|
||||||
|
||
|
Home > Desktop security software |
Related keywords: security, desktop, Security, Desktop, desktop utility, desktop enhancements, computer security, internet security, security software, desktop publishing |
|
|
151. | East-Tec File Shredder 1.0 (east-tec.com) | ||
recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
152. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
153. | FitoNT 1.0.0.0 (netnet.ca) | ||
today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers, unexpected hard drive or hardware crashes, and any other dangers that | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
154. | Genie Backup Manager 4.0 (genie-soft.com) | ||
any storage device, with spanning, scheduling, compression and security options.. You can protect all your data including files and folders, e-mail data and settings of some of the most commonly used clients (Outlook Express, Microsoft Outlook, Eudora, MSN 8), Windows settings, Registry, Internet Explorer settings, Fonts, Favorites, Windows Address Book, Desktop and more | |||
Updated: 9, 2005 | Rating: 124 | Author: Muayyad Shehadeh | Size: 5575 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
155. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
156. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
157. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can repeat this cycle as often as needed! One mouse-click, and your open, visible application windows can be hidden from your desktop, taskbar, and the ALT+TAB keystroke combination. Additionally, the CTRL+ALT+DEL | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
158. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
159. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
sub-directories. Idem will check and copy files or folders security information ie ACL permissions on NTFS partitions and files and folders attributes ie hidden, system, archive, etc. Synchronize and transfer data across local or network drives each time that existing files are modified in original folders or on newer files are created. Idem detects changes and will copy or | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
160. | IIPwr Package 2.00 (iipwr.com) | ||
own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Desktop security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|