|
||||||
|
||
|
Home > Files security software |
Related keywords: security, files, Security, computer security, internet security, hide files, security software, Files, PDF files, compare files |
|
|
441. | Secura Backup Professional 2.13 (cmfperception.com) | ||
with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and allow full automation of backups. A Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
442. | SecurDesk! 5.32 (cursorarts.net) | ||
many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
443. | Secure Disk 1.1 (wekasoft.com) | ||
encrypted virtual disks on Windows operation systems to protect your files or data from been accessed by others. Using the powerful and proven cryptographic algorithm it can provide the best security. After installing SecureDisk, you can choose to create a virtual disk file which acts as | |||
Updated: 9, 2005 | Rating: 0 | Author: weka zhang | Size: 1682 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
444. | SecureFile 2.0 (securefile.tripod.com) | ||
and compression program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It supports secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
445. | Security Folder 2.0 (everstrike.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. >From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
446. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
447. | SecurityPlus 4.33 (softbytelabs.com) | ||
is a powerful encryption & decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and won't take long to encrypt/decrypt even large files (including files on CD-ROM). Current | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
448. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
449. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, SCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
450. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
- shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, SCM has great "Reports" section, covering all kinds of | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
|
Home > Files security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|