|
||||||
|
||
|
Home > Sensitive information software |
|
|
171. | CHAOS Shredder 3.0 (safechaos.com) | ||
disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
172. | Secure Hive 1.1.0.0 (securehive.com) | ||
etc. Secure Hive offers the enterprise a method of: Securing sensitive documents Protecting information during transfer Securing emails Securing portions of a document (e.g. individual graphics or clauses in a contract) Protecting the integrity of your company by | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Morrow | Size: 986 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
173. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
hiding windows you have the freedom to protect your privacy and hide sensitive information from praying eyes.For example,you hide some selected programs by pressing hotkey.At a later time you will be able to return all hidden windows back to the desktop and continue your work.And you also can | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
174. | Privacy Keeper 7.0.1 (pimasoft.com) | ||
activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not | |||
Updated: 9, 2005 | Rating: 207 | Author: G Larson | Size: 67800 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
175. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 207 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Similar programs | |||
176. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
|
Home > Sensitive information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|