|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
251. | RegSnap 5.8.1920 (lastbit.com) | ||
keys were modified, deleted, or added}{You can also analyze other sensitive system parts, such as a list of files in system directories|Also, you can analyze other system settings such as a contents of system directories}{RegSnap generates HTML based reports and undo/redo .reg files|RegSnap can | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 768 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
252. | SafeCryptor 1.5 (gemiscorp.com) | ||
anytime, and lets you securely and quickly send all of your sensitive and personal information (e.g., login, password, credit card number) via e-mail or chat session to your partners, customers, friends or family. SafeCryptor is the encryption system where your own computer is your unique key, especially suitable for the secure transfer of passwords between two computers. Some of | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
253. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and allow full automation of backups. A Windows NT/2K/XP/2003/Vista service is included which will perform your scheduled backups if you aren't logged in or if Secura Backup isn't running. The Shadow Copy | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
254. | encryptX SecurDataStor Premium 6.0 (encryptx.com) | ||
a simple, intuitive interface. Hide encrypted folders and share sensitive data with recipients who can view decrypted files without buying encryptX software. Burn encrypted CD/DVDs directly from within the application. Enable document rights management through permission-based access control. Protect your private personal and business files from spyware, snooping agents, and | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
255. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
Protect your privacy with Secure Disk Pro and completely eliminate sensitive data! One of the world's best security and computer hard drives cleansing | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
256. | Security Folder 2.0 (everstrike.com) | ||
your life times and times easier, while making sure your private and sensitive data are kept away from prying eyes! Security Folder represents the new generation of computer safeguard tools and is intended for hiding your files, folders and entire drives from other users of a Windows NT/2000/XP | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
257. | Security Task Manager 1.6f (neuber.com) | ||
actually deleting it. Additional information is provided via context sensitive Google results, and you can customize risk ratings by adding your own comments. If you buy Security Task Manager you get the software SpyProtector for free. SpyProtector contains tools to protect your computer from keylogger, spyware and trojans. SpyProtector deletes traces of your Internet and computer | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
258. | SHA1files 1_6 (users.skynet.be) | ||
show the duplicate files only All parameters ARE case sensitive. The lines in the ExcludeList must match the FULL path ("*/SHA1files.htm"). The distribution file SHA1files.zip contains batch files with examples how to use the program. SHA1files /root=c:\test SHA1files /root=c:\test /duplicates SHA1files /root=c:\test /ExcludeList=SHA1ExcludeList.txt SHA1files | |||
Updated: 3, 2005 | Rating: 76 | Author: Christophe DAVID | Size: 36 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
259. | Shadow 2.02 (umace.com) | ||
-Explorer-like interface with drag-and-drop support plus context sensitive popup-menus. -Exclude certain Folders, files, or file extensions, these are then ignored during the Backup process, wildcard "*" support is provided. -Option to Delete files in destination path. -Backup-Groups can contain multiple Backup-Sets. -After the first backup session, following session will ONLY | |||
Updated: 3, 2005 | Rating: 0 | Author: Marco Spies | Size: 302 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
260. | 1-Click SignupShield Suite 4 (protecteer.com) | ||
SignupShield monitors each form submission you make. It detects when sensitive personal information is about to be submitted to a suspicious web site and alerts you to that fact. SignupShield generates a unique password and a disposable email address for every web site you want to sign-up to. It fills | |||
Updated: 2, 2006 | Rating: 0 | Author: Protecteer LLC | Size: 3000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|