|
||||||
|
||
|
Home > Securing software |
|
|
521. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
522. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
do not provide the detailed information this one does and is not secure. Chat Little Black Address Book keeps track of the most personal of personal information about your chat partners. This software provides all the standard information about your chat partner plus a whole lot | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
523. | Cipherlok 2.1 (softlok.com) | ||
is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security when, for | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
524. | Clean Disk Security 7.54 (diskcleaners.com) | ||
program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
525. | Cleaner 1.1 (softcomplete.com) | ||
on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that after deleting files in Windows, they can be restored. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
526. | Clear Your Footprints 1.4 (newpowersoft.com) | ||
The main features of Clear Your Footprints are: Delete the file securely and make it nonrecoverable. Delete the directory securely and make it nonrecoverable Browse and edit your typed URL history. Browse and edit IE History. Clear Internet temporary files,IE History,IE | |||
Updated: 3, 2005 | Rating: 16 | Author: Yong Li | Size: 1100 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
527. | Clipboard Clear 1.0 (posum.com) | ||
Clear allows you to secure your system by prohibiting the use of the PrintScreen key. It can also prohibit other general uses of the clipboard for greater security, if desired, so that no unauthorized user uses it. Clipboard Clear allows you to secure your system by prohibiting the use of the PrintScreen key. It can also prohibit other general uses of the clipboard for | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 802 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
528. | Cloak 8.0 (insight-concepts.com) | ||
Outlook which greatly enhances workflow and allows you to send secure files & e-mails directly from Cloak. Whether at home, school, or at work, Cloak provides the necessary security to protect your privacy. Protect and secure your personal | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
529. | Complete Cleanup 4.83 (softdd.com) | ||
files, and various registry entries, along with the ability for secure file wiping, so the cleaned files cannot be recovered at a later time. Cleanups can be run automatically in the background, and a built-in cache viewer is also provided. You can even choose to keep or view individual cookies, and you can enter any of your own personal cleanups which you would like to add to the | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
530. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
confidential information. It provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. Cresotech DesktopSafe protects your confidential information from being viewed. Instead of memorizing | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Securing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|