|
||||||
|
||
|
Home > On line security software |
Related keywords: security, Security, line, command line, computer security, on line, internet security, security software, off line reader, information security |
|
|
61. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
62. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | FastSplit Gold 2.5 (piquest.com) | ||
FastSplit Gold to backup large files to fit on any media. You can run FastSplit Gold from a window, command line or batch file. Its intuitive interface makes it very easy even for beginners to backup their work to removable media. Later when you need to restore your critical files, FastSplit | |||
Updated: 9, 2005 | Rating: 0 | Author: Omer Paran | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
64. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
66. | DLOCK2 2.01 (eBible.org) | ||
is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2 | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
67. | Innovatools Audit MP3s 1.5 (whatsonmycomputer.com) | ||
MP3s allows you to easily see the MP3 and other media files you have on your computer, on any drive, folder, MP3 CD, ZIP or other removable disks, or on your network servers, workstations or user folders and get detailed information about each file (location, size, song title, artist | |||
Updated: 9, 2005 | Rating: 0 | Author: Dominic Dan | Size: 784 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
68. | Backup Forever 2.6 (schulers.com) | ||
extra information as possible to recover all information recorded on the backup even if a failure destroys some file regions. There are two versions: graphic and command line. FAQ: Can I backup my entire Hard Disk including the system operational using Backup Forever? Yes. However, Backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Joгo Schuler | Size: 1552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
69. | Comm-Logger 1.0 (wcscnet.com) | ||
is ideal for logging serial data from applications like PBXes, security systems, or any application in which serial data must be recorded to a file for archive purposes, data import, or any other use. Comm-Logger's graphics interface allows for easy and intuitive use. Comm-Logger's command line interface can be started from the scheduler, startup, or anywhere | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
70. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
History, favorite's folders and private information: passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and aucations you are tracking, your surfing habits both on and off the web | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > On line security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|