|
||||||
|
||
|
Home > Sensitive files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, sensitive, delete files, recover files |
|
|
161. | bed 0.2.23 (bed.dse.nl) | ||
past, undo, redo, search, replace, marks, record/play and context sensitive help. Edit rawdisk devices. Edit binary files. Dataformats: ascii, unsigned (base 2-36: bin,oct,dec,hex,etc) and signed integers, float, bitflags, bitfields, labels, ebcdic, time_t and structures of datatypes. Different sizes and byte ordenings. Edit hard disk | |||
Updated: 9, 2005 | Rating: 16 | Author: Jaap Korthals Altes | Size: 380 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
162. | BestCrypt 7.20.2 (jetico.com) | ||
(container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
163. | BlowFish 2000 2.8 (gregorybraun.com) | ||
is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
164. | Cartagio Pro 1.0.3.86 (missiontrek.com) | ||
and documents, · Add documents, correspondence, images, sound files etc. to your projects, · Record team research time for client billing/statistics reports, · Author marketable PBB knowledge projects, · Encrypt sensitive material · Interruptions? No problem - resume where you left off! Cartagio - Transforming Research into Knowledge. A must for all business | |||
Updated: 9, 2005 | Rating: 42 | Author: John Moetteli | Size: 4532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
165. | Case Converter 1.1 (replsoft.com) | ||
you to convert any words and even file names within content of files to lower or UPPER case. If you want to convert all file names to lower or UPPER case you no need to enter each name. You need enter only extension. It very useful if you need to to move all of our hosted domains from a Windows NT platform to Linux. This is actual because Linux is case-sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: ReplSoft Inc. | Size: 473 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
166. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
167. | Cleaner 1.1 (softcomplete.com) | ||
is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
168. | AceBackup 2.1.3 (hello-engines.com) | ||
location, and the ARCHIVE function which you can use to assign your files to any new folders you like. For your safety, AceBackup supports several encryption algorithms (up to 256 bit). That way no unauthorized person can access your sensitive data during backup. Archive backups can also be | |||
Updated: 9, 2005 | Rating: 53 | Author: AceBIT GmbH | Size: 5199 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
169. | Active Kill Disk - Hard Drive Eraser 2.0 (killdisk.com) | ||
that can be started using a DOS floppy disk. Access to the drive's data is made on the physical level via the Basic Input-Output Subsystem (BIOS), bypassing the operating systems logical drive structure organization. Regardless of the operating system, file systems or type of machine, this utility can destroy all data on all storage devices. Thus it does not matter operating | |||
Updated: 9, 2005 | Rating: 985 | Author: LSoft Technologies Inc. | Size: 252 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
170. | AD Search&Replace 1.9.3 (abroaddesign.com) | ||
Search&Replace will allow you to search for the files containing the line of symbols (with case sensitive or without it), specified by you, on folders tree (also support the network folders) and to replace a required line by another, specified by you. Besides you can open the found file by one mouse click. Search in ZIP archves are supported. AD Search&Replace will | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Nilov | Size: 773 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Sensitive files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|