|
||||||
|
||
|
Home > Interviewing techniques software |
Related keywords: techniques, dj techniques, deejay techniques, memory techniques |
|
|
161. | Hider 1.1 (amosoft.net) | ||
Hider is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
162. | HSLAB Sys Monitor Lite 1.0 (hs-lab.com) | ||
(up to eight); Number of network connections to your computer's resources ; Number of the users, connected to your resources; Number of computers, connected to your resources; Number of computers in your workgroup or domain; Incoming and outgoing traffic of your computer; And many other useful parameters.. HSLAB Sys Monitor can alert you on change of the relevant system | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 2202 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
163. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
164. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
This powerful yet safe tool optimizes your registry, cleans your computer of useless data, and backs up your important system files. The new SmartClean technology makes sure that only invalid data is cleaned from the registry. Innovative System Optimizer adapts its scanning process to your version of Windows | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
165. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
LinkFerret-Remote is an efficient, easy to use, low cost, high performance Ethernet/802.11B/G monitoring tool. Network admins may use it in scripts to periodically sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
166. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
167. | DustBuster 2.8.2 (casperize.com) | ||
up disk space simply and securely in no time, enhancing your system's performance, so you can focus on what's really important to you DustBuster is a garbage file removing utility for Microsoft Windows operating systems. It searches for junk files and temp files that are of no use and are just taking space on your hard | |||
Updated: 9, 2005 | Rating: 179 | Author: Casper&McAlba Casper&McAlba | Size: 302 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
168. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
169. | Find Protected 2.0 (aks-labs.com) | ||
you with up-to-date information about the best password recovery techniques. You can download the evaluation Find Protected from www.findprotected.com The single user license is available for 180 US$. Search for password protected files on local disks and across a network. Find Protected addresses the security problems associated with unauthorized or illegal use of confidential | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
170. | EzCrypt+ 2.01 (kmgi.com) | ||
Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress. “Encrypt and e-mail” option allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Interviewing techniques software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|