|
||||||
|
||
|
Home > Hand software |
Related keywords: hand rankings, hand odds, guiding hand, but important information close at hand, hand held |
|
|
171. | Sure Delete 4.1.9 (concentric.net) | ||
to choose speed/security ratio. If you have a lot of time on your hands you could use the most secure but also the most time consuming type of wiping. However if you are short on time, and all you need is to prevent half educated snoops from recovering your data then you don't need as much security and you can set Sure Delete to use a little less secure but faster method of | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael L | Size: 427 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
172. | SyncBack 3.2.7.0 (mjleaver.com) | ||
is where you'll fine-tune the software. Help is always close to hand if you run into difficulties. A comprehensive context sensitive help file provides easily accessible instructions and guidance about all aspects of using SyncBack. Simply click a help button at the bottom of the window you happen to | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
173. | System Shield 2.1c (iolo.com) | ||
dire consequences should it "accidentally" fall into the wrong hands. System Shield uses methods approved by the US Department of Defense (DoD 5220.22) to ensure that ALL files that have been deleted are permanently disposed of, beyond ALL possible techniques of recovery. It works by proactively finding files that have been deleted (which will still remain on your system) and | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
174. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
and you can create and print "One Time Pads" for use in secure hand written correspondence. The strength of Top Secret Crypto Gold rests on three basic concepts: 1. a true source of random bits which is provided by the program, 2. a very large key space for the pseudo random number generators, and 3. a simple encryption formula. The RSA key sizes range from 480 to 16,384 | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
175. | Total Control 2.3 (icxr.com) | ||
Windows 98/98SE/ME. Hundreds of hidden settings are in your hands now in a unique easy to use graphical user interface (GUI). More than 250 useful settings in 10 panels, will boost Windows 9x/ME by 40% and triple Internet speed. Total Control is based on "system secure" principles, which means that respects your system's safety by performing several tests before applying any | |||
Updated: 9, 2005 | Rating: 0 | Author: Panos Koutsoukeras | Size: 2356 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
176. | UnWrap 1.7 (WindowsUtilities.com) | ||
such as From: or Subject:. Quit cleaning unwanted line-returns by hand - use UnWrap to speed up the transfer with clean text. - Removes e-mail wrapped lines and reply prefix characters - User options select the type of clean up - Starts with text from the Windows clipboard and exits with cleaned text in the clipboard - Cleans sections of text and appends the results to a file | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Snyder | Size: 2193 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
177. | RemoteKeys 8.7.2 (freewarehits.de) | ||
memory and a clipboard history function. RemoteKeys is always at hand in the systemtray, can be individually configured (button-, form-, fontsizes and -colours), is network-able, offers database access and requires no installation. (Engl./Ger./French with manual). Automate complex control systems as | |||
Updated: 9, 2005 | Rating: 0 | Author: Detlev Schaefer | Size: 1582 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
178. | Secure Disk 1.1 (wekasoft.com) | ||
to user which make it much easy and convenience for both old hands and the newbie. Some features of SecureDisk: The best and proven cryptographic algorithm will make your encrypted disk military strong. Very fast encryption. You may even not notice the time it used. Easy to use. Both the creation of a new container and the mount process are very simple. Support | |||
Updated: 9, 2005 | Rating: 0 | Author: weka zhang | Size: 1682 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
179. | SIGuardian 1.7.335 (siguardian.com) | ||
Learn about HDD failure BEFORE it happens and save your valuable data. SIGuardian uses S.M.A.R.T technology built in every modern hard-drive to accurately predict the date when using a particular hard-drive is no longer safe. S.M.A.R.T. stands for Self-Monitoring, Analysis and Reporting Technology. Every | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 1221 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
180. | PalmTree 3.3 (clickok.co.uk) | ||
Password protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Hand software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|