|
||||||
|
||
|
Home > Computer privacy tool software |
Related keywords: tool, privacy, computer, Tool, UML Tool, Modeling Tool, Web Development Tool, Web Design Tool, internet privacy, computer security |
|
|
41. | ProBot SE 2.3.0 (nethunter.cc) | ||
SE is a full-featured workstation monitoring tool. It allows administrators to keep track of all activity occurring on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | R4U Soft StartUP Organizer 1.0 (r4u-soft.com) | ||
configuration.You can easy customize what programs will run on your computer startup. Features: - add/remove items from startup. - enable/disable items from startup. - save settings. Customize your startup configuration.You can easy customize what programs will run on your computer Features: - add/remove items from startup. - enable/disable items from | |||
Updated: 9, 2005 | Rating: 86 | Author: R4U Soft | Size: 911 kb | Freeware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
43. | Geek Superhero 1.3 (geeksuperhero.com) | ||
Superhero watches your computer for changes, immediately notifying you when a setting is altered to confirm you want to keep or reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent description.) It includes other features to help you protect your | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
44. | GreatCrypt 2.0 (miraxus.com) | ||
is a powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
45. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
powerful yet safe tool optimizes your registry, cleans your computer of useless data, and backs up your important system files. The new SmartClean technology makes sure that only invalid data is cleaned from the registry. Innovative System Optimizer adapts its scanning process to your version of | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
46. | Easy Remover 2004 Lite 3.0 (r4u-soft.com) | ||
for Uninstall Applications, StartUp Manager, Task Manager and Privacy Manager. It's new and one of the best ways to totally control your computer and make system more stable. You can easily and safely uninstall programs, allows you to inspect and control the programs that run automatically on startup, lists and controls all currently running processes, protects your | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3946 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
47. | Easy Remover 2004 Pro 3.0 (r4u-soft.com) | ||
is a program able to completely cleanup, uninstall, manage your computer, and protect your privacy? We have the solution: Easy Remover 2004 Pro v.3.0! Completely uninstalls programs, detects phantom programs, startup manager, task manager, and a privacy keeper for Windows and most used browsers. The 4 utilities available can provide a total management of your | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3074 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
48. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
49. | File Monster 2.6.7 (nstarsolutions.com) | ||
really been erased. As a result, anyone with a little knowledge of computers can very easily recover the information you thought was erased. To take your privacy a step further, File Monster also overwrites the original file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | FileLocker 2.1 (lockyourfiles.com) | ||
FileLocker allows you to hide and encrypt your private or sensitive files using 128bit encryption, while providing an easy to use interface. Locked files can be opened quickly and easily within FileLocker using your system default application for the file type you are opening. Enhanced search and import | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Rivers | Size: 17500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Computer privacy tool software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|