|
||||||
|
||
|
Home > Sensitive files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, sensitive, delete files, recover files |
|
|
121. | Puffer 4.02 (briggsoft.com) | ||
purpose 256-bit AES encryption utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
122. | QuickWiper 7.6.3 (aks-labs.com) | ||
is a disk and file wipe utility. QuickWiper allows to wipe files in handy manner. Wiping free disk space option protects all the files you ever delete before beginning using QuickWiper. System Clearer clears in one-click cookies and history, IE cache and typed URLs, temporary and recent files. QuickWiper has several security modes. You can use | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
123. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
124. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
125. | Odyssey 1.14 (sorcerersoftware.com) | ||
Odyssey search your computer for any file or for words or phrases that are in any file on your computer. Search using AND, NOT, and OR boolean operators. Perform either case sensitive or insensitive searches. Search any or all file types, even exe and dll files. Once the files are searched or located, Odyssey displays in a list box all files | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Kneeland | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
126. | GreatCrypt 2.0 (miraxus.com) | ||
is a powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
127. | Hara-Kiri 2.02 (cyteg.com) | ||
data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with utilities like "UnErase" | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
128. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
129. | Lock Folder 5.0 (realclicks.com) | ||
Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
130. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Sensitive files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|