|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
31. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
- frames, text styles, popup windows, rollover / mouse over sensitive images, visual linking: feature rich, easy to use, fast; - forms and shopping cart (Gold edition) - plugin capabilities (e.g. the 3D Buttons plug-in for quick creation of headings and buttons); - little, quick and smart: runs also on MSWindows 95; - comprehensive online manual; easy to learn and easy to | |||
Updated: 2, 2006 | Rating: 0 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
32. | WinTools.net Professional 7.0.0 (wintools.net) | ||
and stability for your connection. Ensures your privacy and keep sensitive information secure. WinTools.net Professional contains tools: Clean Uninstaller, Scan Files, Scan Registry, Start Up, Tweak UI, Net Tweaker, The Privacy... Clean Uninstaller - This tool is used for both correctly removing software and for monitoring changes made to the hard drive, MS Windows registry and | |||
Updated: 2, 2006 | Rating: 16 | Author: Ruslan Smekalov | Size: 893 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
33. | WinLock Professional 4.32 (crystaloffice.com) | ||
It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 1628 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
34. | WinLock 4.32 (crystaloffice.com) | ||
It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer. It runs from the system tray and requires a password to gain access to the available settings. It loads automatically with | |||
Updated: 2, 2006 | Rating: 280 | Author: Denis Zolotov | Size: 1550 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
35. | TuneUp Utilities 2006 (tune-up.com) | ||
privacy TuneUp Shredder protects your privacy by securely deleting sensitive files. Recover deleted files using TuneUp Undelete. The swiss army knife for your PC TuneUp Utilities® 2006 optimizes the performance of your computer, corrects problems and helps you to customize your system to suit your | |||
Updated: 2, 2006 | Rating: 831 | Size: 8888 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
36. | SoftCAT 2.10 (fnprg.com) | ||
a sample database to get you started and a comprehensive context-sensitive on-line help system. SoftCAT is intuitive and easy-to-use, and you will soon find that SoftCAT is all you ever need to keep track of your software. SoftCAT is a database application designed to help you organize your software. Not only will SoftCAT help you know what you have and where it is, but it will | |||
Updated: 2, 2006 | Rating: 0 | Author: Fredrik Nordbakke | Size: 4342 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
37. | 1-Click SignupShield Suite 4 (protecteer.com) | ||
SignupShield monitors each form submission you make. It detects when sensitive personal information is about to be submitted to a suspicious web site and alerts you to that fact. SignupShield generates a unique password and a disposable email address for every web site you want to sign-up to. It fills | |||
Updated: 2, 2006 | Rating: 0 | Author: Protecteer LLC | Size: 3000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
38. | RegSnap 5.8.1920 (lastbit.com) | ||
keys were modified, deleted, or added}{You can also analyze other sensitive system parts, such as a list of files in system directories|Also, you can analyze other system settings such as a contents of system directories}{RegSnap generates HTML based reports and undo/redo .reg files|RegSnap can | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 768 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | Professional Renamer 2.35 (miklsoft.com) | ||
Professional Renamer helps catalogue images, music and other content of your hard drive via meaningful file names. The program offers sophisticated templates and filtering to save time and maintain consistency of name patterns. Professional Renamer is a robust tool for batch editing of file names. It | |||
Updated: 2, 2006 | Rating: 0 | Author: Mihail Cherkashin | Size: 1144 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware products, as | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|