|
||||||
|
||
|
Home > Freeware security software |
Related keywords: security, freeware, Security, Freeware, computer security, internet security, security software, freeware games, information security, SECURITY |
|
|
31. | BoostXP 2.00 (systweak.com) | ||
a utility suite, that lets you tweak many Windows settings, enhance security and more. It also includes a cache and cookie manager as well as tools to split files, repair corrupt zip files and securely delete documents. A Maintenance Wizard can help you to perform most of the common cleanup and maintenance tasks with a single click. BoostXP has mind-blowing features to separate it | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | Chameleon 2.0 (members.optushome.com.au) | ||
or emailed without attracting attention. There is also additional security for your Chameleon files by inserting a 40 character Password. You can even hide Chameleon files in a Chameleon file. Example 1. You could create a music file (MP3) that looks and behaves exactly like any other music file | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
33. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
data on USB Drives, CDs and HDDs. Cryptainer LE ensures complete security for your data making sure that only you and nobody else can access your data. Cryptainer LE creates an encrypted volume that can be accessed only with a password. Once mounted, the volume behaves as a standard windows drive. The files can be read, viewed, modified, as well as moved from one place to another | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | dsCrypt 1.10 (members.ozemail.com.au) | ||
advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
36. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
37. | FileMap by BB 4.0.4 (dogkennels.net) | ||
become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of files before and after, it would be easy to determine which files do not belong | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
38. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
39. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
40. | Hard Angel 1.05 (kpot.8bit.co.uk) | ||
Do you remember CIH? The virus has injured 500000 computers and many computers have been destroyed as a result of reprogramming Flash-memory. Now owners of motherboards lock it but this problem is actual for hard disks. Hard Angel is jumper for your hard drive. Protect your hard drive with a Hard Angel! The | |||
Updated: 9, 2005 | Rating: 401 | Author: Ozerov Evgeny | Size: 300 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Freeware security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|