Leaklog 0.9
Leaklog is a leakage control system based on Regulation (EC). A new and powerful software that you must have it on your computers. This useful software is easy to use and you can get it for free. It logs findings and parameters of leakage checks, shows ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite Office Premium HD+
- Android Files Recovery Program
- FoneLab HyperTrans
- Convert MySQL to Microsoft SQL
- Aiseesoft FoneLab for Android
- AnyMP4 Blu-ray Creator
- Flash Drive Data Restore
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- Quick Receipt Software
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- USB Flash Drive Recovery
- Softaken MS Excel Recovery
- ToolsBaer MSG to Hotmail...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Leakage Download
-
1Freeware
-
2Data Leakage Prevention 4.0.0.1
Today’s competitive corporate environment puts your important data at a greater risk of theft and leakage scenarios. It, therefore, becomes increasingly important for modern organizations as well as individuals to take advanced measures for ensuring ...$30.00
Buy -
3AirStop Endpoint Security Software
AirStop is an endpoint security solution which prevents data leakage by controlling all communications adapters and storage devices on laptop and desktop computers. Designed for enterprise applications, the software enforces security policy by allowing ...$45.00 -
4AirStop Sticky Wireless Edition
The AirStop Client is a wireless endpoint security solution which prevents data leakage by controlling communications adapters and storage devices on laptop computers. Unique features include "Sticky Wireless"(TM) functionality which ensures ...$60.00 -
5DataNoodlesLite 2.0
DataNoodlesLite (Safe Delete) -complete and reliable disk cleanup (disk erasure) before disposal or when changing equipment, allows you to prevent the leakage of information, confidential information will not fall into the wrong hands. Features: - ...$25.00 -
6Infiltec BDwin 2.1
BDwin analyses Infiltec blower door data and estimates building air infiltration, flow rate, and leakage area. Data from the DM4 micromanometer can be automatically entered into the program. BDwin works with all Infiltec air leakage measurement systems ... -
7PointLockM-Pro(Lock&Transfer)
PointLockM protect personal information and prevent for the smart device loss or theft that may occur after the data and to prevent personal information leakage is the Android operating systems applications. PointLockM separately by specifying the app ...$3.01 -
8AccessPatrol 4.2
, thus reducing any incidences of confidential data leakage or virus infections of the network. - Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices. -Assign security levels of full access, ...$79.00
Buy -
9Security Shield 2008 7.0.1
Our Triple Threat Protection is a unique set of technologies that protect against identity theft, confidential data leakage and all Internet threats. Add privacy and parental controls, an integrated firewall, a new and improved interface and much, much ...$39.99 -
10Lumension Device control 4.4
Lumension® Device Control enforces flexible usage policies for removable devices, removable media, and data (such as read/write, encryption) that enable organizations to embrace productivity-enhancing tools while limiting the potential for data leakage and its impact.$37.94 -
11BlackFrame NR 1.0
On long exposure the leakage may cross the exposed value treshold thus producing a white dot on the image. BlackFrame NR uses a black-frame method to removes such noise with preserving all details.Freeware -
12LAN USB Controller 2.0.1.5
* Protect your computer and LAN from unwanted USB media to stop data leakage & data theft. * Facilitate to block USB port of any client machine in LAN. * Generate log file with complete USB details and performed file operation and send it at user ...$120.00 -
13Vista Firewall Control 2.5.7.25
Allows you to control personal information leakage via controlling application network traffic. Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity. ...Freeware -
14Jihosoft Free Eraser 2.0
Have some sensitive information on your computer and worry about the data leakage one day? Now with Jihosoft Eraser, you can permanently remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Key ...Freeware -
15Cronus 1.0.2.0
What will you do if you have a time travel machine ... Go back in time & visit some of the real world's most dangerous disasters & prevent it all from happening! Flow the hazardous substance to the right place & make sure there's no leakage!$1.49 -
16GFI EndPointSecurity 2009
GFI EndPointSecurity lets you control the use of portable storage devices such as USB drives, iPods and PDAs, on your network.. With GFI EndPointSecurity you are able to prevent users from stealing confidential company data or introducing malware such ...$297.50
Buy -
17SecretsSaver 3.05
SecretsSaver will help you prevent both accidental data leakage and intentional data theft caused by employees that have access to such data due to their duty of service. SecretsSaver will make it difficult for company's IT departmentment employees ...$70.00 -
18Any@Web 2.70.1212
It can also restrict internet access of specified computers based on the rules set by user to prevent leakage of sensitive data or abuse of Internet access.$299.95 -
19ReaSoft Network Firewall 3.0
ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, web-mail, ICQ, MSN, Internet communities and other similar channels. All HTTP and HTTPS POST queries, communication via instant messengers and e-mails ...$199.00
Buy -
20USB Data Leakage Protection
Data theft protection tool for USB drive prevent you from unofficial data transfer through USB mass storage media. Monitoring software alerts by playing sound when any pen / thumb drive is connected at any machine in local area network. Surveillance ...$120.00 -
21EasyLock 1.0.4.8
EasyLock turns portable devices into TrustedDevices assuring that no user will be able to copy data in unencrypted format to the device and exposing data to accidental data leakage or intentional data theft. Users can efficiently use portable storage ...$12.95
Buy -
22modusGate 5.0
Designed to help protect against data leakage of personal, financial or proprietary information through email, it will: * Allow organizations to protect their valuable information against theft and accidents. * Enforce and monitor company policies ...$1,500.00
Buy -
23SECUDRIVE Privacy Protection
Instead of crying over spilled milk, learn how to prevent data loss and leakage. Protect yourself from being the next victim of personal, private or confidential data accidents. 30 day trial version of SECUDRIVE Privacy Protection is available. Note ...$29.99
Buy -
24Hopedot VOS (Security Edition)
With Hopedot VOS (Security Edition), users needn't to worry about information leakage any more online or offline. Double authentication guarantees users’ right to their own Hopedot VOS. Key features: *Easy-to-use interface: no training is needed ...$69.00
Buy -
25RESFEN 5.0
Product information typically offers window properties: U-factors or R-values, Solar Heat Gain Coefficients or Shading Coefficients, and air leakage rates. However, the relative importance of these properties depends on site- and building-specific conditions.Freeware