|
||||||
|
||
|
Home > Securing software |
|
|
561. | East-Tec File Shredder 1.0 (east-tec.com) | ||
by anyone that has access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
562. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
East-Tec FormatSecure 2005, in addition to formatting a drive, securely wipes the data in order to eliminate all sensitive information beyond recovery. The product goes beyond U.S. Department of Defense security standards and provides protection against all methods and equipment of data recovery. East-Tec FormatSecure 2005 features a very intuitive wizard interface and can | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
563. | EldoS KeyLord 4.0 (eldos.org) | ||
keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
564. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
565. | EldoS PKI Tools 1.2 (eldos.org) | ||
such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you can pack files into ZIP archive, sign the archive and send it by e-mail by selecting one command in Explorer context menu. 2. Certificate Generator is a | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
566. | Email Audit 3.2 (km-vision.com) | ||
relatives so that mails originating from your Whitelist contacts are secured. Features of Email Audit: Works on Microsoft Outlook 2000/XP/2003. Intuitive User Interface Build your own Whitelist of contacts Build your Blacklist contact Bar Blacklist Domains Reliable built-in Spam filters & | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
567. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
No password will be prompted for when opening the PDF if you secure it with only an owner password. The second is the user password. Opening a PDF with this password will restrict you based on how the PDF was password protected (printing may be disabled, for instance). Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
568. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
No password will be prompted for when opening the PDF if you secure it with only an owner password. The second is the user password. Opening a PDF with this password will restrict you based on how the PDF was password protected (printing may be disabled, for instance). Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
569. | Find Protected 2.0 (aks-labs.com) | ||
Office documents, including Word, Excel and Access files. 3) Secure file stores, such as PGP disk. Use Find Protected to inspect local or remote computers for password protected files. After selecting the types of protected files that you want to find and the location to search in, you run the scan. The result of the inspection is a list of discovered password protected files | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
570. | Eraser 5.3 (tolvanen.com) | ||
used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Securing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|