|
||||||
|
||
|
Home > Computer privacy software |
Related keywords: privacy, computer, internet privacy, computer security, Privacy, computer game, online privacy, Computer, privacy software, computer software |
|
|
141. | GreatCrypt 2.0 (miraxus.com) | ||
protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
142. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
machine to another. Now included with Icon Lock-iT XP is Moon Valley's Security Suite which includes a Password Assistant and System Security Check. These new features will help the user construct a computing environment free of external threats. Includes many features designed for home | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
143. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
powerful yet safe tool optimizes your registry, cleans your computer of useless data, and backs up your important system files. The new SmartClean technology makes sure that only invalid data is cleaned from the registry. Innovative System Optimizer adapts its scanning process to your version of Windows so that no programs are affected by its operation. Safety and security were our | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
144. | LockEXE 2.0 (mazepath.com) | ||
you choose will only work with your password! Protect your computer and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the | |||
Updated: 9, 2005 | Rating: 16 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
145. | Easy Remover 2004 Lite 3.0 (r4u-soft.com) | ||
for Uninstall Applications, StartUp Manager, Task Manager and Privacy Manager. It's new and one of the best ways to totally control your computer and make system more stable. You can easily and safely uninstall programs, allows you to inspect and control the programs that run automatically on startup, lists and controls all currently running processes, protects your | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3946 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
146. | Easy Remover 2004 Pro 3.0 (r4u-soft.com) | ||
is a program able to completely cleanup, uninstall, manage your computer, and protect your privacy? We have the solution: Easy Remover 2004 Pro v.3.0! Completely uninstalls programs, detects phantom programs, startup manager, task manager, and a privacy keeper for Windows and most used browsers. The 4 utilities available can provide a total management of your | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3074 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
147. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
148. | File Monster 2.6.7 (nstarsolutions.com) | ||
really been erased. As a result, anyone with a little knowledge of computers can very easily recover the information you thought was erased. To take your privacy a step further, File Monster also overwrites the original file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
149. | FileLocker 2.1 (lockyourfiles.com) | ||
FileLocker allows you to hide and encrypt your private or sensitive files using 128bit encryption, while providing an easy to use interface. Locked files can be opened quickly and easily within FileLocker using your system default application for the file type you are opening. Enhanced search and import | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Rivers | Size: 17500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
150. | Cookie Editor 1.9.1 (proxoft.com) | ||
cookies. Cookie Editor allows you to maintain the level of your privacy by allowing you to see, edit, block or delete any unwanted cookies. It also allows viewing and deleting browsing history. It searches your computer for cookies then displays them in easy grid-like format. You can examine | |||
Updated: 9, 2005 | Rating: 42 | Author: Adam Zgagacz | Size: 998 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Computer privacy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|