|
||||||
|
||
|
Home > Secure information software |
|
|
161. | EldoS KeyLord 4.0 (eldos.org) | ||
KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
162. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
163. | EldoS PKI Tools 1.2 (eldos.org) | ||
such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you can pack files into ZIP archive, sign the archive and send it by e-mail by selecting one command in Explorer context menu. 2. Certificate Generator is a | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
164. | Find Protected 2.0 (aks-labs.com) | ||
associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
165. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
166. | EXEsafe 2 (members.aol.com) | ||
file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
167. | EZ Password Secure 1.2 (esmarttools.com) | ||
Password Secure is a powerful tool to help you manage all your passwords and usernames, as well as the URLs and descriptions, in different groups. Further more, EZ Password Secure can store all other personal information, e.g. bank accounts. Built-in Password Generator provides custom passwords. With the 1-Click function, you can paste the username&password to the | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
168. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
F-Secure Anti-Virus 2004 you can surf on the Internet, open e-mail attachments and use your computer without any fear of virus infections. You can also be sure that you are not sending viruses to others. Especially for home users and small offices without dedicated IT-staff, F-Secure Anti-Virus 2004 provides maintenance-free, easy-to-use protection against viruses | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
169. | File Encrypt 1.0 (livingastronomy.com) | ||
looking for. Feel more at ease with the knowledge that your private information is kept private. Do not delay, encrypt your files today! File Encrypt is a complete file encrypting program that even allows you to make your own keys! Rijndael encryption with a key size of 256 is used to provide quick and secure encryption. Encrypt your sensitive data | |||
Updated: 9, 2005 | Rating: 0 | Author: Jared Ricks | Size: 419 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
170. | File Monster 2.6.7 (nstarsolutions.com) | ||
completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Secure information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|