|
||||||
|
||
|
Home > Software > Security & Privacy > Alphabetically |
|
|
241. | FolderSafe 2.1 (occultsoft.com) | ||
What is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI - Easier | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
242. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
Remove Internet tracks and past computer activities. It can quickly erase your cache, cookies, history, visited URLs, typed URLs, index.dat, Clean Forms Passwords data, temp folders and more. The cookie-cleaning and typed URLs feature allows you to specify which item to keep, so that you don't erase your | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
243. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
Spam emails have become an ever increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
244. | go1984 3.0.3.6 (logiware.de) | ||
go1984 was designed for professional and problem-free video surveillance and recording. The easy to use software with varied functions at an absolutely competitive price sets a new standard for the software industry. The function range of go1984 contains everything, which is required for professional video surveillance. It can use pictures from Network-Cams, WebCams, Video Capture Cards and other http picture sources | |||
Updated: 9, 2005 | Rating: 1029 | Author: Ralf Kronemeyer | Size: 7443 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
245. | GreatCrypt 2.0 (miraxus.com) | ||
GreatCrypt is a powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
246. | Groone's Macroer 2.6 (groonesworld.com) | ||
Never worry about repitive tasks again! Groone's Macroer simplifies those redundant day to day tasks. By creating simple text routines you will free up hours on the keyboard. There are no complicated scripting languages to know and no list of forced to remember keyboard strokes. YOU define everything. Now | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
247. | Groone's Password Store 3.5 (groonesworld.com) | ||
Keep all your passwords in one secure place on your personal computer for easy access. Record a description of your program, your username and its password then with a few quick clicks your programs, passwords, and usernames are at your fingertips. Each password and username is tightly encrypted in the | |||
Updated: 3, 2005 | Rating: 42 | Author: R Bennett | Size: 727040 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
248. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
HackerWacker Personal Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
249. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
250. | Hard Angel 1.05 (kpot.8bit.co.uk) | ||
Do you remember CIH? The virus has injured 500000 computers and many computers have been destroyed as a result of reprogramming Flash-memory. Now owners of motherboards lock it but this problem is actual for hard disks. Hard Angel is jumper for your hard drive. Protect your hard drive with a Hard Angel! The | |||
Updated: 9, 2005 | Rating: 401 | Author: Ozerov Evgeny | Size: 300 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Software > Security & Privacy > Alphabetically |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|