|
||||||
|
||
|
Home > Protect windows software |
Related keywords: windows, Windows, protect, Windows XP DDK, windows clipboard, windows ce, Windows 2000, Windows XP, Windows NT, windows explorer |
|
|
451. | Handy Backup Pro 1.1 (handybackup.com) | ||
Pro is an easy-to-use yet powerful backup program designed for Windows 9x/NT/2000/Me/XP. It makes an automatic scheduled backup of your critical data virtually to any type of storage media: hard or network drive, CD-R/W, FTP or LAN. Strong file encryption and multichoice ZIP compression on the fly as well as many other useful features will protect your valuable data. The | |||
Updated: 9, 2005 | Rating: 16 | Author: Sergey Petrov | Size: 2454 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
452. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
453. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
System Optimizer adapts its scanning process to your version of Windows so that no programs are affected by its operation. Safety and security were our No. 1 concerns when we designed this program. Protect your privacy by removing Internet Explorer-saved cookies, the visited-pages history, and the recently opened files list for more than 100 popular applications, including | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
454. | IntraChat 2.0 (intrachat.com) | ||
or Internet connection and can be installed on any computer with Windows OS that supports TCP/IP protocol. Each client is independent of each other. All messages are encrypted with the US Government approved algorithm to make sure that your messages can't be intercepted and read by a third party. There are three different types of channels (user groups) - main, public and | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Haidukov | Size: 676 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
455. | IntraMail 2003.01.20 (dplanet.ch) | ||
exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
456. | Invisible CHAOS 5.1 (safechaos.net) | ||
product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
457. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
458. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
459. | Keyboard Logger 1.1 (panterasoft.com) | ||
key logger records every keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever your computer starts up. See everything being typed, emails, messages, documents, web pages, usernames, passwords, and more. Do you want to know what your children, spouse or significant other type on your | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Cherkasskiy | Size: 45 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
460. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
|
Home > Protect windows software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|