Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Downloading JOC History Eraser 1.0.1.9

Your download will begin in a few seconds. If it does not start you can download directly through one of the mirror sites below.

Download Sites:

Similar Products:

MYUSBONLY FREE 2007 2.0

Security & Privacy :: Covert Surveillance
img Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. This version is not time-limited!
Windows | Freeware
Read More

MYUSBONLY 9.7

Security & Privacy :: Covert Surveillance
img Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect, disconnect and files/folders copied, modified, deleted activity. Multi-user discounts are available.
Windows | Shareware
Read More

WODSFTPDLL 3.8.5

Development :: Components & Libraries
img The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTPdll library implements client side of this protocol which is reliable and easy to use
Windows | Shareware
Read More

WODSSHSERVER 2.5.4

Development :: Active X
img SSH Server ActiveX component (but also Telnet Server ActiveX as well) that will give you ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys
Windows | Shareware
Read More

ANTI-SPY.INFO ADWARE REMOVER 1.8

Security & Privacy :: Anti-Spam & Anti-Spy Tools
img Anti-Spy.Info is your security and personal privacy tool that detects and removes spyware, trojans, keyloggers and adware. It complements your firewall and anti-virus software. Anti-Spy.Info tells you every hidden function of all dynamic link library, system task and threat currently active on your computer. Anti-Spy.Info stops keylogger or other hacker tools and protects from trojans that stealthy add an autostart key.
Windows | Shareware
Read More

PDF417 BARCODE GENERATOR 8.3.0.1

Business :: Inventory & Barcoding
img How to print barcode security stickers in 2D font? Comprehensive PDF417 Barcode Generator application is available at www.2dbarcode.biz to generate barcode price stickers, security tags, images, assets tags or rolls save in different types of file extensions including JPEG, TIFF, Bitmap, PNG, WMF, EMF, EXIF and GIF.
Windows | Shareware
Read More

WINGPG 1.0

Security & Privacy :: Encryption Tools
img Free encryption tool with simple and powerful interface to protect your data. Its an open source software based on GPG public-key cryptography to encrypt/decrypt files and sign/verify digital signatures. WinGPG has a manageable classic Windows interface, clipboard support and WinNT Explorer support via context menus and global shortcuts. Its free to download and easy to use.
Windows | Freeware
Read More

ID CARD MAKER SOFTWARE 9.3.0.1

Business :: Office Suites & Tools
img Cost efficient ID Card Maker Software helps to user in manufacturing best in class student ID cards in various colors, shapes, sizes, fonts, styles etc. Staff identity card designer tool is able to produce cool ID cards in different shapes like rectangle, rounded rectangle, ellipse etc without requiring any technical expertise or prior training.
Windows | Shareware
Read More

VISITOR IDENTITY CARD SOFTWARE 6.9.5.4

Business :: Office Suites & Tools
img Visitor identification designed cards can contribute to security and it is essential to note that no system is completely disabled. Software determined particulars with unauthorized intent might find ways to any other resources or counterfeit identity cards. It's important to add additional security measures like video surveillance, trained security personnel, and robust access control systems to secure the use of visitor ID cards design.
Windows | Shareware
Read More