|
||||||
|
||
|
Home > Verify security software |
Related keywords: security, Security, computer security, internet security, verify, security software, information security, SECURITY, file security, windows security |
|
|
31. | dsCrypt 1.10 (members.ozemail.com.au) | ||
advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
32. | East-Tec File Shredder 1.0 (east-tec.com) | ||
or confidential letters. East-Tec File Shredder overwrites and verifies the destruction of every bit of the file, making recovery impossible. Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys sensitive and private files beyond | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
33. | EldoS PKI Tools 1.2 (eldos.org) | ||
1. File Processor allows you to pack, unpack, sign, encrypt, verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also allows to send encrypted or signed files by e-mail. File Processor seamlessly integrates into Windows Explorer to provide easy access to file manipulation functions. It lets you perform both simple file operations such as pack | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | FingerPoint 1.4 (neurotechnologija.com) | ||
FingerPoint is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
35. | ECS (Event Control System) 2.3.14 (OmnipotenceSoftware.com) | ||
Born of our 15 years of experience in automation software development, ECS is an all-purpose automation program suitable for virtually any tasks (in residential, commercial, and industrial environments). Boasting an object-oriented design, ECS is elegantly simple, yet extremely powerful. Automated tasks Extremely powerful, yet elegantly simple. Automated tasks may be implemented via simple time-based schedules and/or English-like scripts | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Gilmore | Size: 12000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
36. | My Firewall Plus 5.0 (webroot.com) | ||
dial-up to broadband Internet connections. Advanced, customizable security profiles enable fast configuration and provide the safest, most flexible solution available today. My Firewall Plus makes your computer impenetrable to malicious hackers. A simple set up makes it easy to use for both novices and experts. Just turn it on, and you're ready to go with the advanced protection | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
37. | SecurDesk! 5.32 (cursorarts.net) | ||
many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
38. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
39. | SHA1files 1_6 (users.skynet.be) | ||
or location) SHA1files {/root= [/duplicates] [/ExcludeList=] | [/verify=]} /root= the directory where to begin /ExcludeList= exclude the files matching the lines contained in this text file (wildcards allowed) /verify= compare the files currently on disk against this text file | |||
Updated: 3, 2005 | Rating: 76 | Author: Christophe DAVID | Size: 36 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
40. | SignStation 2.00 (com-and.com) | ||
application that lets you apply a digital signature to a file, verify the digital signature on a signed file, encrypt and decrypt files and manage certificates, among other functionalities like email, hash, and file management. Using a two-ways approach interface, SignStation take care of office productivity with its classic mode -based on a file manager metaphor-, without forget | |||
Updated: 8, 2004 | Rating: 0 | Size: 5956 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Verify security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|