|
||||||
|
||
|
Home > Blacklists software |
|
|
251. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
252. | Hot Crypt 1.2 (softcomplete.com) | ||
HotCrypt is one touch text encryption software. Using algorithms Blowfish, DES, Diamond, IDEA, Mars, MISTY1, RC2, RC4, RC5, RC6, RedocIII, Sapphire, Skipjack, Tea. Support compression and Base64 encoding. Working with embedded in text pictures and objects. Can be activated under any edit windows (MS Word | |||
Updated: 9, 2005 | Rating: 48 | Size: 848 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
253. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
254. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
255. | Email Audit 3.2 (km-vision.com) | ||
User Interface Build your own Whitelist of contacts Build your Blacklist contact Bar Blacklist Domains Reliable built-in Spam filters & Flexible user defined Spam filters. Build Subject Database. Option to apply audit on selected folders only. Clusters Junk mails, Bounce mails and Newsletters Compliments Outlook Rules implementations. Moves suspect mails (Virus | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
256. | Email Spy Pro 4.5 (email-spy.biz) | ||
get emails sent by monitored user or not?). Email Spy Pro blacklist option allows you to set flexible rules for outgoing emails of monitored computers (e.g. allows/forbids emails sending to specified addresses only). That feature is very appropriate for small and middle companies, which don't have own dedicated email server. Email Spy Pro is appropriate for: - Businesses | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
257. | Folder Security 2.5 (folder-security.com) | ||
Folder Security is a software program designed to password-protect folders. It lets you prevent people from viewing, printing, or altering your confidential documents. Folders remain protected should your PC be rebooted into Windows Safe Mode or DOS. A nice feature is the ability to include a password hint | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicole Collet | Size: 755 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
258. | DesktopCalendar 1.0 (fcodersoft.com) | ||
In the real world you always place the calendar in some easily accessible place, to be able to see it at any moment, so, why should you run some extra program to do the same thing on your computer? This is the basic idea that lies behind the creation of Desktop Calendar. We think that desktop is the most | |||
Updated: 9, 2005 | Rating: 0 | Author: Evgeny Shamin | Size: 1060 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
259. | DotCom Clock 1.0.1528 (turtlemeat.com) | ||
The idea behind the DotCom Clock: The .com business is built around that machines can do business faster than humans. For the people who work in the .com environment it is essential that they can focus on the consept of time. This program will help you to keep focused on time. The idea behind the DotCom The .com business is built around that machines can do business faster than humans. For the people who work in the .com environment it is essential that they can focus on the consept of time. This program will help you t | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Berg | Size: 49 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
260. | CastlePaste 1.02.4 (CastleSoftware.biz) | ||
Why cut and paste when you can simply paste ? How often do you get a sense of deja vu while typing, and think "I've typed that before" ? Do you wish that there was an easy way to paste the things that you commonly type ? Do you have more than one email signature ? Do you cut and paste from standard documents | |||
Updated: 9, 2005 | Rating: 0 | Author: Castle Software | Size: 1240 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Blacklists software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|