|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
241. | PCWash 3.2 (pcwash.com) | ||
eliminate evidence of your online surfing activities, delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, recent files lists, browser cache, browser history logs, site addresses, Windows temporary files, cleans recycle bin, frees up valuable drive space and securely | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
242. | pdf stamp command line 2.0 (toppdf.com) | ||
you stamp watermarks such as "Confidential" on pages that include sensitive information or "Draft" on a preliminary PDF document to be distributed for review. You can stamp PDF document names, revision numbers, Date/Time stamps, pages numbers, contact information or any text that you need added to the file. PDF Stamp (PDF Watermark) Command Line features: 1. PDF Stamp (PDF | |||
Updated: 2, 2006 | Rating: 0 | Author: X H | Size: 403 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
243. | Privacy Master 3.9 (webroot.com) | ||
making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from prying eyes. Powerful 128-bit encryption combined with a unique session-based program style | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
244. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware products, as | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
245. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware products, as | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
246. | Privilege Master 1.0 (shareware-promotion.com) | ||
out administrator account details, password or any other security sensitive information. Privilege master provides the perfect solution to allowing your users temporarily increased security privileges, using their normal account details whist ensuring your support department remains in full control, without the need to give out administrator account details, password or any other | |||
Updated: 9, 2005 | Rating: 16 | Author: Blue Square Software Blue Square Software | Size: 9085 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
247. | Professional Renamer 2.35 (miklsoft.com) | ||
Professional Renamer helps catalogue images, music and other content of your hard drive via meaningful file names. The program offers sophisticated templates and filtering to save time and maintain consistency of name patterns. Professional Renamer is a robust tool for batch editing of file names. It | |||
Updated: 2, 2006 | Rating: 0 | Author: Mihail Cherkashin | Size: 1144 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
248. | Protect Folder 98 3.0 (everstrike.com) | ||
with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the file or folder that | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
249. | Puffer 4.02 (briggsoft.com) | ||
purpose 256-bit AES encryption utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
250. | QuickWiper 7.6.3 (aks-labs.com) | ||
wipe utility. With QuickWiper you can wipe free disk space and wipe sensitive files from you hard disk. QuickWiper provides quick and secure file wiping. You can use system cleaner to clear cache with | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|