|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
321. | CD-Runner 2005 (cdrunner.com) | ||
file selection playlist editors, very easy to use, online context-sensitive help, Windows 95/98/ME/NT4/2000/XP/XPMediaCtr, 30-day free trial, Beyond Software USA $14.95 http://www.cdrunner.com, mailto: support@cdrunner.com. CD/Multimedia/DVD Player, CD Ripper, Spectrum Analyzer, 15-Band | |||
Updated: 3, 2005 | Rating: 0 | Author: Tom Gerrish | Size: 11976 kb | Shareware Similar programs | |||
322. | Advanced Project Management 2.03 (advcomm.net) | ||
administrative tasks easily. Use powerful online help (context sensitive) to do different thing Advanced Project Management is an Advanced Portal product offered to any website hosted with us. It helps you manage your projects remotely, streamline, share project deadlines and reporting amongst your | |||
Updated: 3, 2005 | Rating: 48 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
323. | ExplorerPlus 6.0 (novatix.com) | ||
and computers. Prevent data theft by securely encrypting content sensitive files on your computer or removable media like thumb size USB flash drives. ExplorerPlus is truly the ultimate file management solution! ExplorerPlus provides all you need to quickly and easily manage all your files and folders. From digital photos to MP3 music files, or web files to Word files, ExplorerPlus | |||
Updated: 3, 2005 | Rating: 48 | Size: 19328 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
324. | Splitty 3.0 (basta.com) | ||
The problem with files these days is disk size; floppy, zip and even CD-ROM disks have a modest capacity, especially when "small" downloads are often several megabytes in size and average ones are much larger. Even word processor files have been growing at an alarming rate, with embedded fonts and graphics | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
325. | Shadow 2.02 (umace.com) | ||
-Explorer-like interface with drag-and-drop support plus context sensitive popup-menus. -Exclude certain Folders, files, or file extensions, these are then ignored during the Backup process, wildcard "*" support is provided. -Option to Delete files in destination path. -Backup-Groups can contain multiple Backup-Sets. -After the first backup session, following session will ONLY | |||
Updated: 3, 2005 | Rating: 0 | Author: Marco Spies | Size: 302 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
326. | SecurPad 1.2 (intellisoftdesign.com) | ||
is often used to send encrypted documents over email or to protect sensitive information such as passwords, credit card numbers, or any other confidential data. The editor utilizes 256-bit Advanced Security Standard (AES) symmetric encryption based on the Rijndael algorithm, which guarantees high security and confidentiality. SecurPad is a secure alternative to WordPad that allows | |||
Updated: 3, 2005 | Rating: 1254 | Size: 670 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
327. | East-Tec File Shredder 1.0 (east-tec.com) | ||
to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
328. | SHA1files 1_6 (users.skynet.be) | ||
show the duplicate files only All parameters ARE case sensitive. The lines in the ExcludeList must match the FULL path ("*/SHA1files.htm"). The distribution file SHA1files.zip contains batch files with examples how to use the program. SHA1files /root=c:\test SHA1files /root=c:\test /duplicates SHA1files /root=c:\test /ExcludeList=SHA1ExcludeList.txt SHA1files | |||
Updated: 3, 2005 | Rating: 76 | Author: Christophe DAVID | Size: 36 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
329. | SPac 1.6.0.28 (qsc.co.uk) | ||
unique, we think, feature that makes it simple to protect and share sensitive files. Any SPac package can be converted into a self-extracting archive with a difference. The difference with SPac over similar tools is that the recipient of your package can add, delete, and modify files in the package as well as simply extracting them. This is achieved by embedding a cut-down version of | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
330. | Super Password Guard 3.1 (topaim.net) | ||
(256-bit key). 10.Custom sorting and column width. 11.View/hide sensitive information switch, you can mark what columns contain sensitive information. 12. Enhanced Windows XP user interface when run on Windows XP. The secure solution for storing all your | |||
Updated: 3, 2005 | Rating: 48 | Author: Cheng Zheng | Size: 2000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|