|
||||||
|
||
|
Home > File folder security software |
Related keywords: security, file, folder, Security, File, file transfer, file management, Folder, file encryption, file manager |
|
|
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | Masker 7.0.6 (softpuls.com) | ||
files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | Capturix VideoSpy 3.02.1817 (capturix.com) | ||
All application states, user actions can be saved as a Activity Log file all actions and events can used to search for a image on media archive. You even record the screen of the computer, this can be useful if your computer is shared with more people. Ready for multiple processor systems Capturix | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexandre Simoes | Size: 9442 kb | Commercial Go to category: Audio & Multimedia > Video Tools Similar programs | |||
27. | Search and Recover 3.0d (iolo.com) | ||
tools designed to allow you to quickly recover deleted or destroyed files, folders, songs, pictures, videos, programs, critical system components, web pages, and even email messages in Microsoft Outlook and Outlook Express, Netscape, and Eudora. It works with any hard or floppy drive, any drive | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
28. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
30. | Attachments Processor for Outlook 3.2 (mapilab.com) | ||
Processor is a powerful multifunctional manager of attached files in the Microsoft Outlook messages. The program can # automatically extract attachments from the incoming messages and save them to your hard disk (extracted attachments are replaced in the incoming message with a link to the file on the disk or a text file with an attachment description as well and a | |||
Updated: 2, 2006 | Rating: 397 | Author: Andrey Manchuk | Size: 2117 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
|
Home > File folder security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|