|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
161. | QuickWiper 7.6.3 (aks-labs.com) | ||
wipe utility. With QuickWiper you can wipe free disk space and wipe sensitive files from you hard disk. QuickWiper provides quick and secure file wiping. You can use system cleaner to clear cache with | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
162. | Lock Folder XP 3.4 (everstrike.com) | ||
with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
163. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file shredder or file eraser that securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
164. | Odyssey 1.14 (sorcerersoftware.com) | ||
Search using AND, NOT, and OR boolean operators. Perform either case sensitive or insensitive searches. Search any or all file types, even exe and dll files. Once the files are searched or located, Odyssey displays in a list box all files which contain the requested search terms or the searched files | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Kneeland | Size: 152 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
165. | GreatCrypt 2.0 (miraxus.com) | ||
digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
166. | Hara-Kiri 2.02 (cyteg.com) | ||
the disk so that the perpetrator has no idea that there was once sensitive data on the disk! Uses: This program is useful in the case that your computer is stolen, Or if your computer is infiltrated by unwanted users. Imagine several situation, when "Hara-Kiri" may be useful for you: 1. Your PC is stolen Malefactor runs your computer with hope to profit by important | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
167. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
This makes it possible for professionals or enthusiasts to protect sensitive data while in transit from one machine to another. Now included with Icon Lock-iT XP is Moon Valley's Security Suite which includes a Password Assistant and System Security Check. These new features will help the user | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
168. | Lock Folder 5.0 (realclicks.com) | ||
with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
169. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
plans, your private files and e-mail messages, and all your other sensitive documents can easily fall into the wrong hands. East-Tec FormatSecure 2005, in addition to formatting a drive, securely wipes the data in order to eliminate all sensitive information beyond recovery. The product goes | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
170. | ECBackup 2.0 (softcomplete.com) | ||
of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc. ECBackup has a good degree of compression of your information - on the average in 1,5-2 times better than widely widespread archivers. The applied technology of open keys allows safely to store a public key | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|