|
||||||
|
||
|
Home > Encrypt folders or files software |
Related keywords: files, encrypt, folders, hide files, Files, hide folders, PDF files, compare files, protect files, Encrypt |
|
|
1. | Aloaha PDF Suite 2.1.264 (aloaha.com) | ||
PDF Files are just one click away! Aloaha PDF Suite is the perfect tool to create your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document, which you can save, digitally sign, email, fax or publish to an exchange public folder. - Creates and edits vector based PDF Files | |||
Updated: 3, 2006 | Rating: 435 | Author: Aloaha Software | Size: 8789 kb | Commercial Go to category: System Utilities > Printer Similar programs | |||
2. | CHAOS Generator 2.4 (safechaos.com) | ||
CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
3. | CHAOS Shredder 3.0 (safechaos.com) | ||
does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | CHAOS Shredder 3.0 (safechaos.net) | ||
does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
6. | CHAOS Generator 2.4 (safechaos.net) | ||
CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
7. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | Backup-2006 Studio 5.1.2.202 (backup2004.com) | ||
backup module, synchronization and disk image. It can backup any folder to any destination (network drive, USB external disk..) It comes with its own DVD burner diver. You can schedule backup, synchronization, disk image or partition replication. Backup-2006 Studio can upload archive file to FTP, FTPS, HTTP servers. It offers a graphical backup map, catalog, log | |||
Updated: 3, 2006 | Rating: 211 | Author: RD Technologies Inc | Size: 14275 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
9. | InSync Backup Software 7.0.82 (dillobits.com) | ||
automatically make identical copies of directory structures and all files within. 1-way, 2-way, and backup synchronization modes are supported. This is useful in performing backups and propagating data from one machine to another. Using InSync you can define and run multiple synchronization jobs that | |||
Updated: 3, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 1380 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
10. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Encrypt folders or files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|