|
||||||
|
||
|
Home > Facility security software |
Related keywords: security, Security, computer security, internet security, security software, information security, SECURITY, file security, windows security, network security |
|
|
581. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
582. | Splitty 3.0 (basta.com) | ||
is not just another file splitter, it has been optimized for speed, security, and efficiency. A checksum algorithm verifies the length and consistency of the split file, thus safely avoiding any file corruption issues. A packaging feature is included to facilitate the distribution of split files by | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
583. | Path Lister 2.0 (xpertsolutions.ro) | ||
Path Lister can also process information contained within a folder's subfolders. A wide range of options are available to allow you customize your listing, including font style and size. Path Lister also allows you to specify what detailed information to list, as well as to apply filters to limit the files that are included in the output list. There are also a lot of settings for the | |||
Updated: 3, 2005 | Rating: 444 | Author: Xpert Solutions | Size: 1050 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
584. | Retroskop 2.0.0.7 (lightdev.com) | ||
Retroskop simplyfies the set up of backups as directory snapshots (timestamped ZIP archives), directory synchronizations or entire release packages. Automatic change detection in source directories. Backups can be integrated with cron or task scheduler. Ideal backup solution for large amounts of data such as | |||
Updated: 3, 2005 | Rating: 39 | Author: Ulrich Hilger | Size: 756 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
585. | SecurPad 1.2 (intellisoftdesign.com) | ||
or any other confidential data. The editor utilizes 256-bit Advanced Security Standard (AES) symmetric encryption based on the Rijndael algorithm, which guarantees high security and confidentiality. SecurPad is a secure alternative to WordPad that allows creating, editing or printing encrypted | |||
Updated: 3, 2005 | Rating: 1254 | Size: 670 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
586. | Ardorsoft Privacy Guard 2.0 (ardorsoft.com) | ||
file encryption tool: **Top security, 448-bits blowfish encryption algorithm, password is hashed before encryption, Impracticable brute-force attack. **No back doors, none password info stored. There is absolutely no way of recovering your information without the correct password. **Built-in file and directory shredder with multi-rounds shredding function, ensure complete | |||
Updated: 3, 2005 | Rating: 42 | Author: Zhenhua Xu | Size: 1294 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
587. | Crypton 1.0 (uic.nnov.ru) | ||
is a multi-utility security suite, which provides strong security for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
588. | East-Tec File Shredder 1.0 (east-tec.com) | ||
Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
589. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
if you are really concerned about privacy of your data, there's nothing to stop you from protecting your archives with password and encrypting them. Please be aware that many implementations of encryption algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
590. | iNeeda Password & Tracker 1.0 (msjsoftware.com) | ||
passwords and user name, or login ID, plus a description of what it's for. Save all your information in categories that you create yourself. You can use the password that is generated for you or modify it before you save it. You can add, edit or delete an entry in any category you select. Use the | |||
Updated: 3, 2005 | Rating: 16 | Author: Mike Jackson | Size: 2673 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Facility security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|