|
||||||
|
||
|
Home > Product information software |
|
|
451. | DigiSecret 2.0 (tamos.com) | ||
supports drag-and-drop operations. You can also share sensitive information with your associates who don't even have to have DigiSecret installed -- all one needs to know is the passphrase, which protects the self-extracting archive. The program allows you to customize the caption of your SFX archive and incude a hyperlink. If the recipient of the information is online and | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
452. | DLL Show 2000 5.3 (gregorybraun.com) | ||
to see the DLLs that process uses. DLL Show displays comprehensive information about all running processes including memory load, priority and the DLLs they depend upon. DLL Show can also be used to display a list for all DLL and OCX modules installed on your system. DLL Show can be configured to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 444 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
453. | DLOCK2 2.01 (eBible.org) | ||
Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled for the Win32 command line (for long filename support) and author contact information has been updated. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
454. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
455. | DriveScrubber 2.0a (iolo.com) | ||
and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously existed thereon. Most people believe that when a drive is formatted, all information within is permanently and irrecoverably gone. The | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
456. | AllCleaner 6.5 (allcleaner.com) | ||
Internet is nobody's business but your own! Clean up your tracks to protect your PC and Internet privacy. AllCleaner for Windows is the original and most advanced privacy and PC cleaning tool. We invented this software category more than two years ago and since then more than one million | |||
Updated: 9, 2005 | Rating: 25 | Author: Leo van Opstal | Size: 4929 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
457. | AlmerShredder 1.05 (almersoft.com) | ||
hard drive and can be restored any moment. Thus secret and valued information is available to many people. Recognizing this need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
458. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
programs possibly included in any commercial, shareware, freeware products, as well as in Trojan horses, viruses of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
459. | AntiSpy 2.11 (softvers.com) | ||
a complete clearing of your PC, you can be sure than nobody will get information about the Web-sites you have visited, the documents you have opened, the messages you have sent and the applications you have used. AntiSpy eliminates the traces of your internet activity and work on the computer. Clear | |||
Updated: 9, 2005 | Rating: 34 | Author: DevelopEx _ | Size: 1231 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
460. | Atomic Clock Sync 2.7.0.3 (ChaosSoftware.com) | ||
current time with the greatest accuracy available and update your PC's information. It can even be set to automatically check the time once a day to keep your PC's time accurate forever. Atomic Clock Sync will connect to one of the time servers operated by the National Institute of | |||
Updated: 9, 2005 | Rating: 263 | Author: Bill Tiede | Size: 628 kb | Freeware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
|
Home > Product information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|