|
||||||
|
||
|
Home > Secure folders software |
Related keywords: secure, folders, Secure, hide folders, protect folders, Secure Shell, lock folders, secure delete, compare folders, synchronize folders |
|
|
141. | PowerKey 2.0 (gals1.chat.ru) | ||
It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption process. After it the encryption is done and you receive a file with the extension .pkey | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
142. | Privacy Master 3.9 (webroot.com) | ||
to multiple users making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from prying eyes. Powerful 128-bit encryption combined with a unique session-based program style provide the tools you need to secure your privacy on-line | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
143. | Private InfoKeeper 2.7 (ablazesoft.com) | ||
Private InfoKeeper is elegant, unique featured, powerful and secure innovative password management system. Private InfoKeeper allows you to keep passwords, commercial information, PINs, serial numbers and much more, including free text (notes) with automatic URL recognition. Unique web browser integration feature makes usage of password-protected Web pages much easier | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Jones | Size: 538 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
144. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and configure | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
145. | ProBot SE 2.3.0 (nethunter.cc) | ||
to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
146. | QuickWiper 7.6.3 (aks-labs.com) | ||
windows deletion, wipe files with single pass wiping or use most secure NSA erasure algorithm. Using QuickWiper you can decide whether you want to wipe file names. Command line support. QuickWiper has build-in options to support a command line usage. - You can create a list of files, then send it to QuickWiper and do wiping operation. - You can configure QuickWiper to wipe | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
147. | R-Wipe & Clean 5.1 (r-tt.com) | ||
The utility wipes files and unused disk space using either fast or secure erase algorithms. All files and folders may be combined in wipe lists to erase them in a single procedure. Supports both the FAT and NTFS file systems. All separate wiping and cleaning tasks can be combined in one or more erasing procedures launched immediately or at predefined times or events as a | |||
Updated: 9, 2005 | Rating: 381 | Size: 1607 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
148. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
unattended and automatically to regularly save important data securely off-site. A versatile scheduler launches the online backup Client, usually at night when computers are not being used. It compresses and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
149. | Recover4all Professional 2.26 (recover4all.com) | ||
music etc. - Can recover from formatted drives and within deleted folders. - Supports all NTFS and FAT files systems, all kinds of compressed drives and files, Windows ME/XP protected files, all RAID levels, all third party encrypted drives not encrypted by Windows. - Supports long filenames in | |||
Updated: 9, 2005 | Rating: 48 | Author: Advanced Utilities GmbH | Size: 386 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
150. | SafeBox Industry 1.0 (aidsoft.com) | ||
presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secure folders software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|