|
||||||
|
||
|
Home > Security products software |
Related keywords: security, Security, computer security, internet security, security software, information security, sell products online, SECURITY, products, file security |
|
|
141. | AI RoboForm 6.5.3 (roboform.com) | ||
RoboForm is a utility that automatically fills in those ubiquitous Web-based forms. It adds form-filler hot buttons to Internet Explorer 4.x or Netscape 6--all you have to do is click the Fill Forms button. A wizard helps you create an identity that includes your name, address, phone number, e-mail address | |||
Updated: 2, 2006 | Rating: 0 | Author: Vadim Maslov Siber Systems | Size: 2000 kb | Shareware Similar programs | |||
142. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 207 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Similar programs | |||
143. | Aspose.Pdf For Java 1.0 (aspose.com) | ||
Aspose.Pdf For Java is a Java Pdf document reporting component. With it, you can: you to converting an existing XML file stream(.xml) plus a style-sheet file (.xsl) to a new a PDF file stream;Converting an existing FO file stream to a new PDF file stream;Creating new pdf document from scratch using API or XML | |||
Updated: 9, 2005 | Rating: 0 | Author: Ben Li | Size: 519 kb | Shareware Similar programs | |||
144. | Sticky Notes Std 5.0 (morun.net) | ||
hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Desktop notes are saved automatically. If the Recycle Bin option is on, deleted sticky notes are placed to the Recycle Bin and can be restored any time. Now you don't have to worry about your personal information being seen by others | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
145. | MoRUN.net Sticker 5.0 (morun.com) | ||
hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Desktop notes are saved automatically. If the Recycle Bin option is on, deleted sticky notes are placed to the Recycle Bin and can be restored any time. Now you don't have to worry about your personal information being seen by others | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
146. | Safe Express Free 3.4 (netsafesoft.com) | ||
What is the need for encrypting email messages you might ask yourself? But if any of your important messages get intercepted and read by other people, it could bring a lot of damage to you. This is where Safe Express comes into play. This software is a powerful, highly configurable, yet easy to use | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
147. | SynchroFolder 2.12a (sf.smsoft.ru) | ||
main purpose of this program product is to provide opportunity to synchronize contents of operating system folders. You may use it to synchronize folders on main and backup file servers, on mobile and office computers, on hard disk and removable media and in many other cases. The unique SynchroFolder | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Merzlikin | Size: 542 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
148. | iGo Incognito 1.2 (igo-incognito.com) | ||
iGo Incognito - the most secure instant messaging system available. iGo Incognito provides encrypted instant messaging, private chats and open forums. The iGo Incognito network is built on a combination of public key encryption and the US Advanced Encryption Standard (AES). If you want to be sure that | |||
Updated: 9, 2005 | Rating: 48 | Author: Paul Roigan | Size: 1541 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
149. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
150. | EasyHues Pro 2.1 (easytools.com) | ||
you answer “yes” to anyone of the above , then EasyHues Pro is the product you are looking for. EasyHues Pro helps you to generate color schemes and enhance your creativity. You can control and fine-tune the color generation and also randomize from 16 million colors. You can get the HEX value of colors with EasyHues, make layouts for your designs and save as bmp file. You can make | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 324608 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
|
Home > Security products software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|