|
||||||
|
||
|
Home > Office security software |
Related keywords: security, Security, office, Office, computer security, internet security, security software, Microsoft Office, information security, SECURITY |
|
|
481. | Genie Backup Manager 4.0 (genie-soft.com) | ||
any storage device, with spanning, scheduling, compression and security options.. You can protect all your data including files and folders, e-mail data and settings of some of the most commonly used clients (Outlook Express, Microsoft Outlook, Eudora, MSN 8), Windows settings, Registry, Internet Explorer settings, Fonts, Favorites, Windows Address Book, Desktop and more. You | |||
Updated: 9, 2005 | Rating: 124 | Author: Muayyad Shehadeh | Size: 5575 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
482. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
483. | GRL RealHidden 1.0 (grltechnology.com) | ||
to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden information. In order to keep the final file size a low as possible, GRL RealHidden gives you the option of | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
484. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
485. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can repeat this cycle as often as needed! One mouse-click, and your open, visible application windows can be hidden from your desktop, taskbar, and the ALT+TAB keystroke combination. Additionally, the CTRL+ALT+DEL keystroke | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
486. | Hide Files 3.4 (hide-files.biz) | ||
personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
487. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
488. | ID_Bank 1.10.021 (rainbow-innov.co.uk) | ||
Passwords can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information in a secure encrypted file | |||
Updated: 8, 2004 | Rating: 0 | Author: John Hudson | Size: 1694 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
489. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
sub-directories. Idem will check and copy files or folders security information ie ACL permissions on NTFS partitions and files and folders attributes ie hidden, system, archive, etc. Synchronize and transfer data across local or network drives each time that existing files are modified in original folders or on newer files are created. Idem detects changes and will copy or | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
490. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Office security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|