|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
171. | BlowFish 2000 2.8 (gregorybraun.com) | ||
Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | Cartagio Pro 1.0.3.86 (missiontrek.com) | ||
reports, · Author marketable PBB knowledge projects, · Encrypt sensitive material · Interruptions? No problem - resume where you left off! Cartagio - Transforming Research into Knowledge. A must for all business applications where internet research costs money, Cartagio Pro provides powerful tools to efficiently collect, collaborate on and manage web information. A full | |||
Updated: 9, 2005 | Rating: 42 | Author: John Moetteli | Size: 4532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
173. | Case Converter 1.1 (replsoft.com) | ||
a Windows NT platform to Linux. This is actual because Linux is case-sensitive, both for file names and file content. Allow you to convert any words and even file names within content of files to lower or UPPER case. If you want to convert all file names to lower or UPPER case you no need to enter each name. You need enter only | |||
Updated: 9, 2005 | Rating: 0 | Author: ReplSoft Inc. | Size: 473 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
174. | Chameleon 2.0 (members.optushome.com.au) | ||
software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the Chameleon application on your files, you can email anything you | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
175. | CHAOS Shredder 3.0 (safechaos.net) | ||
disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
176. | Cleaner 1.1 (softcomplete.com) | ||
It is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that after | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | ComfortAir HVAC Software 4.0 (comfortair-software.com) | ||
easy to carry out and less prone to error and ommissions. Context sensitive Help illustrated by diagrams where appropriate, is provided at the click of a button. The program was developed as a multiple document interface (MDI), allowing the user to open and work on several projects simultaneously | |||
Updated: 2, 2006 | Rating: 79 | Author: Claon Rowe | Size: 1580 kb | Demo Go to category: System Utilities > Other Similar programs | |||
178. | Control Runner 3.10 (momsoftco.com) | ||
Control Runner will take care of it. Want to hide all your sensitive data from prying eyes? Just click on the panic button before leaving your desk. Whether you are a novice or a power computer user, you will enjoy the easy interface of Control Runner and benefit from its powerful management features. Volume discounts and site licenses are available. To obtain a full working | |||
Updated: 9, 2005 | Rating: 0 | Author: Manuel Onate | Size: 2106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
179. | Crime Catcher 2.1 (crime-catcher.com) | ||
to allow you tune the settings to ensure movement detection is sensitive enough / too sensitive. Overlay text onto captured images; Overlay a caption / date and time onto the image. Write images to an AVI movie file; Easily combine captured images into a movie! Play sounds when motion is detected; Have a dog bark or another sound play to warn/welcome your | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
180. | Cryptgine Archiver 1.05 (infolocks.com) | ||
distributing sensitive files over the internet or storing sensitive files that are used infrequently, protect them with unbreakable and customizable security. The first in the Cryptgine application series, the Cryptgine Archiver creates file archives that are both compressed and/or encrypted. The encryption method used to secure the data can be the included 256 bit AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Info Locks | Size: 94264 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|