|
||||||
|
||
|
Home > Protect windows software |
Related keywords: windows, Windows, protect, Windows XP DDK, windows clipboard, windows ce, Windows 2000, Windows XP, Windows NT, windows explorer |
|
|
511. | IntraMail 2003.01.20 (dplanet.ch) | ||
exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
512. | Invisible CHAOS 5.1 (safechaos.net) | ||
product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
513. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends or business partners, you will be able to safely send the self-decrypting packages as zip files; a tool that allows you to transfer a password securely over the internet; a cryptboard to help you use the program | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
514. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
515. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
516. | Kaspersky Anti-Virus Personal 5.0 (kaspersky.com) | ||
archives Kaspersky Anti-Virus Personal was specifically developed to protect personal | |||
Updated: 6, 2005 | Rating: 184 | Author: Andrey Shepelev | Size: 13475 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
517. | Kaspersky Anti-Virus Personal Pro 5.0 (kaspersky.com) | ||
infections: email, the Internet, CDs and more. Personal Pro also protects all parts of your PC: system memory, boot sector, files, mail databases and etc. It also contains unique technology for protecting your MS Office documents. Scanning archived and compressed files Viruses often hide in archived and compressed files, where most antivirus solutions have trouble finding them | |||
Updated: 3, 2005 | Rating: 39 | Author: Andrey Shepelev | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
518. | Keyboard Logger 1.1 (panterasoft.com) | ||
key logger records every keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever your computer starts up. See everything being typed, emails, messages, documents, web pages, usernames, passwords, and more. Do you want to know what your children, spouse or significant other type on your | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Cherkasskiy | Size: 45 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
519. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
520. | lock and go 1.0 (aidsoft.com) | ||
is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to potential media theft. That is why lockngo is the perfect companion for your portable media | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Protect windows software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|