|
||||||
|
||
|
Home > File folder security software |
Related keywords: security, file, folder, Security, File, file transfer, file management, Folder, file encryption, file manager |
|
|
161. | Password Saver 2.2.7 (pwdsaver.com) | ||
Office-like scheme where each database is stored in a single file. These files are compact and portable - they can be stored on hard drives, USB flash disks, floppy disks, CD-RW disks, ZIP drives, or any other type of fixed or removable media. You can take your passwords with you wherever you go! Also, since you no longer need to remember your passwords, you can | |||
Updated: 2, 2006 | Rating: 16 | Author: Eugene Olevsky | Size: 2188 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
162. | Path Lister 2.0 (xpertsolutions.ro) | ||
Lister lets you view a customizable listing of the contents for any folder on your computer. You can easily save the folder listing as TXT or PDF file. The Path Lister listing can be saved as a file that can be imported into most popular spreadsheets and database applications. Path Lister can also process information contained within a folder's | |||
Updated: 3, 2005 | Rating: 444 | Author: Xpert Solutions | Size: 1050 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
163. | PC Security 6.4 (tropsoft.com) | ||
before. Exercize total control over your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
164. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
165. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
166. | Privacy Master 3.9 (webroot.com) | ||
during your session is secured in encrypted and password protected files that are hidden from view. Close your session and your personal information vanishes and is instantly inaccessible to anyone but you. Because Privacy Master secures files where you normally keep them, there is no need to | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
167. | ProBot 2.5.0 (nethunter.cc) | ||
maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and configure the software | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
168. | ProBot SE 2.3.0 (nethunter.cc) | ||
to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
169. | Protect Folder 98 3.0 (everstrike.com) | ||
Folder 98 is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
170. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > File folder security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|