|
||||||
|
||
|
Home > File secure software |
Related keywords: file, secure, File, file transfer, file management, file encryption, file manager, file sharing, Secure, file backup |
|
|
471. | PCWash 3.2 (pcwash.com) | ||
safely and securely erase the secrets your computer is keeping about you, eliminate evidence of your online surfing activities, delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, recent files lists, browser cache, browser history logs, site addresses | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
472. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
473. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
474. | Privacy Master 3.9 (webroot.com) | ||
to multiple users making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from prying eyes. Powerful 128-bit encryption combined with a unique session-based program style provide the tools you need to secure your privacy on-line | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
475. | PrivacyWatcher 1.20 (managebytes.com) | ||
for protecting your privacy: - Highly reliable 448-bit Blowfish file encryption algorithm - Secure file deletion to prevent simple recovery with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing unauthorized access to your PC Without privacy there is no freedom. PrivacyWatcher | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
476. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
477. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
478. | Puffer 4.02 (briggsoft.com) | ||
utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
479. | pwArch 1.0 (clarktisdale.com) | ||
to use and free. Your password data is stored in an encrypted .zip file, so it is secure. Store your passwords with a user by site or description. Passwords can be generated to be a specified length, with an adjustable set of characters, or by specifying a template for the password to follow. Once a password is generated it can be stored in the archive and retrieved | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Tisdale | Size: 246 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
480. | Quemix Utilities 2.0c (quemix.com) | ||
you will be able to visualize your documents. Protect any type of file, texts, spreadsheets, databases, photographs, Quemix Utilities helps keep your computer running at top efficiency and speed with powerful tools to optimize system performance and diagnose, repair and prevent PC problems and | |||
Updated: 8, 2004 | Rating: 42 | Size: 4667 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > File secure software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|