|
||||||
|
||
|
Home > Encrypt prevent software |
Related keywords: encrypt, prevent, Encrypt, file encrypt, encrypt file, ENCRYPT, encrypt visual basic, encrypt html, encrypt pdf, encrypt email |
|
|
111. | Groone's Macroer 2.6 (groonesworld.com) | ||
~Secured access to the Password Store interface. ~Tightly encrypted storage of program usernames and passwords ~Small and compact database to prevent those prying eyes ~Multi-user capability on the same PC and across the LAN. ~Handy Tips. ~Password creation utility to assist and use proper techniques when creating passwords. ~Top of the line web based and email | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
112. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
113. | HDD Temperature 1.3 (hddtemperature.com) | ||
why servers and computers have coolers, fans and other gadgets that prevent overheating. But as fans get plugged, coolers stop working, or too many hard-drives get added - the risk of "frying" your HDDs and losing data increases drastically. So how do you monitor your HDD temperature to make sure | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
114. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
115. | Identity Knight 1.3 (fspro.net) | ||
private data surely help this number grow. So, is there a way to prevent identity theft? Yes! There is! Introducing Identity Knight: the unique credentials protection software that makes sure that no data from the IE AutoComplete list is left unprotected! Identity Knight scans the IE AutoComplete data for credit card numbers, SSN, e-mails, postal addresses, and custom IDs. Once the | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | Internet History Eraser 5.5 (internet-history-eraser.com) | ||
Office to RealPlayer. The program protects your homepage by preventing annoying Web sites from changing the URL. You'll also have control over the kinds of files and Registry entries that are erased. Its secure erase function ensures that the data can never be recovered. All functions may be scheduled to be executed at user-defined intervals or at system startups and shutdowns | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin | Size: 1460 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
117. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
118. | JvCrypt 1.0 (vandaveer.com) | ||
encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
119. | Maxus SE 3.05 (neurobridge.com) | ||
the connection when it is not used or emulate network activity to prevent breaking the connection by your ISP. A traffic monitor is also included, which displays the real-time graph of bandwidth usage. The hotkeys manager lets you assign custom keyboard shortcuts to some of the routine Windows tasks | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
120. | Memory Optimizer 2002a (dmk.ca) | ||
your computer's RAM, making your computer run up to 200% faster, and preventing up to 90% of Windows crashes. Memory Optimizer is a user-friendly and customizable program that can run conveniently in the background to monitor and free up system RAM while you work. It uses advanced technology to automatically free up wasted RAM and allow your system to work more efficiently and with | |||
Updated: 9, 2005 | Rating: 73 | Author: DMK Corp. | Size: 467 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Encrypt prevent software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|