|
||||||
|
||
|
Home > Security software |
|
|
721. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
722. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
723. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
724. | Cipherlok 2.1 (softlok.com) | ||
is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
725. | Clean Disk Security 7.54 (diskcleaners.com) | ||
This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
726. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is not too convenient for work with a plenty of computers, and program feature set is not too big. "Client for | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
727. | Clipboard Clear 1.0 (posum.com) | ||
It can also prohibit other general uses of the clipboard for greater security, if desired, so that no unauthorized user uses it. Clipboard Clear allows you to secure your system by prohibiting the use of the PrintScreen key. It can also prohibit other general uses of the clipboard for greater security, if desired, so that no unauthorized user uses | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 802 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
728. | Cloak 8.0 (insight-concepts.com) | ||
is an award winning security package designed to safeguard your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system. In addition | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
729. | CloneMaster 2.19 (softbytelabs.com) | ||
based on name, byte size, data, and so on. Also there is a security feature that you can enable to leave your windows directory alone. That is, CloneMaster will not process any files and subdirectories within your Windows folder. You can also Deselect all files too. Find TRUE duplicate files (byte for byte). Clean your hard drive of duplicate files that are just wasting space | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 1513 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
730. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|