|
||||||
|
||
|
Home > Information protection software |
|
|
371. | hCrypt 3.0 (raysion.com) | ||
to process multiple files at a time and configure various advanced protection settings in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
372. | InfoLock 1.51 (whimsysoft.com) | ||
1.5 InfoLock is a software that can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock use special arithmetic to encrypt your text to make sure you can copy or | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
373. | SecurDataStor 5.01 (encryptx.com) | ||
property. With EncryptX SecurDataStor you can share sensitive information safely across different Microsoft® Windows® operating systems, different network and firewall technologies, and across different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
374. | EasyEx html mail 2.03 (easy-ex.com) | ||
You can enter suppliers' item numbers and also other specific informations individually. Send interesting requests by inquiry email to all your potential suppliers. You can compare the offered prices directly in the used Excel surrounding. Send professional e-mails in html form. Beside the text you can send up to 250 files as enclosure. You can address each partner of course | |||
Updated: 8, 2004 | Rating: 0 | Author: Ulrich Bieber | Size: 124 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
375. | BMS-EmailObserver 5.1 (monitoring-software.co.uk) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 631 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
376. | BPS Spyware and Adware Remover 8.2.0.0 (bulletproofsoft.h4host.com) | ||
programs. SpyWare apps, often installed without your knowledge, send information about your surfing habits to ad companies, which, in turn, send you more popup ads. New features include a new Spy Add/Remove utility which uses the installer log files to uninstall all the components that the spyware | |||
Updated: 8, 2004 | Rating: 1064 | Author: Naglaa Elbanhawy | Size: 7383 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
377. | NetManager Light 2.04 (netmanager.com.ru) | ||
checks all your Internet traffic. If there is a suspicion that information sent to Internet or received from it may be dangerous for your computer or your confidentiality that transmission will blocked and you will get a notification about potentially dangerous traffic. You can decide whether to transmit this information or not. NetManager guards the "doors" to your | |||
Updated: 8, 2004 | Rating: 0 | Author: Telesoft | Size: 2120 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
378. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other Windows software! View all computer activities with the built-in screenshot recorder. It displays the | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
379. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
card, bank account and document data as well as other confidential information. The records in database are stored encrypted and password-protected. The mobile world requires mobile solutions with data confidentiality protected: PocketSafe gives you this full protection. PocketSafe allows you to | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
380. | FolderSafe 2.1 (occultsoft.com) | ||
Easier to utilize - Complete control over access to your choice - Protection from both the local and remote access - Transparent to both users and applications - Easier net share management System Requirements Windows 9x/Me/NT4/2000/XP Who needs FolderSafe? - Anyone who shares his computer with others. - Anyone who wants to protected his files/information | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Information protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|