Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Security taskmanager key in Title/Summary

Network Security Taskmanager

Network Security Taskmanager

For each Windows process, Network Security Task Manager displays: -comments from our experts and the user community -full directory path and file name -process description -manufacturer -computers on which the process runs -product to which the process belongs -start time and start method -embedded hidden functions (e.g. keyboard monitoring, browser surveillance or manipulation)

  • Publisher: Neuber GmbH
  • Home page: www.neuber.com
  • Last updated: March 29th, 2012
Intel Security True Key

Intel Security True Key

Privacy is, undoubtedly, Internet users’ biggest concern, and rightly so - passwords, bank accounts, and credit cards are easy prey for cyberattackers. True Key is a state-of-the-art free protection tool that will scramble and encrypt passwords, messages, notes, credit cards, bank accounts, and any other piece of sensitive information using AES-256 encryption and multi-factor authentication.

  • Publisher: Intel Corporation
  • Home page: www.truekey.com
  • Last updated: July 4th, 2017
FruitfulTime TaskManager

FruitfulTime TaskManager

FruitfulTime TaskManager is a wonderful organizer and personal information manager that allows you to have all your important information, tasks and appointments safely stored in one place. The application allows you to add tasks and subtasks very easily and quickly, setting different priority levels marked with a distinct color for easier identification, etc.

Security taskmanager key in Description

ESigner

ESigner

It is easy to integrate and deploy gives the benefit of smart card security for key storage when used with Ezio PKI Cards. Benefiting from a user-friendly interface Ezio eSigner also enables Sign-What-You-See functionality by providing its own secure window to display the effective data element to be signed.

  • Publisher: Gemalto
  • Home page: www.gemalto.com
  • Last updated: February 1st, 2010
Sentinel Protection Installer

Sentinel Protection Installer

Sentinel Protection enables the use of either software- or hardware-based protection keys to enforce software protection and licensing. With Sentinel Protection you can increase your profits by protecting against losses from software piracy and intellectual property theft and enable innovative business models to increase value and differentiate your products.

  • Publisher: SafeNet, Inc.
  • Last updated: November 23rd, 2021
Sentinel Protection

Sentinel Protection

Sentinel License Monitor shows the details of the Sentinel UltraPro and Sentinel SuperPro keys attached/installed on a system and clients accessing them, via a Web browser. It is a convenient way to view and track the license activity and analyze application usage.

  • Publisher: SafeNet, Inc.
  • Last updated: October 28th, 2011
Double Password

Double Password

Double Password has a fresh outlook onto your computer security. It turns any USB gadget into a security token, which your computer starts to require every time you log into the system. Special encryption prevents your passwords from interception.

Folder Lock

Folder Lock

If in search of a comprehensive solution to protect all your sensitive information from prying eyes, Folder Lock offers you not only strong password protection and encryption, but also an unassailable backup to recover your lockers and wallets in case of data loss. It can protect both your system drives and whatever USB devices you wish to carry with you.

Additional Security taskmanager key selection

Key Manager

Key Manager

Key Manager simplifies the process of management of Dekart multifactor security solutions within the enterprise. This is a tool for administrators charged with the challenging task of management of hundreds, sometimes thousands, of USB keys and smart cards.

  • Publisher: ATNSOFT
  • Home page: atnsoft.com
  • Last updated: March 14th, 2022
Kaspersky Internet Security

Kaspersky Internet Security

Kaspersky Internet Security comes packed with multiple layers of protection to identify, isolate, and remove all types of malware including viruses, worms, Trojans, cryptolockers, rootkits, and spyware. Its Automatic Exploit Prevention identifies complex network exploits across your PC.

  • Publisher: Kaspersky Lab
  • Home page: www.kaspersky.com
  • Last updated: April 6th, 2022
Security Task Manager

Security Task Manager

As you probably know, Windows has a built-in tool to monitor and stop running programs and processes. However, the information it provides is too little when it comes to analyzing an application’s potential threat to your system. On the contrary, Security Task Manager, the utility being reviewed, can provide much more comprehensive data, such as file types and location.

  • Publisher: A. & M. Neuber Software
  • Home page: www.neuber.com
  • Last updated: March 24th, 2017
Microsoft Defender

Microsoft Defender

Windows Defender is the well-known security tool from Microsoft that protects your system and your data against spyware and other malicious applications. Formerly named “Microsoft AntiSpyware”, Windows Defender is included by default in the latest 3 Windows editions (Vista, 7 and 8) and can be downloaded and installed separately on Windows XP and Windows 2003.

Elcomsoft Wireless Security Auditor

Elcomsoft Wireless Security Auditor

Audit security of your wireless networks and recover WPA/WPA2 with patent-pending GPU acceleration technology that speeds up password recovery if one or more compatible NVIDIA or ATI video cards are installed.

  • Publisher: ElcomSoft Co. Ltd.
  • Home page: www.elcomsoft.com
  • Last updated: May 3rd, 2023
QuickTime

QuickTime

Includes support for the key media formats, such as H.264 and AAC. The QuickTime web browser plug-in is no longer installed by default and is removed if you have a previous version of QuickTime on your PC. If you still need this legacy plug-in, you can add it back using the custom setup option in the installer.

  • Publisher: Apple Inc.
  • Home page: www.apple.com
  • Last updated: June 30th, 2020
Rohos Logon Key

Rohos Logon Key

Rohos Logon Key is a utility that enables you to convert a USB stick into a security token for your Windows PC. With its help, you can replace the default password-based login of Windows with a hardware security key such as USB flash drive, Google Authenticator OTP, mobile devices with Bluetooth, etc.

  • Publisher: Tesline-Service SRL, SafeJKA SRL
  • Last updated: March 13th, 2023
McAfee Security Scan Plus

McAfee Security Scan Plus

McAfee Security Scan Plus actively checks your computer for anti-virus software, firewall protection, and web security, and threats in your open applications. When the scan is complete, you’ll see a report detailing the presence and status of your security protection. If problems are detected, McAfee will provide a recommendation on the best security solution.

  • Publisher: McAfee, Inc.
  • Home page: www.mcafee.com
  • Last updated: February 29th, 2024
WiFi Password Key Generator

WiFi Password Key Generator

WiFi Password Key Generator is exactly what its name suggests: a program that helps you create Wireless WEP and WPA/WPA2 keys on your Windows PC. These types of keys are necessary when a modem or a router requires you to provide WEP or WPA keys during a Wireless security setup.

USB Disk Security

USB Disk Security

USB Disk Security protects your computer from being infected by malicious programs present on external storage media. It supports flash disk, SD card, external hard disk, iPod, and other devices. This program can work along with other anti-virus programs.