|
||||||
|
||
|
Home > File deletion software |
Related keywords: file, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE, file compare |
|
|
711. | RIS Menu Editor v2.0 2.0 (emboot.com) | ||
emBoot now offers the emBoot RIS Menu Editor, and takes (Microsoft's) RIS beyond it's out-of-the-box capabilities. emBoot's RIS Menu Editor extends the functionality of RIS by allowing network administrators to add menus and options to the RIS Client Installation Wizard, and to create | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 410 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
712. | RK-FileSplitter 2.2 (rksoft.at) | ||
to use file split utility to split any kind of files. No program necessary to recreate the original files. Split`s files from 40 KB to several GB (Only limited by hard disk space). Selection of the most frequently used filesizes by buttons or userdefined size. Precalculation numbers of parts. Max. 100 parts possible. Information with progressbar about | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert Knapp | Size: 1862 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
713. | SafeData Technology Suite 1.0 (codetek.com) | ||
create a virtual safe for totally private document storage. SafeFile’s™ virtual safe prevents anyone else who uses the same computer from being able to access any files you place inside the virtual safe. SafeClean™ quickly removes Internet history files and caches that can allow | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Thompson | Size: 2365 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
714. | SafeOffice 1.1 (codetek.com) | ||
CodeTek Studios SafeOffice™ is a security program that allows you to protect your important data from human attackers and malicious software that take advantage of flaws in common internet applications (web browsers, e-mail clients, instant messengers, etc.). SafeOffice is designed to protect you and your | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
715. | Search Backups 1.2.2 (ab-tools.de) | ||
copies for security or other CDs / DVDs. For that the folder and file structure is being read and saved completely. After that you can move through the whole folder and file structer of all indexed CDs / DVDs the same as the CDs / DVDs were in you drive. Additionally you have the possibility to search for folders or files in all indexed CDs / DVDs. Hereto you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Andreas Breitschopp | Size: 1236 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
716. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
Secur-e-mail will encrypt the communication between your e-mail client (e.g. Outlook) and the POP3 server using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
717. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Secura Backup isn't running. The Shadow Copy feature will backup files that are in use or locked by other programs including Outlook PST files, Exchange files and database files like MySQL/MSSQL. The incremental backups feature will prevent files that haven't been modified from being backed up every time you perform a backup. This saves time and | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
718. | Secure Password Store 0.91 (lmphotonics.com) | ||
eyes. Features: - Multiple databases - Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
719. | SecureFile 2.0 (securefile.tripod.com) | ||
and compression program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and certificate ( public key/ private key ) for the process of encryption and decryption.It supports secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
720. | Security Folder 2.0 (everstrike.com) | ||
ago, our puny hard drives contained hardly a couple of thousands of files. Today, our massive hard drives contain dozens and even hundreds of thousands of various files and folders and, which is most important, the overall information value increased dramatically. >From private messages to business-critical data – every singe bit of valuable information we may have on our | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > File deletion software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|