|
||||||
|
||
|
Home > Secure folder software |
Related keywords: secure, folder, Folder, Secure, hide folder, lock folder, Secure Shell, protect folder, secure delete, folder guard |
|
|
131. | PalmTree 3.3 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
132. | Password Agent Lite 2.3.1 (moonsoftware.com) | ||
numbers and other textual data in a single, easy to navigate and secure database. You'll only need to remember one master password that gives access to the database. Password Agent will also help you to fill login prompts on web sites automatically. All information is grouped similar to folders on disk and it is very easy to find, even user interface is similar to Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahto Tanner | Size: 1305 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
133. | PC Optimizer 1.00 (aidsoft.com) | ||
Registry. Registry defrag optimizes registry by defragging it. Secure Delete Files and Folders : Secure Delete lets you safely erase deleted data so it cannot be recovered again. Securly Delete the Disk Drives, free disk space, unused folder entries, or complete disk wipe using secure algorithms. Fix PC problems and prevent them from happening again | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 178700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
134. | PC Security 6.4 (tropsoft.com) | ||
with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to use | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
135. | PowerKey 2.0 (gals1.chat.ru) | ||
It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a file with the extension .pkey | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
136. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and configure | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | ProBot SE 2.3.0 (nethunter.cc) | ||
to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | QuickWiper 7.6.3 (aks-labs.com) | ||
windows deletion, wipe files with single pass wiping or use most secure NSA erasure algorithm. Using QuickWiper you can decide whether you want to wipe file names. Command line support. QuickWiper has build-in options to support a command line usage. - You can create a list of files, then send it to QuickWiper and do wiping operation. - You can configure QuickWiper to wipe | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
139. | R-Wipe & Clean 5.1 (r-tt.com) | ||
The utility wipes files and unused disk space using either fast or secure erase algorithms. All files and folders may be combined in wipe lists to erase them in a single procedure. Supports both the FAT and NTFS file systems. All separate wiping and cleaning tasks can be combined in one or more erasing procedures launched immediately or at predefined times or events as a | |||
Updated: 9, 2005 | Rating: 381 | Size: 1607 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
140. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
Folders makes any folder you choose and all the files in that folder completely invisible to others, even on the network! Your invisible folders and files can't be deleted, viewed, modified, or run. For all practical purposes they don't exist. Use Magic Folders to protect your finances, taxes, and personal documents. Others won't know these files exist | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secure folder software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|