|
||||||
|
||
|
Home > Sensitive files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, sensitive, delete files, recover files |
|
|
111. | BestCrypt 7.20.2 (jetico.com) | ||
(container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
112. | BlowFish 2000 2.8 (gregorybraun.com) | ||
is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
113. | Cartagio Pro 1.0.3.86 (missiontrek.com) | ||
and documents, · Add documents, correspondence, images, sound files etc. to your projects, · Record team research time for client billing/statistics reports, · Author marketable PBB knowledge projects, · Encrypt sensitive material · Interruptions? No problem - resume where you left off! Cartagio - Transforming Research into Knowledge. A must for all business | |||
Updated: 9, 2005 | Rating: 42 | Author: John Moetteli | Size: 4532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
114. | Case Converter 1.1 (replsoft.com) | ||
you to convert any words and even file names within content of files to lower or UPPER case. If you want to convert all file names to lower or UPPER case you no need to enter each name. You need enter only extension. It very useful if you need to to move all of our hosted domains from a Windows NT platform to Linux. This is actual because Linux is case-sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: ReplSoft Inc. | Size: 473 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
115. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
116. | CHAOS Shredder 3.0 (safechaos.net) | ||
does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
117. | Cleaner 1.1 (softcomplete.com) | ||
is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
118. | Crime Catcher 2.1 (crime-catcher.com) | ||
to allow you tune the settings to ensure movement detection is sensitive enough / too sensitive. Overlay text onto captured images; Overlay a caption / date and time onto the image. Write images to an AVI movie file; Easily combine captured images into a movie! Play sounds when motion is detected; Have a dog bark or another sound play to warn/welcome your | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
119. | Cryptgine Archiver 1.05 (infolocks.com) | ||
distributing sensitive files over the internet or storing sensitive files that are used infrequently, protect them with unbreakable and customizable security. The first in the Cryptgine application series, the Cryptgine Archiver creates file archives that are both compressed and/or encrypted. The encryption method used to secure the data can be the | |||
Updated: 9, 2005 | Rating: 0 | Author: Info Locks | Size: 94264 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
120. | Crypto 2000 4.2 (gregorybraun.com) | ||
is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in the taskbar notification tray. Crypto is a small, easy to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Sensitive files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|