|
||||||
|
||
|
Home > File folder organizer software |
Related keywords: file, organizer, folder, File, file transfer, file management, Folder, file encryption, file manager, file sharing |
|
|
781. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
782. | Kryptel 5.31 (bestcrypto.com) | ||
is a drag-and-drop file encryption and backup program, protecting your data with a number of strong encryption algorithms. The program provides a one-click security solution and can process any number of files or folders in a single operation. Kryptel can be run in unattended batch mode and can be used to automate encryption tasks. The package contains a tool for | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
783. | Microangelo 5.58 (microangelo.us) | ||
Windows XP. - Create/edit cursors and animated cursors. - Access and organize icon libraries with four viewing modes. - Edit or replace icon images in any type of executable file. - Browse drives and folders. Locate and access icons in any file type. Try the free, completely | |||
Updated: 9, 2005 | Rating: 169 | Author: Len Gray | Size: 3450 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
784. | Mutilate File Wiper 2.92 (home.att.net) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
785. | NTFSRatio 1.2 (jam-software.com) | ||
offers file based compression but the compression rate isn't displayed anywhere. For any folder on an NTFS volume, NTFSRatio shows the size and the compression rate of this folder and also of its subfolders. Compression and decompression can be done inside NTFSRatio with immediate review of the result. Results can be printed or exported. NTFSRatio can be called from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Joachim Marder | Size: 758 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
786. | Outlook Password 9.0.5351 (lastbit.com) | ||
if you forgot, lost, or misplaced your password for Outlook personal folders (.pst files). Such situation may also occur if someone who does not work with you anymore password protects your vital information that is absolutely necessary to retrieve. Any password could be recovered instantly | |||
Updated: 3, 2006 | Rating: 48 | Author: Vitas Ramanchauskas | Size: 585 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
787. | Recovery for Outlook Express 1.1.0543 (officerecovery.com) | ||
for Outlook Express fixes corrupted Microsoft Outlook Express folders. Unfortunately, corrupted file systems pop up and damage important folders at the worst possible times. When this happens, Recovery for Outlook Express can save the day. This simple program is easy to set up and easy to access. Supports corrupted folders recovery from Microsoft Outlook | |||
Updated: 2, 2006 | Rating: 0 | Author: Recoveronix | Size: 967 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
788. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
789. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
790. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > File folder organizer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|