|
||||||
|
||
|
Home > File security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
431. | CSJami Minicom Pro 5.4.0.0 (csjami.netfirms.com) | ||
*Remote Modem *Scheduler *TimeCenter *Wake On Lan WOL *>128 bit security Password protected and optimised for easy use. TCP-IP and IPX enabled, 4,8, 16 bit color selection and multithreaded. Transit routing. Easily take control of remote PCs with Minicom over LAN dial-up or Internet connections. Screen file manager and finder Time Center audio and video routers shutdown | |||
Updated: 2, 2006 | Rating: 42 | Author: CSJami CSJami | Size: 5006 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
432. | CSSS 2.2 (sarbash.com) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The principle of action bases on microphone (microphones) real time survey and | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
433. | Cybercafe Manager 2002 1.3 (alarit.com) | ||
the customer sessions and is installed only on the adminstrator's PC; 2) Cafe Host Daemon (CafeHost) - a control program that must be installed on all participating PC's. Windows 2000/XP note: If you have client PCs running 2000/XP we can offer you special version of CafeHost having deep integration with your operating system, system logon/logoff service, and | |||
Updated: 9, 2005 | Rating: 16 | Author: Konstantin Pavelko | Size: 496 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
434. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
435. | Data Destroyer 1.5 (braintwist-studios.com) | ||
you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
436. | Data Stash 1.5 (skyjuicesoftware.com) | ||
Stash is an award-winning clever little security tool that allows you to hide sensitive data files within other files. Select a large bitmap or database file (or any file you'd like to use) as a receptacle, then add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains fully functional. Password | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
437. | DataLock 1.0 (unicorntech.net) | ||
and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to remember many passwords - easy 3 step process - Eliminates unauthorised access - Designed for all Windows based OS Easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
438. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
439. | Delete 2.10 (eBible.org) | ||
is a Win32 console application that deletes files. Win32 Console application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
440. | Desktop Scout 4.0 (globalpatrol.net) | ||
to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or employees remotely from the comfort of your own workstation. You can even watch or control the users desktop | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > File security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|