|
||||||
|
||
|
Home > Private folder software |
Related keywords: folder, private, Folder, hide folder, lock folder, protect folder, folder guard, password protect folder, security folder, folder size |
|
|
1. | CHAOS Shredder 3.0 (safechaos.com) | ||
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | CHAOS Shredder 3.0 (safechaos.net) | ||
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | IE Security Pro 6.9.1.1 (1securitycenter.com) | ||
title caption, toolbar background, and animated icon; change default folders; and replace standard error information pages. It allows you to manage security zones very easy. The powerful "Web Spy" feature enables you control WHAT web sites and WHEN users may view. The "Password control" and "Time control" options enable you to manage disallowed sites. If a user leaves a page up on IE | |||
Updated: 3, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1750 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | UltraISO Media Edition 7.6.6.1308 (ezbsystems.com) | ||
files, make images from CD/DVD-ROMs, or build new one from files and folders on your computer. You have the option to make the newly created image bootable and to specify the boot loader. In addition, UltraISO can convert nearly all known data CD/DVD image formats to ISO, BIN/CUE, Nero (.NRG) or | |||
Updated: 3, 2006 | Rating: 39211 | Author: EZB Systems | Size: 2727 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | Advanced Directory Comparison and Synchronization 1.19 (heatsoft.com) | ||
ADCS is a very fast and easy-to-use Directories and Files synchronizer. ADCS is great application and substitute for MS Briefcase. It is ideal for keeping files synchronized between a desktop & laptop or between multiple drives on you desktop and is a very fast method of backing up critical directories. Any | |||
Updated: 3, 2006 | Rating: 89 | Author: Heatsoft Corporation | Size: 2349 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
8. | IE Security Pro 6.9.1.1 (mybestsoft.com) | ||
title caption, toolbar background, and animated icon; change default folders; and replace standard error information pages. It allows you to manage security zones very easy. The powerful "Web Spy" feature enables you control WHAT web sites and WHEN users may view. The "Password control" and "Time control" options enable you to manage disallowed sites. If a user leaves a page up on IE | |||
Updated: 3, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1750 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | Effective File Search 3.9.5 (sowsoft.com) | ||
tool. Search any files on your computer or local network. Search in folders or results. Support of all popular file formats (MS Office files, PDF, RTF, HTML and many other text and binary files). Search filters include date and size, containing text or hexadecimal codes. You may use Boolean operators | |||
Updated: 3, 2006 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 736 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
10. | Duplicate Email Remover 2.11.0 (mailutilities.com) | ||
and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in one folder and in different folders. A duplicate message found can be: marked with a flag, deleted, copied or moved to any | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
|
Home > Private folder software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|