|
||||||
|
||
|
Home > Secure transfer software |
Related keywords: secure, transfer, file transfer, Secure, Secure Shell, secure delete, transfer files, secure files, secure deletion, secure file |
|
|
161. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
confidential information. It provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. Cresotech DesktopSafe protects your confidential information from being viewed. Instead of memorizing | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
162. | Data Destroyer 1.5 (braintwist-studios.com) | ||
all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with Windows merely removes the file system's pointer to the file, all the data remains on your hard drive or floppy disk. The remaining data can be easily recovered with data recovery or forensic software. Your | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
163. | Desktop Scout 4.0 (globalpatrol.net) | ||
own workstation. You can even watch or control the users desktop, transfer files, start and stop programs, launch web sites and documents, log off, restart or shutdown the computer remotely. Beyond surveillance, Desktop Scout allows you to block access to any program, document or web site based on | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
164. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
165. | Email Audit 3.2 (km-vision.com) | ||
relatives so that mails originating from your Whitelist contacts are secured. Features of Email Audit: Works on Microsoft Outlook 2000/XP/2003. Intuitive User Interface Build your own Whitelist of contacts Build your Blacklist contact Bar Blacklist Domains Reliable built-in Spam filters & | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
166. | FastSum 1.9 (fastsum.com) | ||
how to run FastSum. You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD burning, software errors and much more. FastSum calculates short and strong digests of your data via MD5 algorithm to use it as references checksums for ulterior data | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
167. | FileVault 3.0 (networktoolz.com) | ||
Secure your images, movies, passwords, favourites etc. in fact any file or files. Securely delete files or directories and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files that conceal | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
168. | Floppy Image 2.3.3 (rundegren.com) | ||
image files of floppy disks and back (for backup, shipping or transfer). Save the image file compressed, uncompressed or as a self-extracting exe. Add descriptions to or convert your old image files. Supports DMF and other non-standard formats. Logically recreate bad sectors when writing floppy disks, allowing for an exact duplicate of your source disk to be created. The | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 814 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
169. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and notebooks. Protection works even if files are taken | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
170. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Secure transfer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|