|
||||||
|
||
|
Home > Secure shell software |
Related keywords: secure, shell, Secure, Shell, shell extension, secure delete, secure files, secure deletion, secure file, pdf secure |
|
|
1. | Super Utilities 6.25 (superlogix.net) | ||
maintenance tasks. 2.Privacy Protector assists in protecting and securing sensitive information. You can hide or lock folders, clean your system tracks, password-protect applications that hold sensitive data, quickly and securely delete files, and hide IE Favorites and Start menu items from view. 3.System Maintenance will help automate computer maintenance jobs to keep it | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
2. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
and use. - Absolutely no configuration needed - just use it. - Secure memory handling - no keys or data in the paging file - Private branding support for commercial or corporate versions. - Open source under GNU GPL. Easy to use strong file encryption, integrated with Windows Explorer. Encrypt, compress, decrypt, wipe, view and edit with a few mouse clicks. Cryptographic | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
console-type services. It allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well to Telnet servers (using Telnet protocol that is NOT encrypted). For ones that don't know - the SSH transport layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
5. | wodFtpDLX 2.5.1.0 (weonlydo.com) | ||
and is not visible on the form, or GUI ActiveX version that has it's own Explorer-alike window where you can give end users ability to interact directly with the server Features: FTP, FTP+SSL with and without encrypted data channel, and SFTP (SSH subsystem) protocols Certificate authentication | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 2967 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
6. | wodSSH 2.3.7.0 (weonlydo.com) | ||
wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3). For ones that don't know - the SSH transport layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
7. | Silver Key 3.3 (filecryption.com) | ||
software. If your demands are higher, you can use the Silver Key Shell to create more advanced parcels. You can add encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | WiSSH Standard Edition 2.5 (wissh.com) | ||
Remote Desktop Protocol/Secure Shell (RDP/SSH) Client. WiSSH Remote Access Technology provides easy, secure, controlled remote access to systems inside your network perimeter. Coupling Microsoft's Remote Desktop Protocol with the trusted open source SSH protocol in a lightweight client will give you or your customers a highly reliable, scalable solution | |||
Updated: 2, 2006 | Rating: 34 | Author: Chad Amberg | Size: 3496 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
9. | Silver Key 3.3 (kryptel.com) | ||
software. If your demands are higher, you can use the Silver Key Shell to create more advanced parcels. You can add encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Fast Cleaner 4.7 (eshinesoft.com) | ||
to identify garbage files and ignore important files, which ensures secure cleaning up of your harddisks and smooth running of your system. 5. Value-added functions for advanced users to perform manual disk cleanup. 6. Secure cleaning and exclude options! 7. User-friendly and Wizard | |||
Updated: 2, 2006 | Rating: 0 | Author: Jerry Jones | Size: 3577 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Secure shell software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|