|
||||||
|
||
|
Home > Files security software |
Related keywords: security, files, Security, computer security, internet security, hide files, security software, Files, PDF files, compare files |
|
|
131. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like. You can have the | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
132. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
to BMP, JPG, GIF formats with several options, saves text content to file, send text content to keyboard to emulate keystrokes (i.e.: saves time when have to enter long codes, etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
133. | MobileAssistant 1.7.312.78 (flat2serv.de) | ||
you make every PC your own. Use your personal favourites, My files - your home desktop any time on every other PC. When you log in you can use your personal datas from every application, your explorer-favourites, in fact. After leaving, the settings of the system will be neglected and it looks like you never used this PC. And all without tiresome copying and in real time! However | |||
Updated: 2, 2006 | Rating: 0 | Author: Sven Schmidts | Size: 1008 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
134. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
metadata from MS Office, PDF, HTML, Adobe files, IPTC info from jpeg and tif images into XML, CSV, Word files or HTML pages without programming. Set file properties via mass update function for MS Office and NTFS Windows 2000 files. You will easily Catalog and retrieve: MS Office documents: Application name, Title, Author, Subject, Keywords, Template | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
135. | Kryptel 5.31 (kryptel.com) | ||
is a drag-and-drop file encryption and backup program, protecting your data with a number of strong encryption algorithms. The program provides a one-click security solution and can process any number of files or folders in a single operation. Kryptel can be run in unattended batch mode and can be used to automate encryption tasks. The package contains a tool for | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
136. | Kryptel 5.31 (bestcrypto.com) | ||
is a drag-and-drop file encryption and backup program, protecting your data with a number of strong encryption algorithms. The program provides a one-click security solution and can process any number of files or folders in a single operation. Kryptel can be run in unattended batch mode and can be used to automate encryption tasks. The package contains a tool for | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
137. | Keylogger Hunter 2.1 (styopkin.com) | ||
by Hook-based keyloggers. The result of such process is an empty file of the keylogger, which by no means can contain data about pressed keys. Use of Keylogger Hunter allows you to be less dependent on freshness and completeness of the antivirus database, which can possibly contain no information about a rare version of a keylogger. Thus, you have an opportunity to install on your | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
138. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
139. | ID_Bank 1.24.13 (rainbow-innov.co.uk) | ||
else can read. Your information is stored in a secure encrypted file, all you need to remember is one password to access it. ID_Bank includes the following features: В· Store your passwords and ID data in named files, you are not limited to one file that must contain all your data В· Your data is encrypted using the Rijndael 128 bit encryption algorithm. В· Group | |||
Updated: 2, 2006 | Rating: 0 | Author: John Hudson | Size: 1546 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
140. | Hide Files 3.4 (hide-files.biz) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Files security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|