|
||||||
|
||
|
Home > Security utilities software |
Related keywords: security, utilities, Security, Utilities, computer security, internet security, security software, information security, SECURITY, internet utilities |
|
|
131. | Cache & Cookie Washer 4.5 (webroot.com) | ||
Cache & Cookie Washer is the award winning privacy and clean-up utility that eliminates all these tracks from your computer! Cleaning up the history of your activities can be a tedious chore of manually removing each history file or entry. If privacy and disk space are to be maintained, this process must be performed every time you use your computer. Cache & Cookie Washer makes | |||
Updated: 3, 2005 | Rating: 100 | Author: Steve Thomas | Size: 1185 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
132. | CHAOS Messenger 4.0 (safechaos.net) | ||
Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
133. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
Self-Decryptor is the utility program that creates self-decrypting chaos files for Windows. Self-decrypting chaos files are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
134. | Chaperone 4.0 (css-software.com) | ||
is the ultimate access control utility for both the home and office. Packed with features it is based on the premise that there are users who shouldn't have complete access to the computer all the time. Using advanced scheduling techniques completely control of how and when the computer is used is easily obtained. Most common methods of controlling what programs can be run are | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
135. | Crypto 2000 4.2 (gregorybraun.com) | ||
is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in the taskbar notification tray. Crypto is a small, easy to use, file encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
136. | CryptoMite 2.00 (baxbex.com) | ||
forever and cannot be restored even with so called 'Undelete utilities'! CryptoMite also includes some non-encryption security functions: Protects any exe-file with a password, hides folder and hides whole drives. CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with zip compression | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
137. | Crypton 1.0 (uic.nnov.ru) | ||
is a multi-utility security suite, which provides strong security for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
138. | Data Destroyer 1.5 (braintwist-studios.com) | ||
contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with Windows | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
139. | Data Stash 1.5 (skyjuicesoftware.com) | ||
Stash is an award-winning clever little security tool that allows you to hide sensitive data files within other files. Select a large bitmap or database file (or any file you'd like to use) as a receptacle, then add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains fully functional. Password protection is also provided, using Blowfish | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
140. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Security utilities software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|