|
||||||
|
||
|
Home > File security software |
Related keywords: security, file, Security, File, file transfer, file management, file encryption, file manager, computer security, internet security |
|
|
661. | Tweaking Toolbox for Windows 3.1 (tweakingtoolbox.com) | ||
Prevent others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options; disable certain dangerous file types from running. You can change Windows 98/Me system performance, by controlling the optimization of applications when defragmenting your hard drive. Settings are changed quickly, safely, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
662. | Undelete Server and Professional 4.0 (execsoft.com) | ||
and PCs? What if you or your users lost a critical accounting file, a major report, or even digital snapshots of the family? The Windows Recycle Bin doesn't catch every deleted file - including files deleted over a network. If a file is accidentally or maliciously deleted, it could be gone forever! There are many files that bypass the recycle bin when | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 122000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
663. | Universal Shield 4.0 (everstrike.com) | ||
Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting. This feature is very important nowadays when everybody knows that information is money, and information | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
664. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
665. | User Control 2005 (salfeld.com) | ||
you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
666. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
667. | virtualCrypt 3.02 (netindiasolutions.com) | ||
and the encryption technology used as compared to any other data security products available. virtualCrypt allows you to define virtual drives. These drives are like any other normal drives on your computer but they are accessible and visible only when are mounted through authentication process. The data stored in these virtual drives is in encrypted format using strong 448 bit | |||
Updated: 9, 2005 | Rating: 0 | Author: Sarfraz Jagirdar | Size: 6236 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
668. | VisNetic AntiVirus Plug-in for VisNetic MailServer 4.6 (deerfield.com) | ||
Powered by Kaspersky Labs, its installed on the email server computer rather than dispersed on each client computer. Infected email can be deleted, quarantined, or forwarded to an administrator. Kasperskys continually updated virus signature list is designed to download only the necessary update information | |||
Updated: 9, 2005 | Rating: 0 | Author: Deerfield Com | Size: 6609 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
669. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
recording up to 4 streams directly to disk as highly compressed AVI files. It supports motion-detection recording, automatic reconnect of dropped connections, and automatic record-on-connect. Visual Hindsight is a multi-user system, with support for concurrent users, user access rights and administrator functions, and encrypted databases. Also included is the Automatic Retention | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
670. | Visual Log 2.10 (softgears.com) | ||
us the main concern about windows system security is it's weak log functions. A Unix/Linux administrator is able to trace what happened in the history, however it's really a nightmare to a windows administrator after a disaster has happened. Window's users have very few | |||
Updated: 9, 2005 | Rating: 0 | Author: Song Huang | Size: 135 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > File security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|