|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
201. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision. Anti-keylogger for Windows 2000/XP provides every computer with strong | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
202. | AnyWhere Pro 6.3 (liquidmirror.com) | ||
window, secure file delete to keep prying eyes away from your sensitive data, and the ability to replace text in many files at once. New version includes important bug fixes, performance enhancements, and a new Start Menu icon for getting started with AnyWhere 6 Pro. AnyWhere 6 Pro allows you to right click on files and folders to copy, move, zip, rename, and securely delete them | |||
Updated: 9, 2005 | Rating: 128 | Author: Mike Stevenson | Size: 1117 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
203. | Atomic Mailbox Password Cracker 2.00 (atompark.com) | ||
Atomic Mailbox Password Cracker is a software solution capable of recovering lost or forgotten mailbox passwords for the e-mail clients that work with mail servers using POP3 and IMAP4 protocols. The program is universal and is independent of the e-mail client work design. Current version has a user-friendly | |||
Updated: 9, 2005 | Rating: 95 | Author: Andrew Koptiaev | Size: 1370 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
204. | BCWipe 3.07.2 (jetico.com) | ||
will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted file continue to be stored on | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
205. | bed 0.2.23 (bed.dse.nl) | ||
past, undo, redo, search, replace, marks, record/play and context sensitive help. Edit rawdisk devices. Edit binary files. Dataformats: ascii, unsigned (base 2-36: bin,oct,dec,hex,etc) and signed integers, float, bitflags, bitfields, labels, ebcdic, time_t and structures of datatypes. Different sizes and byte ordenings. Edit hard disk | |||
Updated: 9, 2005 | Rating: 16 | Author: Jaap Korthals Altes | Size: 380 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
206. | BestCrypt 7.20.2 (jetico.com) | ||
(container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
207. | BlowFish 2000 2.8 (gregorybraun.com) | ||
Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
208. | Cartagio Pro 1.0.3.86 (missiontrek.com) | ||
reports, · Author marketable PBB knowledge projects, · Encrypt sensitive material · Interruptions? No problem - resume where you left off! Cartagio - Transforming Research into Knowledge. A must for all business applications where internet research costs money, Cartagio Pro provides powerful tools to efficiently collect, collaborate on and manage web information. A full | |||
Updated: 9, 2005 | Rating: 42 | Author: John Moetteli | Size: 4532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
209. | Case Converter 1.1 (replsoft.com) | ||
a Windows NT platform to Linux. This is actual because Linux is case-sensitive, both for file names and file content. Allow you to convert any words and even file names within content of files to lower or UPPER case. If you want to convert all file names to lower or UPPER case you no need to enter each name. You need enter only | |||
Updated: 9, 2005 | Rating: 0 | Author: ReplSoft Inc. | Size: 473 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
210. | Chameleon 2.0 (members.optushome.com.au) | ||
software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the Chameleon application on your files, you can email anything you | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|