|
||||||
|
||
|
Home > File level security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
161. | System Shield 2.1c (iolo.com) | ||
people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
162. | TK8 Safe 2.5 (tk8.com) | ||
passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use interface allows you to find information quickly. You | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
163. | Too Many Secrets 0.3.1 (fdsoftware.it) | ||
password, authentication code, gaming code and organize them in a 2 level tree-structure with categories (eg.: Internet, Gaming, Work, Personal) and subcategories (eg.: EMail, Mailing List, Online Magazines can be subcategories of the Internet category). The Password File are encrypted with a proprietary method. You can print or export your password to various format | |||
Updated: 9, 2005 | Rating: 0 | Author: Francesco Duranti | Size: 1948 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
164. | Turbo WinMD5 0.42 (paehl.de) | ||
WinMD5 uses MD5 technology to check each file and notifies you of any potentially bad, corrupt, incorrect size or missing files to save you hours of downloading only to find you have 1 file missing or the last file has a checksum error. The CRC value comparison is done by using a standard SFV/MD5 file. If a SFV file is not available, you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Dirk Paehl | Size: 68 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
165. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
166. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
167. | Innovatools What's On My Computer 2.0 (whatsonmycomputer.com) | ||
this program that you've just downloaded from the Internet? Is it a virus? Is it legitimate software? Is it safe? Where can you find more information about it, or about the company that produced it? What are other people saying about it? Is it stable? Is it full of bugs? Where can you find an update? What about the programs that are running right now on your computer, or the ones | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1135 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
168. | Winalysis 3.1 (winalysis.com) | ||
for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP traps, email, scripts, the event log... Create user-defined audit | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
169. | Wincph encryption software 4.7 (keepsecret.net) | ||
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and folders in one encrypted archive. Ability to make self-decrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuxue Tu | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
170. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > File level security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|