|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
21. | BoostXP 2.00 (systweak.com) | ||
When it comes to optimization suites and Windows tweakers, the one-stop shopping approach has emerged as the standard. Offering a number of tools to modify the Windows user interface and boost performance, BoostXP does exactly what its name implies. The neatly organized interface is loaded with standard | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | BPS Data Shredder 1.2.0.0 (bulletproofsoft.com) | ||
explorer, an easy to use 'drag and drop' interface, the option to shred shred files, folders, disk free space; the 'Confirm before shred' feature, a configurable overwrite pattern and number of overwrites by using sophisticated overwriting algorithms which obliterate latent data on your hard disk, making your deleted files irrecoverable, even by expensive equipment, a | |||
Updated: 9, 2005 | Rating: 0 | Author: bulletproof soft | Size: 3062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
23. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | Cloak 8.0 (insight-concepts.com) | ||
send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system. In addition to protecting documents and e-mails, Cloak also provides industry standard internet trace cleaning options. Permanently erase cookies, temporary internet documents, internet history files, recently typed URLs, and much more. Cloak can also be fully | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | concat 4.0.0.0 (jddesign.freeserve.co.uk) | ||
ConCat/Split is a Windows Explorer context menu extension that provides two complementary facilities: 1. A split facility that lets you easily convert a single large file into several smaller ones. You can copy these smaller files onto floppy disks, or send them through email facilities that will | |||
Updated: 3, 2005 | Rating: 16 | Author: David Lowndes | Size: 245 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
26. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | CryptoForge 3.2.5 (cryptoforge.com) | ||
This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|