|
||||||
|
||
|
Home > Encrypted disk software |
Related keywords: disk, encrypted, Disk, hard disk, disk utility, disk space, DISK, disk backup, hard disk encryption, disk cleaner |
|
|
281. | Advanced Zip Repair 1.7 (repair-zip-files.com) | ||
to 4G. 4. Support to repair spanned Zip files, split Zip files and encrypted Zip files. 5. Support to repair Zip files on corrupted medias, such as floppy disks, Zip disks, CDROMs, etc. 6. Support to repair a batch of files. 7. Support to find and select the Zip files to be repaired on the client computer. 8. Provide an EXE stub when necessary. 9. Integrated with | |||
Updated: 3, 2006 | Rating: 99 | Author: Alan Chen | Size: 769 kb | Demo Go to category: System Utilities > Other Similar programs | |||
282. | Auto Backup 2.4.3.873 (han-soft.biz) | ||
backup of your critical data to local disk, Network neighborhood and remote FTP servers. It can work as a service too. You can create multi-tasks to backup your data.You can use Auto Backup to make a reserve copy of any valuable data on your system manually or automatically. You can select files to restore to original or new location. Auto backup Integrated compression and | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 1816 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
283. | Backup-2006 Studio 5.0.1.200 (backup2001.com) | ||
Studio includes classic backup module, synchronization and disk image. It can backup any folder to any destination (network drive, USB external disk..) It comes with its own DVD burner diver. You can schedule backup, synchronization, disk image or partition replication. Backup-2006 Studio can upload archive file to FTP, FTPS, HTTP servers. It offers a graphical | |||
Updated: 2, 2006 | Rating: 42 | Author: RD Technologies Inc | Size: 15065 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
284. | CD-DVD Lock 2.01 (softheap.com) | ||
as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know. Your data on your media are not going to be encrypted or altered in any way, therefore if you forget your password | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
285. | Clone 2.0.1 (newtonsoftware.co.uk) | ||
one location to another. This can be another directory on your hard disk, another hard disk altogether, your CR-RW drive, your floppy disk / zip disk or a network file server. Clone will copy files to any media that can be mapped as a windows directory. As well as making a backup | |||
Updated: 9, 2005 | Rating: 82 | Author: Tim Newton | Size: 3846 kb | Demo Go to category: System Utilities > Other Similar programs | |||
286. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
287. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
288. | Data Destroyer 7.31 (hermetic.ch) | ||
the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (and this may take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
289. | DeviceLock 5.73 (protect-me.com) | ||
what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
290. | Finders Keepers 2.02.2 (yadudigital.com) | ||
Copy, move, or delete found files. Save your results to disk for future reference. Replace text safely across multiple files and folders. Choose from 4 levels of confirmation, including word by word. Changed files are backed up automatically. You can replace by regular expressions. You can use a password to disable replace functions for risky users, such as kids or new | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Encrypted disk software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|