|
||||||
|
||
|
Home > File secure software |
Related keywords: file, secure, File, file transfer, file management, file encryption, file manager, file sharing, Secure, file backup |
|
|
381. | Password Safe and Sound 1.2.0 (northcardinal.com) | ||
Sound allows you to store all your passwords and related information securely, in an encrypted file that only you can view using your defined password. It also allows you to launch websites, programs, or files associated with your passwords with a simple click of the mouse. Features | |||
Updated: 9, 2005 | Rating: 0 | Author: North Cardinal Software | Size: 4819 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
382. | Password Security Vault 2.0 (hirtlesoftware.com) | ||
down nice and neatly. Not a bad idea, but certainly not very secure. Finally some people rely on their web browser to maintain login names and passwords such as cookies written to their hard drive. This will work also, but what if someone else uses your browser? All they would need to do is go to the web sites you have accounts with and everything will be prefilled for them. To | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 4764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
383. | PC DoorGuard 4 (astonsoft.com) | ||
together with any elements it may have left in registry/system files/memory. PDG also constantly monitors your system to prevent further infection, using weekly updated trojan database consisting of more than 75000 entries. Active e-mail Scan, full drive scan on demand, monitoring ports,- all this provides secure environment for your PC. Features: incoming e-mail scanning | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
384. | PC Optimizer 1.00 (aidsoft.com) | ||
traces in your system. System cleaner removes junk and obsolete files from your system. Manage AutoRun Programs lets you control which program should be run at startup and logon. Memory Optimizer optimizes the Memory Management of Windows. Find Duplicate Files : Finds and Remove the | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 178700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
385. | PC Security 6.4 (tropsoft.com) | ||
your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
386. | PCWash 3.2 (pcwash.com) | ||
safely and securely erase the secrets your computer is keeping about you, eliminate evidence of your online surfing activities, delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, recent files lists, browser cache, browser history logs, site addresses | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
387. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
388. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
389. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
390. | Puffer 4.02 (briggsoft.com) | ||
utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > File secure software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|