|
||||||
|
||
|
Home > Business security software |
Related keywords: security, business, Security, Business, small business, business plan, computer security, internet security, security software, Small Business |
|
|
181. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
182. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
183. | Clean Disk Security 7.54 (diskcleaners.com) | ||
be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
184. | Complete Cleanup 4.83 (softdd.com) | ||
As you browse the internet many websites store information about your browsing habits on your computer. Every webpage you browse is also stored on your machine, and this can allow anyone who shares your computer with you to snoop and view what type of websites you have been visiting. Complete Cleanup displays | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
185. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
Cresotech DesktopSafe is a convenient tool for safe storage of confidential information. It provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. Cresotech DesktopSafe protects your confidential | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
186. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
within the database can be password-protected, thus providing more security. Strong DES encryption algorithm and double password protection make sure that your confidential information is for your eyes only! PocketSafe also allows you to store information in several different files. It is quite handy to structure all the information you need for your employees, colleagues, kids or | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
187. | CryptoMite 2.00 (baxbex.com) | ||
utilities'! CryptoMite also includes some non-encryption security functions: Protects any exe-file with a password, hides folder and hides whole drives. CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with zip compression. Functions to build self-extracting encrypted zip files and eMail | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
188. | Directory Watch 4.0 (lohja-associates.com) | ||
This makes it possible for you to quickly and easily launch business processes. For example, you have a mail, fax, print, or web server that accepts request in forms of files. The server application then operates on these files. If something goes wrong or you have to many requests, you can react to them. You use the Directory Watch application to monitor a file system and | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Lohja | Size: 731 kb | Demo Go to category: System Utilities > Other Similar programs | |||
189. | Disk CleanUp 2000 4.6 (gregorybraun.com) | ||
deleted files. Deleting a file will normally just remove the file's directory entry, but the data itself still remains on the disk. CleanUp will completely eliminate the contents of your deleted files. Disk CleanUp provides options to specify an NSA approved disk erasure method and background execution priority. Disk CleanUp works with any FAT16 or FAT32 hard drive, as well as MS | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 721 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
190. | DriveScrubber 2.0a (iolo.com) | ||
operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Business security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|