|
||||||
|
||
|
Home > Cannot software |
|
|
231. | AB File Encryptor 3.08 (ab_software.tripod.com) | ||
any file with sensitive data. Once the file is encrypted, he cannot be decrypted with any other tool. You can encrypt one or more files or a directory with all the files contained with just one mouse click. A small utility that allows you to encrypt securily any file with sensitive data. Once the file is encrypted, he cannot be decrypted with any other tool. You can encrypt | |||
Updated: 3, 2005 | Rating: 39 | Author: AB Software | Size: 2002 kb | Shareware Similar programs | |||
232. | AB Safe Deletion 2.08 (ab_software.tripod.com) | ||
all the data contained by the file. Once the file is deleted, he cannot be recover with any tool. You can erase one or more files or a directory with all the subdirectories and files contained with just one mouse click. A small utility that allows you to delete securily any file with sensitive data | |||
Updated: 3, 2005 | Rating: 122 | Author: AB Software | Size: 1997 kb | Shareware Similar programs | |||
233. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
or watch your employees. Whenever wherever whatever is typed - it cannot be hidden from Advanced KEYLOGGER! Advanced KEYLOGGER is a powerful invisible surveillance tool that records every keystroke, chat conversations, emails, Internet and desktop activity, clipboard info to encrypted user-friendly logs. Logs can be automatically sent to specified | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
234. | Clean Disk Security 7.37 (theabsolute.net) | ||
gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the Window's | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin Solway | Size: 650 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
235. | Copyprof 1.40 (aidsoft.com) | ||
allows operations logging and outputting a list of files that cannot be processed with current software configuration (do not comply with given file masks or attributes etc.). It also allows using logical search expressions based on file attributes and running an external p Beat the routine! CopyProf is the unique all-in-one solution for automation of file copying, moving | |||
Updated: 9, 2005 | Rating: 0 | Author: Sobolev Andrey | Size: 156 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
238. | Data Destroyer 7.31 (hermetic.ch) | ||
to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
239. | File Shredder 2.0 (mazepath.com) | ||
Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily recovered, including your financial information and sensitive | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
240. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
are locked by other applications, loaded into the memory or just cannot be changed until next system boot. GiPo@DirMonitor. File system changes monitoring utility for Windows NT/2000/XP. It allows to select the folder and to customize the monitoring settings for the specified folder (the event list to process and some other options). The program can also monitor changes in | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 908 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Cannot software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|