|
||||||
|
||
|
Home > Encrypted disk software |
Related keywords: disk, encrypted, Disk, hard disk, disk utility, disk space, DISK, disk backup, hard disk encryption, disk cleaner |
|
|
141. | Backup Plus 7.7.1 (avantrix.com) | ||
the ability to to backup to just about any device including floppy disk, Zip drives, Jaz Drives and even formatted CDRW/DVDRW media discs. Backup Plus comes complete with the easy to use and Explorer like Restore Manager for quick restore operations in case of a computer disaster. It also comes with | |||
Updated: 9, 2005 | Rating: 16 | Author: AVANTRIX Inc. | Size: 5128 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
142. | BCWipe 3.07.2 (jetico.com) | ||
that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
143. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
of BitZipper's dominant strengths is its built-in support for ACE, ARC, ARJ, BH, CAB, GZ, JAR, LHA, LZH, RAR, TAR, TGZ, UUE, WAR, XXE, Z, ZIP and ZOO files; no third-party products are needed. You can access almost every compressed file with just this one tool. No need for additional software applications; no wasted expense. Another one of BitZipper's strengths is that it | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
144. | BKS 3.2.4.30 (backup2001.com) | ||
the growing size of hard disks, the availability of external drives using USB connection at affordable price, synchronization of data becomes a real need for computer users as well for a professional environment as for home computing. Backup2005 Synchronizer can be used to synchronize data between two computers. If you work on 2 computers ( e.g. a desktop and a notebook computer) | |||
Updated: 2, 2006 | Rating: 16 | Author: RD Technologies | Size: 4664 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
145. | Bonodi XML Editor 2.12 (zero.ad.jp) | ||
programs. Keyboard shortcut keys can be customized. Bonodi's search feature facilitates searching XML document(s) by XPath pattern and other search methods available in Bonodi. Bonodi's search feature can be applied to an opened XML document, or all opened XML documents, or all XML files in one or more folders. Numbers of various operations can also be applied to | |||
Updated: 9, 2005 | Rating: 39 | Author: Yuji Ichikawa | Size: 3788 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
146. | Canary Standard 2005.01.28 (11) (alphalink.com.au) | ||
Discover how this monitoring program will help you monitor what your child does when using the home computer (programs run, files printed, programs installed,...), and while surfing the Internet (web sites visited, files downloaded, emails sent,...). Each order comes with a FREE report that contains more than | |||
Updated: 9, 2005 | Rating: 16 | Author: Serge Botans | Size: 848 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
147. | CD-DVD Lock 2.01 (getfreefile.com) | ||
as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know. Your data on your media are not going to be encrypted or altered in any way, therefore if you forget your password | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
148. | CDLock 1.4 (protect-me.com) | ||
you set up rules for the local computer, defining when any removable disks which support auto-eject feature can be used and by whom. You can control access to any removable disks, such as CD-ROMs, optical disks, or anything else depending on the time of day and day of week. CDLock even allows controlling access to the Audio CDs so you can build secure but user-friendly | |||
Updated: 8, 2004 | Rating: 16 | Author: Ashot Oganesyan | Size: 749 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
149. | Chameleon 2.0 (members.optushome.com.au) | ||
from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
150. | CHAOS Shredder 3.0 (safechaos.net) | ||
does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Encrypted disk software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|