|
||||||
|
||
|
Home > File folder security software |
Related keywords: security, file, folder, Security, File, file transfer, file management, Folder, file encryption, file manager |
|
|
231. | File Shredder 2.0 (mazepath.com) | ||
does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily recovered, including your financial information and sensitive business documents. Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
232. | Folder Guard Professional 7.5 (winability.com) | ||
your files with Folder Guard. Folder Guard is a Windows security program which you can use to restrict access to files, folders, and other computer resources. If you share your computer with your business colleagues, family, or roommates, you can use Folder Guard to stop other users from opening your personal files, or even | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
233. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
234. | Kryptel 5.31 (bestcrypto.com) | ||
is a drag-and-drop file encryption and backup program, protecting your data with a number of strong encryption algorithms. The program provides a one-click security solution and can process any number of files or folders in a single operation. Kryptel can be run in unattended batch mode and can be used to automate encryption tasks. The package contains a tool | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
235. | Mutilate File Wiper 2.92 (home.att.net) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
236. | PalmTree 3.5 (clickok.co.uk) | ||
protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
238. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
239. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
240. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > File folder security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|