|
||||||
|
||
|
Home > Secure form software |
Related keywords: secure, form, Form, Secure, form fill, electronic form, form filler, form filling, web form, Secure Shell |
|
|
61. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
62. | GreatCrypt 2.0 (miraxus.com) | ||
strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
63. | Identity Knight 1.3 (fspro.net) | ||
machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | CryptoForge 3.2.5 (cryptoforge.com) | ||
secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as well as | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
65. | DCPP 2.7 (securstar.com) | ||
in the field of transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
attacks by other spyware processes, services, drivers, and other forms of executing code on your system. ProcessGuard also stops applications from executing without the users consent, stops malicious worms and trojans from being executed silently in the background, as well as a variety of other attacks. ProcessGuard even stops most keyloggers and leaktests, and is recognised by many | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
67. | DigiSecret 2.0 (tamos.com) | ||
is an easy-to-use, secure, and powerful application for file encryption and sharing. It utilizes strong and time-proven encryption algorithms for creating encrypted archives and self-extracting EXE files and for sharing files with your associates and friends. DigiSecret also includes powerful and intelligent file compression; you no longer need .zip files when you can have | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | BestCrypt Corporate 1.12 (jetico.com) | ||
computers to create containers to keep data inside in encrypted form. Secret data kept on client computers can be always accessed by Administrator, even if employee is away or gone. Central Administrating Database can be also scheduled for automatic backup. BestCrypt Corporate is important tool to keep corporate networks secure and at the same time, it provides easy yet | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
70. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
about your chat partners. Online chatting has become a new form of social interaction of this century. Many people now rely on chatting in the hopes of finding their soul-mate. Unfortunately, there is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies. This software | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Secure form software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|