|
||||||
|
||
|
Home > File level security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
131. | FileWrangler 5.30 (cursorarts.net) | ||
is the complete file management system for Windows. FEATURES: - Multiple file listing windows; - Integrated ZIP and Unzip (including disk spanning and self-extracting, read and write Windows CAB files, or create encrypted LOK format archives. You may view and run programs and documents without extracting, etc.); - Security options to hide | |||
Updated: 9, 2005 | Rating: 16 | Author: CursorArts Company | Size: 2893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
132. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
133. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
134. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
135. | Desktop Scout 4.0 (globalpatrol.net) | ||
to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
136. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | DriveScrubber 2.0a (iolo.com) | ||
wipe all data from any hard or floppy drive, regardless of its file format or operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
138. | Anti-Trojan Shield 2.1.0.14 (atshield.com) | ||
Java applets. It efficiently scans, detects, and removes malicious files, while maintaining an exceptional level of personal privacy and security. Without this tool, you definitely should worry about new Trojan horses and viruses, but with Anti-Trojan Shield you have no need for concern. Its integrated update utility always keeps the software on the cutting edge, fully | |||
Updated: 9, 2005 | Rating: 280 | Author: ATShield Team | Size: 6366 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
139. | AntiSpy 2.11 (softvers.com) | ||
history to network logons history, history of opened and searched files, temp files and swap file. Works on all Windows platforms. In browsers it can clear Cookies, Downloaded Program Files, index.dat files, Plug-ins, cache, location bar history and more. Supports exclude lists and filters by date.It even supports secure wipe\shred files | |||
Updated: 9, 2005 | Rating: 34 | Author: DevelopEx _ | Size: 1231 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
140. | Innovatools Audit MP3s 1.5 (whatsonmycomputer.com) | ||
free from illegal, obsolete, unwanted or unneeded MP3 and media files and from viruses and trojans. Prevent RIAA (Recording Industry Association of America) lawsuits against you, your family or company. Innovatools Audit MP3s allows you to easily see the MP3 and other media files you have on your computer, on any drive, folder, MP3 CD, ZIP or other removable disks, or on | |||
Updated: 9, 2005 | Rating: 0 | Author: Dominic Dan | Size: 784 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > File level security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|