The Best 39198 Productivity Alternatives

  • PowerShell Server icon

    PowerShell Server

    PowerShell Server is a full-featured SSH 2.0 server that enables Windows Desktops and Servers with a secure remote entry point to a Windows PowerShell Host. This gives...

  • Core Force icon

    Core Force

    CORE FORCE is a free comprehensive endpoint security solution for Windows 2000 and Windows XP systems. CORE FORCE provides inbound and outbound stateful packet...

  • ASUS Remote Link icon

    ASUS Remote Link

    Remote Link is a powerful utility to let you operate the PowerPoint/Windows Media Player in your laptop via Bluetooth and Wi-Fi.

  • Truman Grade icon

    Truman Grade

    Truman Grade is the easiest way to determine which sites protect your money, privacy, and information. What is Truman Grade? Truman Grade knows the websites that put...

  • ScamBlockPlus icon

    ScamBlockPlus

    ScamBlockPlus can be useful to both business employees who work on the internet, and to private people who need protection from online phishing scams. ScamBlockPlus...

  • Blok: Simple Fast Firewall icon

    Blok: Simple Fast Firewall

    A simple fast firewall. No root required. Prevent apps from accessing the internet, save your data, increase privacy, and improve battery life. Does that...

  • InJoy Firewall icon

    InJoy Firewall

    With InJoy Firewall™ 4.0 you can say good-bye to old-generation Firewall solutions that were difficult to implement, manage and measure — InJoy Firewall™ is different......

  • Metadefender Endpoint Management icon

    Metadefender Endpoint Management

    Metadefender Endpoint Management is the easiest way to identify potential security risks on your computer or mobile device. It runs quickly and generates an...

  • Online Solutions Security Suite icon

    Online Solutions Security Suite

    Online Solutions Security Suite (OSSS) is a complex protection software that includes a new generation proactive defense system and an extremely powerful firewall, and...

  • FullScreen For Safari icon

    FullScreen For Safari

    This app allows you to browse the internet on your jailbroken iPhone in fullscreen mode. Just double-tap the webpage, and all of Safari's toolbars disappear....

  • phpMussel icon

    phpMussel

    phpMussel is a PHP solution based upon the signatures of ClamAV and others, designed to detect trojans, viruses, malware and other threats within files uploaded to your...

  • Pyxsoft Antimalware icon

    Pyxsoft Antimalware

    More than 4.000.000 of known virus and an Advanced Code Analysis Engine allows Pyxsoft Anti Malware to have the maximum detection rate in the market.

  • ShaPlus Bandwidth Meter icon

    ShaPlus Bandwidth Meter

    Simple to use bandwidth monitoring software to track Internet bandwidth usage.It remains in tray and displays the bandwidth usage in current session, day and month. This...

  • Flying Buttress icon

    Flying Buttress

    As Apple's built-in Firewall preferences improves in both functionality and security, I will be aiming Flying Buttress more at users who need the advanced firewall...

  • Comodo Anti Theft icon

    Comodo Anti Theft

    COMODO Anti Theft (CAT) lets you quickly locate, protect and recover your missing phone or tablet As the 'Swiss army knife' of anti-theft applications, CAT...

  • iGotYa icon

    iGotYa

    iGotYa will allow you to take a picture of your thief face (if you have front face camera) and get the location where your iPhone is. You will need to protect your...

  • My Device Tracker icon

    My Device Tracker

    Lost or Stolen Laptop/Mac or USB device? Now you can track down your device within minutes with My Device Tracker. Four versions are available: My Laptop Tracker...

  • UnTouchedMe icon

    UnTouchedMe

    UnTouchedMe is a complete anti-theft app for protect your phone and make the theft surprised! Simple to use with friendly design setting menu. App feature : • Your...

  • abylon SHREDDER icon

    abylon SHREDDER

    The working with the computer and the browsing in the internet leave numerous digital traces on the disk. The normal functions of the operating system don’t delete these...

  • ErAce icon

    ErAce

    ErAce is software that will over write the hard drive 1-100 times. So it fullfills the strictest security standards i.e. DOD 5220.22-M. In that way it is impossible to...