|
||||||
|
||
|
Home > File security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
461. | EldoS KeyLord 4.0 (eldos.org) | ||
a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree and | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
462. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree and | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
463. | EldoS PKI Tools 1.2 (eldos.org) | ||
PKI Tools is set of programs designed for encryption and signing of files using X.509 certificates and for management of these certificates. 1. File Processor allows you to pack, unpack, sign, encrypt, verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also allows to send encrypted or signed files by e-mail. File | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
464. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
465. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
and instant messaging on MSN, AOL, Yahoo! and ICQ. E.M. records any file downloads and streaming content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
466. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
467. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
468. | Eraser 5.3 (tolvanen.com) | ||
is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
469. | EugeneShredder 1.20 (eugenesoft.com) | ||
is a file wipe utility. With EugeneShredder you can easily wipe sensitive files from your hard disk. EugeneShredder has three security levels. You can use simple file deletion (as in Windows), wipe files with single pass wiping and also use most secure NSA erasure algorithm. EugeneShredder is a file wipe utility. With EugeneShredder you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Konovalov | Size: 680 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
470. | Event Log Janitor 1.0 (streiff-is.com) | ||
and you can optionally clear them. Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration. Requires the MS.NET Framework from | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > File security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|