|
||||||
|
||
|
Home > Planer software |
|
|
111. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
112. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
113. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
114. | Delenda 2.415 (peccatte.karefil.com) | ||
Delenda identifies files older than x days based on file creation, modification, last accessed date and deletes or moves them to archive folders. You can replicate folder structure when moving files and leave a shortcut in source folder after files transfer to archiving location. 3 methods for deletion or | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
115. | D_back 1.60.3 (backupforall.com) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
116. | D_back 1.60.3 (svap.pp.ru) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
117. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
118. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
119. | ClipMate Clipboard Extender 7.0.07 (thornsoft.com) | ||
Hot Internet URLS, Project Research, or whatever you wish. ClipMate's exclusive PowerPaste allows you to rapidly paste large amounts of data with ease. New to version 7: Universal QuickPaste lets you paste any clip by double-clicking. Drag and Drop clips right into other programs. Dual-Monitor | |||
Updated: 2, 2006 | Rating: 16 | Author: Chris Thornton | Size: 4741 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
120. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Planer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|