|
||||||
|
||
|
Home > Desktop security software |
Related keywords: security, desktop, Security, Desktop, desktop utility, desktop enhancements, computer security, internet security, security software, desktop publishing |
|
|
291. | Retroskop 2.0.0.7 (lightdev.com) | ||
Retroskop simplyfies the set up of backups as directory snapshots (timestamped ZIP archives), directory synchronizations or entire release packages. Automatic change detection in source directories. Backups can be integrated with cron or task scheduler. Ideal backup solution for large amounts of data such as | |||
Updated: 3, 2005 | Rating: 39 | Author: Ulrich Hilger | Size: 756 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
292. | 007 Spy Software 3.01 (e-spy-software.com) | ||
files operation, Web site visited, and take snapshot of the entire | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
293. | Cloak 8.0 (insight-concepts.com) | ||
is an award winning security package designed to safeguard your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system. In addition | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
294. | East-Tec File Shredder 1.0 (east-tec.com) | ||
recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade secrets, business plans, personal files, photos or confidential letters. East-Tec File Shredder overwrites and | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
295. | Lock Files and Folders 1.4 (winguardpro.com) | ||
Lock Files & Folders can lock your files and folders without encrypting them. It simply disables users from reading or writing to files, which includes operations such as moving, renaming, deleting and opening. Lock Files & Folders can lock your files and folders without encrypting them. It stops users from moving, renaming, deleting and opening files. | |||
Updated: 3, 2005 | Rating: 0 | Author: WG Soft | Size: 446 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
296. | LockBox 2.11 (locksoft.net) | ||
or modified from directly within the LockBox, without compromising security. Large files can optionally be partially encrypted so they can be stored / used faster. LockBox acts similar to a windows folder, except it is opened with a password. Any files dragged into the LockBox are protected with a | |||
Updated: 3, 2005 | Rating: 474 | Author: David Dosanjh | Size: 600 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
297. | Active Link Engine 7 (activewebsoftwares.com) | ||
Person an Account to modify and add links. E-mail and Password security Monthly visits per Link Report HTML 4.0 Validated Advertiser Banner Management Module create advertiser profile define multiple campaign per advertiser define campaign start and ending period set maximum | |||
Updated: 3, 2005 | Rating: 0 | Author: Alvin Lu | Size: 520 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
298. | Active Trade 2 (activewebsoftwares.com) | ||
Users with an Account to add and edit listing. E-mail and Password security Advertiser Banner Management Module create advertiser profile define multiple campaign per advertiser define campaign start and ending period set maximum impression banner rotation automatically stops | |||
Updated: 3, 2005 | Rating: 0 | Author: Alvin Lu | Size: 520 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
299. | eResponse 6.1.3 (bonafide.com) | ||
Export Report Data · Email Report Data · Import Inventory Data · Security Level Setup · Customize your Invoices, Packing Slips, Emails, Invoices, and Shipping Labels · Custom Printer Setup · Easy to Use · Affordable Simple and intuitive order fulfillment and inventory management software for | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
300. | iNet Shaper 2.191 (winfiles32.com) | ||
reports and use iNet Shaper as billing system. NAT allows user's PC to access internet directly, having internal IP's, while from the outside, it appears that all traffic is originating from the router’s single direct IP address, as well as it enhances the level of security within the LAN by hiding its internal structure. Internet connection sharing software | |||
Updated: 3, 2005 | Rating: 90 | Author: UIP RU | Size: 4100 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Desktop security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|