|
||||||
|
||
|
Home > Find protected software |
Related keywords: find, Find, find and replace, password protected, FIND, ebay find, auction find, file find, protected, find email |
|
|
181. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
182. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
EF Duplicate Files Manager is a useful program that help you to find out and remove duplicate files with same name, same size, same content on specify paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In the simplest | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
183. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
184. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely eliminate sensitive data! Evidence Killer 2005 completely eliminates all hidden evidence of activites on | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
185. | File & Folder Protector 2.33 (softheap.com) | ||
Protect Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
186. | FileMonkey 10.22 (monkeyjob.com) | ||
file or directory names to uppercase, lowercase or propercase. Find keywords inside files using the local search engine. Create batch jobs and add strings to file names. Append data to the start or end of file contents. Encrypt and decrypt files. Edit last accessed, created and modified date and time stamps. Increase or decrease date and time stamps. Extract text from within files | |||
Updated: 2, 2006 | Rating: 61 | Author: monkey job | Size: 2098 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
187. | FolderAccess 2.0 (lockfolder.net) | ||
sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
188. | FolderClone 1.5.7 (folderclone.com) | ||
businesses (SOHO), and large corporations. Individual users will find FolderClone essential for backing up their data files and/or synchronizing their laptops to their desktops. For large enterprises and small businesses alike, FolderClone is part of the network infrastructure needed to maintain high file availability, protect your files, and share files throughout your | |||
Updated: 2, 2006 | Rating: 16 | Author: Salty Brine Software | Size: 291 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
189. | GreatCrypt 2.0 (miraxus.com) | ||
an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
190. | Handy Backup 2.1 (backup.novosoft-us.com) | ||
and zip compression on the fly and many other features will protect your valuable data. Detailed online help is available. Intuitive Explorer style user interface You'll find Handy Backup extremely easy-to-use due to its simple Explorer-like user interface. Smart Setup Wizard and online help will guide you through all the steps of creating and managing backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Vaschenko | Size: 1449 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Find protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|