|
||||||
|
||
|
Home > Information keeping software |
|
|
291. | GreatCrypt 2.0 (miraxus.com) | ||
encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
292. | GRL RealHidden 1.0 (grltechnology.com) | ||
gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden information. In order to keep the final file size a low as possible, GRL | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
293. | Hara-Kiri 2.02 (cyteg.com) | ||
(ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
294. | HSLAB Sys Monitor Lite 1.0 (hs-lab.com) | ||
permanently monitor behind parameters of the system and gather the information with an interval per one second. The information, collected by sensors is transmited to the processing unit. The processing unit prepares the information for visualization and transmits it to display unit. The display unit displays the stored information in user-friendly form. Also | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 2202 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
295. | IdentaFone Pro 2.50 (identafone.com) | ||
monitors the phone line for incoming calls and offers many ways to keep you informed about your caller's identity. Once the caller information is obtained, this virtual telephone assistant can speak the caller's name through your PC speakers, screen pop the callers name, send the information to a pager or cell phone, submit an email message with the caller | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
296. | Keyring 1.0.1 (morello.co.uk) | ||
is the easy and secure way to manage all your passwords, PIN's and other account information. These days it is almost impossible to keep track of all the different passwords you use in your day to day life. It is easy to fall into bad habits - using easily guessable passwords, using the same password for different accounts, and never changing your password. Who | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Duncan | Size: 178 kb | Demo Go to category: System Utilities > Other Similar programs | |||
297. | ECSync 1.0 (EUROCOMP.info) | ||
data between two unconnected machines using any movable media. - Keeps all your computers and disks up to date. - Synchronizes your notebook with your Desktop. - Synchronizes files within a work or project team. - Transfers files between your office, home and your notebook Computers. - Backups your day's work and transfers data between Computers. - Writes status and error | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Osthege | Size: 5007 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
298. | EldoS KeyLord 4.0 (eldos.org) | ||
KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
299. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
300. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
windows you want. Our unique software hides pop-ups and just shows information about them. With a simple mouse hover you can take a peek and decide whether to show them. Otherwise, pop-ups will be automatically blocked after a few seconds. The technology is invisible to sites that try to detect and foil blockers. Its design isn't based on a specific browser so it will work on most | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Information keeping software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|