|
||||||
|
||
|
Home > Passing software |
|
|
261. | Active Cleaner 1.1 (difolders.com) | ||
few minutes, and that's it! KEYLOGGERS, WORMS AND SPYWARE WON'T PASS! When they install themselves, they silently change startup settings, so Windows will load malicious software at startup. But Active Cleaner includes Startup Protector, so you will be notified about change in settings, and asked | |||
Updated: 9, 2005 | Rating: 16 | Author: Dmitry Chestnykh | Size: 1262 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
262. | Advanced File Shredder 1.14 (ashkon.com) | ||
Shredder securely erases files or folders on your PC using seven pass US Government standard wiping and cryptographically strong random number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like business or financial information can be easily recovered. Note: when | |||
Updated: 9, 2005 | Rating: 357 | Author: Ashkon Software | Size: 512 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
263. | APassword 1.01 (info-pack.com) | ||
APassword allows you to generate either single or batches of random passwords. You can select from a range of character options including: Letters, Numbers, Symbols, Case Selection and more. These passwords can then be saved to disk in CSV or one per line format. At the click of a button the password is You can select from a range of character options including: Letters, Numbers, Symbols, Case Selection and more | |||
Updated: 9, 2005 | Rating: 0 | Author: Malcolm Webster | Size: 1285 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
264. | AppsProtector XP 2.1 (ax-soft.com) | ||
AppsProtector XP allows you to put a lock on a program file, such as a game, or your office software. The program icon is replaced with that of a padlock, and, when the program is run, it will first ask for the password. The password must then be typed in correctly before the program will run. Easy to use and | |||
Updated: 8, 2004 | Rating: 243 | Author: Moser Damien | Size: 1601 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
265. | Bazooka Adware and Spyware Scanner 1.13.03 (kephyr.com) | ||
Bazooka Adware and Spyware Scanner detects a multitude of spyware, adware, foistware, trojan, keylogger and trackware components; sources of irritation that antivirus software does not deal with. The scanning process will only take a fraction of a second and tell you how to uninstall the unwanted software | |||
Updated: 3, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 750 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
266. | CDuke 2.1 (coolutils.com) | ||
it! Easy, isn’t it? The progress bar shows how much time has passed since the process had started and how much time is left for it to be completed. But the advantages of CDuke do not stop here. Importantly, the program comes with an autopilot-like feature that controls disk usage and prevents CD from becoming corrupted as a result of surplus data and incorrect available space | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 2900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
267. | Complete Registry Cleaner 3.0 (abexo.com) | ||
Therefore your computer gets slower and slower. Last but not least, passing invalid data to Windows programs can cause severe system complications resulting in system crash, hang and malfunction. Why do I need to compress or defrag the registry? After a registry cleanup the invalid entries leave empty | |||
Updated: 9, 2005 | Rating: 170 | Author: Abexo Marketing | Size: 789 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
268. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
is absolutely no way anyone can recover/get the data without the pass phrase. CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
269. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
is absolutely no way anyone can recover/get the data without the pass phrase. Complete support for command line. CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
270. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
is absolutely no way anyone can recover/get the data without the pass phrase. Complete support for command line. CryptoExpert mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Passing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|