|
||||||
|
||
|
Home > Notebook protection software |
Related keywords: protection, notebook, data protection, password protection, Web Page Protection, Protection, file protection, spam protection, copy protection, software protection |
|
|
761. | BackUp32 2.0 (soft-one.com) | ||
line execution, archiving to removable media, archives password protection, .BAK files creation, support for commentaries and descriptions, lists of 'included', 'excluded' and 'excluded from compression' files, fast compression speed, nice interface and many options that affect the resulting archive. Intended for data archiving tasks, using compression algorithm compatible with ZIP | |||
Updated: 9, 2005 | Rating: 0 | Author: Vsevolod Vasilyev | Size: 2663 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
762. | BackUpTime 1.4 (backuptime.com) | ||
software in order to make sure it meets all of your needs. That’s right – first you try it, then you buy it. You can buy one copy for home use or you can buy a site license for hundreds of workstations. BackUpTime has been specially designed to make it easy to use. You will learn how the program works in less then an hour. This software features straitforward, eye-pleasing | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 706 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
763. | BCWipe 3.07.2 (jetico.com) | ||
A swap file encrypting utility is included and provides ultimate protection of swap file content. BCWipe is a shell extension for Windows 9x/NT/2000/XP and is highly integrated with the operating system. BCWipe ensures that another person will not restore files you have deleted from a disk. BCWipe uses military-grade procedures to shred deleted file contents. BCWipe wipes individual | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
764. | BestCrypt 7.20.2 (jetico.com) | ||
product which keeps your files/pictures out of other people’s eyes. BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
765. | BestCrypt Corporate 1.12 (jetico.com) | ||
Corporate provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
766. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
an AntiVirus product, BitDefender Professional ensures antivirus protection, as well as data confidentiality, active content control and Internet filtering. BitDefender Professional is an ICSA Labs certified solution for Microsoft Windows XP, allowing users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
767. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
of BitZipper's dominant strengths is its built-in support for ACE, ARC, ARJ, BH, CAB, GZ, JAR, LHA, LZH, RAR, TAR, TGZ, UUE, WAR, XXE, Z, ZIP and ZOO files; no third-party products are needed. You can access almost every compressed file with just this one tool. No need for additional software applications; no wasted expense. Another one of BitZipper's strengths is that it | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
768. | BKS 3.2.4.30 (backup2001.com) | ||
two computers. If you work on 2 computers ( e.g. a desktop and a notebook computer) use the Source> > Target< | |||
Updated: 2, 2006 | Rating: 16 | Author: RD Technologies | Size: 4664 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
769. | BootIt Next Generation 1.75b (terabyteunlimited.com) | ||
operating systems from a single partition, user id and password protection, custom graphic background, and much more. TeraByte Unlimited has been a leading innovator of advanced multi-boot software since the mid 1990's. An excellent partition and multi boot manager with a powerful and simple to use set of tools to quickly partition, image, or multi boot your computer. It | |||
Updated: 2, 2006 | Rating: 48 | Author: David F. | Size: 629 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
770. | Broken Cross Disk Manager 3.81 (bcdm.broken-cross.com) | ||
or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well wildcards. Once you found a file, you can open | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin Fucik | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Notebook protection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|