|
||||||
|
||
|
Home > Security software |
|
|
691. | BackRex Expert Backup 2.5 (backsettings.com) | ||
vulnerability! Imagine what would happen to your life if your social security data gets lost due to hardware crash… What would have happened to Tolstoy if he'd have lost his WarAndPeace.doc due to hard drive failure? Psychiatrists around the globe have already reported numerous hysteria and suicidal | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
692. | BackToZIP 7.10 (aborange.de) | ||
I confess: there are a lot of backup utilities on the market. But when I was searching for a tool for my daily and weekly backups, I quickly realized that the available tools were either too complicated, too expensive or had other disadvantages. Clearly, these disadvantages would not only have been an | |||
Updated: 2, 2006 | Rating: 0 | Author: Mathias Gerlach | Size: 3217 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
693. | Backup Forever 2.6 (schulers.com) | ||
multi-volume system? We found that a multi-volume system reduces the security level. What is the operational diference between the unregistered and the registered versions? The unregistered version has a limitation which allows you to backup only 10 Mbytes. The Command Line version can be used only | |||
Updated: 9, 2005 | Rating: 0 | Author: João Schuler | Size: 1552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
694. | BatteryMon 2.0 1006 (passmark.com) | ||
Batteries, given their chemical nature, are prone to wear, corrosion, leakage and outright failure due to events like short circuits and lightning strikes. Given their propensity to fail and to have decreased performance over time, it is important to be able to identify and monitor their performance. With | |||
Updated: 9, 2005 | Rating: 1082 | Author: David Wren | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
695. | Bazooka Adware and Spyware Scanner 1.13.03 (kephyr.com) | ||
Bazooka Adware and Spyware Scanner detects a multitude of spyware, adware, foistware, trojan, keylogger and trackware components; sources of irritation that antivirus software does not deal with. The scanning process will only take a fraction of a second and tell you how to uninstall the unwanted software | |||
Updated: 3, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 750 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
696. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe ensures that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
697. | BestCrypt 7.20.2 (jetico.com) | ||
BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
698. | BestCrypt Corporate 1.12 (jetico.com) | ||
BestCrypt Corporate provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
699. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
Trojan, Internet worm and other malicious code * Alerts you about security weaknesses in your system * Blocks given web addresses (URLs), ports and IP's * Warns you about any application trying to access the Internet * Keeps your identity and preferences private when you navigate the Net * | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
700. | BlowFish 2000 2.8 (gregorybraun.com) | ||
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|