|
||||||
|
||
|
Home > Security technology software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, technology |
|
|
111. | PCWash 3.2 (pcwash.com) | ||
removes and wipes these areas to assure your privacy. Unlike it's competitors, PCWash is equally effective in keeping Internet data and system tracks clean and secure. Maximize Your Privacy With This Simple To Use Software Designed To Easily Secure Your Computers Information and Data About You! Simply, safely and securely erase the secrets your computer is keeping about you. PCWash | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
112. | Protect Folder 98 3.0 (everstrike.com) | ||
Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the file or folder that you | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
113. | QuadRate 1.10 (rjsoftware.com) | ||
Windows 95/98/ME/NT/2000/XP that makes it easy to view your machine's current configuration and resources, quickly customize various settings, and clean up unwanted files and registry entries. QuadRate is the easy way to access many of the Windows' "hidden features" that can make the difference | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Joseph | Size: 297 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
114. | QuickWiper 7.6.3 (aks-labs.com) | ||
typed URLs, temporary and recent files. QuickWiper has several security modes. You can use simple windows deletion, wipe files with single pass wiping or use most secure NSA erasure algorithm. Using QuickWiper you can decide whether you want to wipe file names. Command line support. QuickWiper has build-in options to support a command line usage. - You can create a list of | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
115. | Kickstart 1.02 (westfaro.com) | ||
that inserts rows into a particular database as well as handling security, audit trails and locking. If you want to use that stored procedure as a standard template then you can do it manually, cutting, pasting, editing and testing or you can use Kickstart to do the tedious work for you in a few simple steps. Start Kickstart and point it the database you want to work with. Load your | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
116. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
117. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
118. | GreatCrypt 2.0 (miraxus.com) | ||
sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
119. | Identity Knight 1.3 (fspro.net) | ||
computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
120. | Incredi IE Manager 1.3 (iemanager.com) | ||
pictures , check spelling , favorites maintaining , link checker, security features , temporary internet files cleaning, new window maximizer, window customization, hide annoying flash movies and more ... Take total control over your browser. Make your web surfing faster, secure , private and flexible. Add Many Features to Internet Explorer 5.5 or higher with this easy to use but | |||
Updated: 9, 2005 | Rating: 0 | Author: George Valtchew | Size: 1723 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
|
Home > Security technology software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|