|
||||||
|
||
|
Home > File watch software |
Related keywords: file, File, watch, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
421. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
Spam emails have become an ever increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
422. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
423. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
424. | GoodBye Spy 4.01 (tekeffect.com) | ||
memory, and drives, then allows you to remove these unwanted files from your system. To offer greater protection a Real Time Monitor runs silently in the background protecting you against further attacks. Free upgrades for life to all registered users. New recent modifications have been implemented into the search and detect engine. As such, GoodBye Spy now searches 'smarter' and | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
425. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
426. | Hara-Kiri 2.02 (cyteg.com) | ||
data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with utilities like "UnErase" | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
427. | IntraMail 2003.01.20 (dplanet.ch) | ||
or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room with use of pseudonyms is also available for interactive and anonymous guess-games and emotional flames… Some computer generated one-liners will help | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
428. | Kaspersky Anti-Virus Personal 5.0 (kaspersky.com) | ||
Quarantine. An easy-to-use tool allows isolation of infected files that can be later restored. In combination with the removal of infected objects, if the program fails to disinfect a file, this tool provides full-scale protection against viruses while ensuring the retention of recoverable data. Removes viruses from ZIP archives Kaspersky Anti-Virus Personal was | |||
Updated: 6, 2005 | Rating: 184 | Author: Andrey Shepelev | Size: 13475 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
429. | Kaspersky Anti-Virus Personal Pro 5.0 (kaspersky.com) | ||
Pro also protects all parts of your PC: system memory, boot sector, files, mail databases and etc. It also contains unique technology for protecting your MS Office documents. Scanning archived and compressed files Viruses often hide in archived and compressed files, where most antivirus solutions have trouble finding them. Not Kaspersky Anti-Virus Personal Pro. This | |||
Updated: 3, 2005 | Rating: 39 | Author: Andrey Shepelev | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
430. | KeyIt! 2.0 (keyit.com) | ||
and images into any document including e-mail. Throw away your sig files! KeyIt greatly expands the signature functions of e-mail programs and allows you to use the same signatures in every document you write! Not just e-mail. You can also launch programs, and surf the web with just keystrokes. But that's not all. You can also download additional modules from our website | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
|
Home > File watch software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|