|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
341. | Kryptel 5.31 (bestcrypto.com) | ||
backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a file encryption program, enabling you to use strong cryptographic algorithms for protecting your files and folders. Kryptel supports drag and drop, and makes encryption of any number of files as easy as a single mouse | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
342. | Mutilate File Wiper 2.92 (home.att.net) | ||
be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
343. | PowerKey 2.11.01.22 (elcor.net) | ||
is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
344. | PrivacyKeyboard 7.1.1 (anti-keylogger.com) | ||
keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware products, as | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
345. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware products, as | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
346. | Security Folder 2.0 (security-folder.com) | ||
your life times and times easier, while making sure your private and sensitive data are kept away from prying eyes! Security Folder represents the new generation of computer safeguard tools and is intended for hiding your files, folders and entire drives from other users of a Windows NT/2000/XP | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
347. | SHA1files 1_6 (christophedavid.org) | ||
show the duplicate files only All parameters ARE case sensitive. The lines in the ExcludeList must match the FULL path ("*/SHA1files.htm"). The distribution file SHA1files.zip contains batch files with examples how to use the program. SHA1files /root=c:\test SHA1files /root=c:\test /duplicates SHA1files /root=c:\test /ExcludeList=SHA1ExcludeList.txt SHA1files | |||
Updated: 9, 2005 | Rating: 0 | Author: Christophe DAVID | Freeware Go to category: Education > Other Similar programs | |||
348. | Steganography 1.7.1.1 (pipisoft.com) | ||
such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information. This program is easy enough for beginners to use. For more information, please visit http://www.securekit.com . Steganography: an excellent method of | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
349. | WinSettings 7.0.3 (promaxum.com) | ||
Privacy and Security of your web browsing history becomes more sensitive when others jump on to your computer or information is being passed out without your even knowing it. To help protect your privacy, these new features allow you to clean up your web surfing tracks, such as cleaning up Cookies, History folder, typed URLs, and Cache. Along with cleaning up your web browsing | |||
Updated: 9, 2005 | Rating: 0 | Author: FileStream Inc. | Size: 1354 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
350. | WinSettings 5.2 (filestream.com) | ||
Privacy and Security of your web browsing history becomes more sensitive when others jump on to your computer or information is being passed out without your even knowing it. To help protect your privacy, these new features allow you to clean up your web surfing tracks, such as cleaning up Cookies, History folder, typed URLs, and Cache. Along with cleaning up your web browsing | |||
Updated: 9, 2005 | Rating: 0 | Author: Yao Chu | Size: 1271 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|