|
||||||
|
||
|
Home > Security system software |
Related keywords: security, system, Security, System, system tray, computer security, internet security, security software, encryption system, SYSTEM |
|
|
341. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can repeat this cycle as often as needed! One mouse-click, and your open, visible application windows can be hidden from your desktop, taskbar, and the ALT+TAB keystroke combination. Additionally, the CTRL+ALT+DEL keystroke | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
342. | Hide Files 3.4 (hide-files.biz) | ||
personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
343. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
344. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
345. | ID_Bank 1.10.021 (rainbow-innov.co.uk) | ||
your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information you often forget or write on scraps of paper that anyone else can read. Your information is stored in a secure encrypted file, all you need to remember is one | |||
Updated: 8, 2004 | Rating: 0 | Author: John Hudson | Size: 1694 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
346. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
sub-directories. Idem will check and copy files or folders security information ie ACL permissions on NTFS partitions and files and folders attributes ie hidden, system, archive, etc. Synchronize and transfer data across local or network drives each time that existing files are modified in original folders or on newer files are created. Idem detects changes and will | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
347. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
348. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
cleans your computer of useless data, and backs up your important system files. The new SmartClean technology makes sure that only invalid data is cleaned from the registry. Innovative System Optimizer adapts its scanning process to your version of Windows so that no programs are affected by its | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
349. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
help you use the program from Windows Explorer and a real-time news system that allows you to be kept up-to-date with new versions, new products, new features, and special offers, without having to browse our website searching for new information. Invisible Secrets Encryption Software 4 is shell integrated and offers a wizard that guides you through all the necessary steps needed to | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
350. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the password of your dial-in ISP, Outlook Express email or FTP connection. However, since you no longer enter the saved passwords | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Security system software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|