|
||||||
|
||
|
Home > Unencrypted software |
|
|
21. | Network Boot Tools 1.2 (emboot.com) | ||
Network Boot Tools offers a pre-OS and network boot management solution that helps business enterprises lower their total cost of ownership of their networks. This product allows network administrators to remotely manage client PCs on their network by allowing them to deploy an array of desktop management | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 2006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Icon Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
23. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
24. | emboot MBA on Disk for Realtek 5.0 (emboot.com) | ||
emBoot's MBA for Realtek is client-based firmware that allows a client PC to do a "network boot” using the NIC or LAN-On-Motherboard. MBA for Realtek is fully compliant with the Intel Wired for Management PXE spec. * Simple means of desktop OS deployment/disaster recovery * No need to change PC or * Functions as PXE / DHCP / BOOTP, RPL or NetWare Boot ROM * Extra features and options over PXE Boot Image * Quickly install OS using tools like emBoot NBT * 8100B, 8139, 8139C+, 8139D chipsets | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 69 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
he know the correct password. Note, The source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can apply to a PDF. The first is the owner password. Opening a PDF with this password will allow you full | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
26. | FolderAccess 2.0 (lockfolder.net) | ||
FolderAccess is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
27. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) | ||
With Innovatools ComputerWatermak you get a real chance to recover your computer in case it gets stolen, or make sure you have a proof in any dispute over the ownership of your computer or disk(s). Innovatools ComputerWatermark writes your name and address (or any other information you want) on the entire | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | Advatrack 5.84 (absolute-protect.com) | ||
Locates lost/stolen computer in virtually any country of the world. Where ever your computer is connected to the Internet it makes HTTP connection to www.absolute-protect.com, which establishes location of the computer. Monitoring report for your computer available on-line or can be sent you by email | |||
Updated: 9, 2005 | Rating: 49 | Author: Absolute Protect | Size: 357 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Unencrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|