|
||||||
|
||
|
Home > Sensitive files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, sensitive, delete files, recover files |
|
|
101. | Private Encryptor 6.2 (tropsoft.com) | ||
the latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encryption, My Passwords, My Private Notes, Installable Encryption Modules, Compression, Context Menu support, Stealth Media Encryption super speed for large image multimedia and | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
102. | StormWindow 2000 3.02 (cetussoft.com) | ||
Editor and/or System Policy Editor; preventing the merging of .REG files into the Registry; preventing the addition or deletion of printers; keeping empty the Documents Menu; and individually hiding "sensitive" Control Panel pages and settings. StormWindow security schemes may be imported from | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1285 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
103. | StormWindow 95 4.55 (cetussoft.com) | ||
Editor and/or System Policy Editor; preventing the merging of .REG files into the Registry; preventing the addition or deletion of printers; keeping empty the Documents Menu; and individually hiding "sensitive" Control Panel pages and settings. StormWindow security schemes may be imported from | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
104. | StormWindow 98 5.14 (cetussoft.com) | ||
Editor and/or System Policy Editor; preventing the merging of .REG files into the Registry; preventing the addition or deletion of printers; keeping empty the Documents Menu; and individually hiding "sensitive" Control Panel pages and settings. StormWindow security schemes may be imported from | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
105. | StormWindow Me 6.02 (cetussoft.com) | ||
Editor and/or System Policy Editor; preventing the merging of .REG files into the Registry; preventing the addition or deletion of printers; keeping empty the Documents Menu; and individually hiding "sensitive" Control Panel pages and settings. StormWindow security schemes may be imported from | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
106. | StormWindow NT 2.14 (cetussoft.com) | ||
Editor and/or System Policy Editor; preventing the merging of .REG files into the Registry; preventing the addition or deletion of printers; keeping empty the Documents Menu; and individually hiding "sensitive" Control Panel pages and settings. StormWindow security schemes may be imported from | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
107. | Sure Delete 4.1.9 (concentric.net) | ||
remove data from your hard drive. No more worrying if your sensitive data can be recovered. No more headaches. Sure Delete is tested safe for FAT12, FAT16, FAT32, and NTFS disk formats, so you can use it in Windows™ 95, 98, NT 4.0, and Windows 2000 environments without worry. (NT/2000 users must have the appropriate permissions). Sure Delete is packed with | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael L | Size: 427 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
108. | SyncBack 3.2.7.0 (mjleaver.com) | ||
backup, synchronize, or restore your files to another drive, FTP server, ZIP file, networked drive, or removable media. Highly configurable, SyncBack includes: detailed and easy to read log files; email results; simulated backups and restore; file filters; sub-directory selection; copy verification; background backups; auto-close of programs; easy and expert | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
109. | System Shield 2.1c (iolo.com) | ||
people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
110. | TK8 Safe 2.5 (tk8.com) | ||
manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Sensitive files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|