English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by backlink audit

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: EaseFilter File Monitor Library 5.0.4.0
Download EaseFilter File Monitor Library 5.0.4.0
more info
2023-03-09
Comprehensive complete file security SDK can help you to track file change, control file access on the fly, prevent your sensitive data from being accessed by unauthorized users or processes.Secure file sharing with digital rights management(DRM).
BlueAuditor 1.7.3 by Nsasoft US LLC
2020-04-21
BlueAuditor is a program for detecting, scanning and monitoring Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
Steel Network Inventory 3.0.1 by SteelSonic Technical Services
2020-05-18
Steel Inventory is a program written and used by the people who are in the mainstream network administration. Simple and Easy method to track hardware and software
EaseFilter File Protector Library 5.0.3.9 by EaseFilter Technologies Inc.
2020-07-18
The EaseFilter file protector library can control the file I/O activities on file system level, allows you to develop application which can protect your files being accessed only by authorized user, block the unauthorized users to access your files.
XLRISK 6.1.3.3 by ADDINSOFT INC
2022-11-29
XLRISK, developed by Vose Software and distributed by Addinsoft, introduces many technical Monte Carlo method features that make risk models easier to build, easier to audit and test, and more precisely match the problems you face.
2024-02-14
Software can organize to manage visitor traffic, track entry, exit, and ensure safety.It also maintains detailed audit trails to monitor user activities and integrated with watchlist databases to screen visitor information for restricted access
2024-02-20
Gate passes, created by gate pass makers, can be used for security purposes, controlling access to restricted areas and managing visitor entry and exit. They may not provide comprehensive security and should be part of a broader security strategy.
0.031