|
||||||
|
||
|
Home > Secure storage software |
Related keywords: secure, storage, Secure, Secure Shell, secure delete, secure files, secure deletion, secure file, pdf secure, secure shell |
|
|
31. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
DesktopSafe is a convenient tool for safe storage of confidential information. It provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. Cresotech DesktopSafe protects your confidential information from being viewed. Instead of memorizing dozens of | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
32. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
POCKETSAFE provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. The records in database are stored encrypted and password-protected. The mobile world requires mobile solutions with data confidentiality protected: PocketSafe gives you this full protection | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
33. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
of single files or multiple files in a single operation for secure storage or secure transmission. It uses a 500-bit key for security, and has features designed to minimize the chances of user | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | Desktop Scout 4.0 (globalpatrol.net) | ||
a time restriction, or require a password to access anything in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | DeviceLock 5.73 (ntutility.com) | ||
disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
36. | Digital MediaRescue Professional 3.9 (objectrescue.com) | ||
I/II), IBM Microdrives, SmartMedia cards, MultiMedia cards (MMCs), Secure Digital (SD) cards, Memory Sticks, CD/DVD drives, and any other storage device with the addition of wide range file format support: MP3, WMA, MIDI, JPEG, PNG, GIF, AVI, MOV, WMV, etc. As you know new digital devices | |||
Updated: 2, 2006 | Rating: 293 | Author: Konstantin Romanovsky | Size: 1454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
37. | Digital PhotoRescue Professional 3.9 (objectrescue.com) | ||
I/II), IBM Microdrives, SmartMedia cards, MultiMedia cards (MMCs), Secure Digital (SD) cards, Memory Sticks, CD/DVD disks and any other storage devices (of course "usual" Hard Disks, and Floppy Disks too). New cameras and other digital devices allow files to be erased and the space on the media reused. The important file may be removed on imprudence only for one second. The | |||
Updated: 2, 2006 | Rating: 570 | Author: Konstantin Romanovsky | Size: 1448 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
38. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
39. | EldoS KeyLord 4.0 (eldos.org) | ||
keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
40. | EldoS PKI Tools 1.2 (eldos.org) | ||
such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you can pack files into ZIP archive, sign the archive and send it by e-mail by selecting one command in Explorer context menu. 2. Certificate Generator is a | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Secure storage software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|