COMPUTER SOFTWARE USED INTERNET

Brand Owner (click to sort) Address Description
A AFFIDIA SYSTEMS AFFIDIA SYSTEMS, INC. 6080 Center Drive, 6th Floor Los Angeles CA 90045 Computer software used in Internet technology for business consulting in the area of Internet infrastructure design, security, e-commerce, IT staffing and managed services;AFFIDIA SYSTEMS;SYSTEMS;
AFFIDIA AFFIDIA SYSTEMS, INC. 6080 Center Drive, 6th Floor Los Angeles CA 90045 Computer software used in Internet technology for business consulting in the area of Internet infrastructure design, security, e-commerce, IT staffing and managed services;
BUSINESS ETOUCH Kintner, Michael, J 1615 West State Street Olean NY 14760 computer software used for internet applications;
INTERNET SECURITY MANAGER Ultimate Internet Access, Inc. 4120 Jurupa Street Suite 212 Ontario CA 91761 Computer Software used for internet security;
ULTIMATE ONLINE FAMILY PROTECTION AVAST SOFTWARE B.V. GATWICKSTRAAT 9 - 39 1043 GL AMSTERDAM Netherlands Computer software used for internet threat management, network security, firewall, anti-virus, spam control, spyware blocking, phishing control, peer-to-peer control, content filtering, privacy control, identification theft control and web accelerator;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A virtual private network service provider, wherein virtual private network ("VPN") software for setting up a virtual private network connection is delivered from a server computer to one or more client computers over a computer network, such as the Internet. Once the VPN software is delivered to the client computers, it can be executed so that data communications are made as virtual private network communications under control of the VPN software. Because the VPN software is stored and maintained on a server computer, and preferably delivered to the various client computers on an as-needed basis, the distribution, integrity and updating of the VPN software is improved because the "master" version of the VPN software can be controlled and revised by merely accessing the server computer system, rather than by attempting to control and revise numerous copies of the VPN software resident on various, scattered client computers.