Services has been created with the help and requests of Microsoft Server Administrators doing Server housing/co-location and system administration consultants.
Safe'n'Sec effectively protects computers against hacker attacks that exploit vulnerabilities existing in the Windows OS and sophisticated software to break the system integrity, access user data, execute malicious code, etc. Safe'n'Sec monitors all file operations, changes in the system registry, the status of OS processes, etc.
69. Hacker Hunter Pro. Advanced authentication system.
Hacker Hunter: 1. Do not allow several users with same password access to protected area at once. 7. Have administrator panel for manual view/change/add users, pins, accounts and ban options. 8. Do not require Unix guru for installation and configuration. DetailsBuy now ($69.00) Find similar
Platform: Unix / Linux, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Web server, PHP, Mysql
Vendor: Polar Lights
Safe'n'Sec effectively protects computers against hacker attacks that exploit vulnerabilities existing in the Windows OS and sophisticated software to break the system integrity, access user data, execute malicious code, etc. Safe'n'Sec monitors all file operations, changes in the system registry, the status of OS processes, etc.
In case such careful user has to install drivers, run system management applications or changesystemconfiguration, he has to log off and log back on as an administrator losing all running applications. There are many people who intentionally work on NT system logged as a simple user, although they actually are single users of the system.
Content Management System - dynamic page content (i.e. news) can be changed in WYSIWYG editor available in webmaster area. Option in rights to disable profile name changes and deletion. Show the system language for not translated texts.
75. TopLinks plugin (for Links SQL)
Link order can be easily changed in options based on your needs. Several systems has a fixed internal limit, usually 1 hour or 1 day. Advanced installer does all configuration jobs, you would need to do manually (you just need to complete the design in templates). DetailsDownload trial (Full version: 27.2 KB) Buy now ($95.00) Find similar
Platform: Unix / Linux, Platform independent, Windows NT, Windows 2000, Windows XP, Windows 98, written in Perl, OS compatibility depends on Perl
Vendor: Lorinczi Konrad
A-squared (a2) is a complementary product to antivirus software, which is specialized in protection against harmful software. A-squared is an install an forget application because there is no need for further configuration or update work.
DetailsDownload trialBuy now ($29.95) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, German, Portuguese, Spanish, Italian, French, Dutch
Vendor: Emsi Software GmbH
CallerIP monitors activity on open ports, which are often not protected by firewalls, on your computer so you can identify hackers before damage is done. CallerIP scans the ports on your system and alerts you to active and open' backdoors' which can provide unauthorized access to launch harmful attacks or steal confidential information.