|
||||||
|
||
|
Home > Sensitive software |
Related keywords: context sensitive, sensitive files, sensitive information, context sensitive help files, sensitive data, protect your sensitive data |
|
|
41. | PrivacyKeyboard 7.1.1 (anti-keylogger.com) | ||
keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware, freeware products, as | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | PowerKey 2.11.01.22 (elcor.net) | ||
is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
43. | pdf stamp command line 2.0 (toppdf.com) | ||
you stamp watermarks such as "Confidential" on pages that include sensitive information or "Draft" on a preliminary PDF document to be distributed for review. You can stamp PDF document names, revision numbers, Date/Time stamps, pages numbers, contact information or any text that you need added to the file. PDF Stamp (PDF Watermark) Command Line features: 1. PDF Stamp (PDF | |||
Updated: 2, 2006 | Rating: 0 | Author: X H | Size: 403 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
44. | Password Saver 2.2.7 (pwdsaver.com) | ||
ones. This will greatly enhance the security of your sensitive data and accounts. The software includes many pre-defined templates for commonly used records such as Web site and Email accounts so you get started adding data right away. However, you are not just limited to the pre-defined templates or even to just storing records with passwords - using custom templates | |||
Updated: 2, 2006 | Rating: 16 | Author: Eugene Olevsky | Size: 2188 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
45. | Kryptel 5.31 (kryptel.com) | ||
backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a file encryption program, enabling you to use strong cryptographic algorithms for protecting your files and folders. Kryptel supports drag and drop, and makes encryption of any number of files as easy as a single mouse | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | Kryptel 5.31 (bestcrypto.com) | ||
backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a file encryption program, enabling you to use strong cryptographic algorithms for protecting your files and folders. Kryptel supports drag and drop, and makes encryption of any number of files as easy as a single mouse | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
your privacy with Evidence Killer 2005 and completely eliminate sensitive data! Evidence Killer 2005 completely eliminates all hidden evidence of activites on your computer. Protect your privacy with Evidence Killer 2005 and completely eliminate sensitive | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
48. | Evidence Destructor 2.14 (emailarms.com) | ||
to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages, temporary files, the Windows swap file, the Recycle Bin, previously | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
|
Home > Sensitive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|