|
||||||
|
||
|
Home > Product information software |
|
|
671. | Find Protected 2.0 (aks-labs.com) | ||
protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
672. | Evidence Destructor 2.14 (emailarms.com) | ||
or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
673. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
674. | Excel Password 9.0.5351 (lastbit.com) | ||
who does not work with you anymore password protects your vital information that is absolutely necessary to retrieve. The program features various approaches to the password recovery problem, from straightforward brute-force attack and dictionary search, to unique Guaranteed Recovery. This option that helps unlock a file regardless of length and complexity of the original password | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
675. | Explorer Buddy 0.90 (software-entwickler.de) | ||
File Attributes. Explorer Buddy generates reports with detailed information as to which operations succeeded and which failed. Furthermore, Explorer Buddy adds two additional columns to Windows Explorer's detail view, giving the user the possibility to sort by file extension (like *.exe or *.bak) and to view the short (8.3) names of files. Explorer Buddy extends the | |||
Updated: 8, 2004 | Rating: 0 | Author: Dirk Neeb | Size: 669 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
676. | eXtended Task Manager 1.95 (warecase.com) | ||
XTM can give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
677. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
removes infected attachments automatically. * New! Virus news. Get information about latest threats from F-Secure. Stops even new viruses An average of eight to 10 new viruses are found each day and the rate seems to grow. With its sophisticated virus detection technology combined with a fast | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
678. | GreatCrypt 2.0 (miraxus.com) | ||
encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
679. | GRL RealHidden 1.0 (grltechnology.com) | ||
hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
680. | Hara-Kiri 2.02 (cyteg.com) | ||
3. You are a secret agent and have dealings with confidential information... Suddenly enemies burst into your headquarters... You, don't stopping skirmish :-), are clicking on "Hara-Kiri" shortcut or press hot key and... even tortures will not help them to profit by important secrets... "Hara-Kiri" is a radical way to keep your confidential data away from unauthorized access by | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Product information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|