|
||||||
|
||
|
Home > File level security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
101. | Innovatools What's On My Computer 2.0 (whatsonmycomputer.com) | ||
this program that you've just downloaded from the Internet? Is it a virus? Is it legitimate software? Is it safe? Where can you find more information about it, or about the company that produced it? What are other people saying about it? Is it stable? Is it full of bugs? Where can you find an update? What about the programs that are running right now on your computer, or the ones | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1135 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
102. | Wincph encryption software 4.7 (keepsecret.net) | ||
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
103. | WinSettings 6.0 (filestream.com) | ||
is a Windows utility that protects your online Privacy and Security, cleans up unwanted tracks left on the computer from surfing the Internet, to gain more control of your Windows Desktop, and make better use of acquired multimedia contents. It cleans up unwanted tracks left on the computer from surfing the Internet and in the Document Menu automatically on Windows Startup or | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1235 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
104. | System Shield 2.1c (iolo.com) | ||
people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
105. | TK8 Safe 2.5 (tk8.com) | ||
passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
106. | Too Many Secrets 0.3.1 (fdsoftware.it) | ||
password, authentication code, gaming code and organize them in a 2 level tree-structure with categories (eg.: Internet, Gaming, Work, Personal) and subcategories (eg.: EMail, Mailing List, Online Magazines can be subcategories of the Internet category). The Password File are encrypted with a proprietary method. You can print or export your password to various format | |||
Updated: 9, 2005 | Rating: 0 | Author: Francesco Duranti | Size: 1948 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
107. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
108. | RemoteExec 3.07 (isdecisions.com) | ||
on-going production. FEATURES: - Remote running of program files (.exe, .bat, .cmd…), scripts (.vbs, .js…) and all associated file types (.doc, .wav, .reg, .msi...) - Options to easily deploy Service Packs, patches, hotfixes, Internet Explorer updates and most Microsoft updates. - Options to easily deploy Windows Installer packages (.msi), including customisation | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
109. | !Remove Access Passwords! 2.0 (e-tech.ca) | ||
you have a password protected Access Data file (MDB)? Is your system administrator unavailable, and you need access to your data. Do you need to modify your MS Access program code, and the programmer isn’t available? Do you like to hack? Do you have a database with user-level | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Britto | Size: 1515 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > File level security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|