ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 4 5 6 ... Next » (7 pages) Displayed: 1 - 25 of 173
Sort by:  relevance | title | downloads | rating | date
OpenVPN x64
OpenVPN x64 2.6.11   
... user or group-concrete access control policies utilizing firewall rules applied to the VPN virtual interface. OpenVPN x64 ... that characterize other VPN implementations. The OpenVPN x64 security model is based on SSL, the industry standard ...
Open Source

Betterbird
Betterbird 140.7.0esr-bb17   
... system, which allows users to create highly customized rules for managing their inboxes. This ensures that important ... Betterbird also places a strong emphasis on security and privacy. It includes robust encryption options and ...
Open Source

gSyncit 5
gSyncit 5 5.8.42   
... is transferred. Additionally, the software supports conflict resolution rules, allowing users to prioritize which data source should ... and troubleshoot any issues that may arise. Security is a top priority for gSyncit. The software ...
Demo | $19.99

Gammadyne Mailer
Gammadyne Mailer 73.0   
... sorting and responding to them based on predefined rules. This feature is particularly useful for managing large ... it to their specific needs and preferences. Security is another area where Gammadyne Mailer shines. The ...
Demo | $130.00

Fax Voip Softphone
Fax Voip Softphone 4.1.1   
... to setting up custom ring tones and call rules, Fax Voip Softphone provides the flexibility required to create a personalized communication experience. 5. **Security:** Understanding the importance of secure ...
Trialware | $190.00

Netcam Studio x64
Netcam Studio x64 1.9.5.0   
... using in the overlay and rule manager Security Motion and Speed detection Audio detection License plates ... defined by scheduler) Trigger external systems based on rules (HTTP, File, Command) Email notifications Integrated Users Administration ...
Freeware

LanguageTool for Firefox
LanguageTool for Firefox 8.13.2   
... the chances of contextual errors. 4. **Customizable Rules and Personal Dictionary:** Users can customize the tool ... a personal dictionary and adjusting grammar and style rules. This flexibility ensures that the tool adapts to ...
Shareware

O&O SafeErase Professional x64
O&O SafeErase Professional x64 19.0.1027   
... type of overwriting process. These methods ensure maximum security, whatever your requirements. In addition to standardized deletion ... (DoD) and the German Federal Office for Information Security (BSI) you can also select a complex mathematical ...
Trialware | $29.95

Sync Breeze Pro
Sync Breeze Pro 17.6.32   
... synchronization profiles, each with its own set of rules and filters. This allows for precise control over ... with detailed insights into their synchronization activities. Security is a top priority for Sync Breeze Pro, ...
Demo | $50.00

Disk Pulse Pro
Disk Pulse Pro 17.6.32   
... can easily configure monitoring profiles, set up custom rules, and define specific actions to be taken when ... that can adapt to various operational needs and security policies. The software also includes advanced reporting ...
Shareware | $25.00

Disk Sorter Ultimate
Disk Sorter Ultimate 17.7.14   
... can categorize files based on predefined or custom rules, enabling more granular control over data organization. The ... data management strategies. **Security and Reliability** Security is a critical consideration in any file management ...
Trialware | $500.00

Droid Email Seeker
Droid Email Seeker 2.0.6   
... engineered to address the ever-growing challenges of data security in today's interconnected world. Seeker stands out with ... offering a seamless experience for IT administrators and security professionals. The dashboard is intuitively designed, presenting critical ...
Trialware | $900.00

PowerShell Scripts for SQL Server
PowerShell Scripts for SQL Server 6.0   
... Work with policies and SQL Server logs. Maintain security and backups. Create and manage SQL Server jobs. ... information. Get Query Store status. Center for Internet Security (CIS) benchmarks: Surface area reduction, authentication and authorization, ...
Freeware

Outlook Security Manager
Outlook Security Manager 7.1   
Outlook Security Manager is developed and supported by MAPILab Ltd together with the Add-in Express Company. Outlook Security Manager (full name - Security Manager for Microsoft Outlook) is a one-line programming ...
Trialware | $149.00

Mail Attachment Downloader
Mail Attachment Downloader 3.3 Build 1018   
... specify download locations, rename files based on predefined rules, and even integrate with cloud storage services to ... supports SSL connections, providing an added layer of security when accessing email accounts. **Performance and Reliability** ...
Shareware | $216.00

Becky! Internet Mail
Becky! Internet Mail 2.83.01   
... and search capabilities. Users can create complex filtering rules to organize their emails automatically, ensuring that important ... or attachments, even in large mail archives. Security is another area where Becky! excels. The software ...
Trialware

Automatic Email Processor
Automatic Email Processor 3.8.19   
... their attachments from Microsoft Outlook. Users can define rules and filters to specify which emails and attachments ... emails to specific Outlook folders based on user-defined rules. This ensures that your inbox remains clutter-free and ...
Demo | $89.95

C# Web Scraping Library
C# Web Scraping Library 4.0.4.2   
... can be set using logical workflows and regex/wildcard rules. Screen-scraping is made easier with identity control, automatically ... buttons, fill in forms or log in behind security walls. This is useful for migrating legacy systems, ...
Shareware | $299.00

EditThisCookie
EditThisCookie 1.6.3 for Chrome   
... in its customization options. Users can set specific rules for cookies, such as blocking or allowing them ... attributes. This granular control helps enhance privacy and security by preventing unwanted tracking and data collection. Furthermore, ...
Open Source

Sapphire P2P Rush screenshot
Sapphire P2P Rush 3.4.0   
... globally and for each torrent - Advanced seeding rules unseen in other products of it's kind - ... would do anything to preserve your privacy and security. ...
Freeware

EventLog Analyzer
EventLog Analyzer 12.5.4 Build 13008   
... IT administrators can swiftly detect and respond to security threats, compliance violations, and operational issues. One ... provide flexibility to address unique compliance needs. Security is a top priority for EventLog Analyzer. The ...
Trialware

Forwarder
Forwarder 1.6.0   
... robustness of their applications under different conditions. Security is a paramount concern for any proxy solution, ... proxy remains confidential and tamper-proof. This level of security is crucial for organizations that handle sensitive information ...
Open Source

NxFilter
NxFilter 4.7.4.2   
... allowing administrators to monitor usage patterns, identify potential security threats, and ensure compliance with organizational policies. These ... for making informed decisions about network management and security. Another significant advantage of NxFilter is its ...
Freeware

HttpMaster Professional Edition screenshot
HttpMaster Professional Edition 6.2.6   
... reliability of web responses. Users can define validation rules to check the content, structure, and status of ... integrate with other development and testing tools. Security is a top priority for the HttpMaster Team, ...
Freeware

Cayo Admin Assistant for Active Directory
Cayo Admin Assistant for Active Directory 2.0   
... On-going Maintenance & Cleanup for avoiding outages & security problems - Bulk Administration to improve admin Efficiency - Enforcement of IT Business Policy for security & compliance - Administrative Automation for Admin Efficiency ...
Shareware
Results Page: 1 2 3 4 5 6 ... Next » (7 pages) Displayed: 1 - 25 of 173
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags