|
||||||
|
||
|
Home > Protect files software |
Related keywords: files, protect, hide files, Files, PDF files, Protect, compare files, password protect, duplicate files, delete files |
|
|
781. | U-Wipe 2.0 (u-wipe.com) | ||
the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla, and so on. You can plan the deleting process by running the utility manually or automatically (on schedule). An additional "Boss key" feature has been added to hide IE | |||
Updated: 9, 2005 | Rating: 60 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
782. | U-Wipe 2.5 (u-wipe.com) | ||
you to wipe out all your online activities, such as IE browser's cache, history, recent document list, cookies, auto complete forms and other tracks. U-Wipe allows you to clean tracks in MS Windows and MS Office, such as temporary files, MRU lists, last logon user name, file removing from contextual menu and much more. U-Wipe has an additional feature of pop up | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 2271 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
783. | WebCloner Offline Browser 2.5 (productsfoundry.com) | ||
kind including adult content to your hard disk into a single packed file for offline view and manipulation. Once saved, no internet connection is required to access them. Also take advantage of full featured export process that gives you the ability to move or change the way saved websites will stay on your computer. Also WebCloner is an offline browser, image viewer with advanced | |||
Updated: 2, 2006 | Rating: 0 | Author: Candin Jurca | Size: 3142 kb | Shareware Similar programs | |||
784. | WebScout 2.1 (globalpatrol.net) | ||
For example, you can block access to yahoo.com/games, all EXE files, or permit access during lunch hours only. Besides blocking access, you can also speed throttle certain requests to a slower speed so that they do not congest your network. For example, you can speed throttle MP3, EXE and ZIP file downloads to a maximum of 10 KB/s per user. WebScout includes a | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1068 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
785. | SecurPad 1.2 (intellisoftdesign.com) | ||
data. It is often used to send encrypted documents over email or to protect sensitive information such as passwords, credit card numbers, or any other confidential data. The editor utilizes 256-bit Advanced Security Standard (AES) symmetric encryption based on the Rijndael algorithm, which guarantees high security and confidentiality. SecurPad is a secure alternative to WordPad that | |||
Updated: 3, 2005 | Rating: 0 | Size: 670 kb | Shareware Similar programs | |||
786. | 1st Evidence Remover 2.14 (softheap.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
787. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
Pro protects sensitive data on your notebook or PC. It creates virtual encrypted disks, which work as common disks. All content of these disks is encrypting on-the-fly with strong crypto-algorithms. To mount disk a password and an external key is required. Any files, documents and databases can be kept on and opened directly from encrypted disks. The content of disk is | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
788. | 4UOnly 1.2.7 (dillobits.com) | ||
of these programs is that they use a master encryption password to protect your list of accounts and passwords from disclosure. It then becomes very tedious to specify this password each time you wish to access your password list so there is often a tendency to choose weak password since they are | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
789. | 4UOnly 1.2.7 (dillobits.com) | ||
of these programs is that they use a master encryption password to protect your list of accounts and passwords from disclosure. It then becomes very tedious to specify this password each time you wish to access your password list so there is often a tendency to choose weak password since they are | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
790. | dfg ShutDown XP 3.7.2 (members.aon.at) | ||
clock function (alarm sound). Optionally will dfg ShutDown XP will protect the computer while you are absent. You can also launch a program (and wait for exit) before shutdown e.g. to start your daily backup program. All actions (log off, shut down, restart, etc. including system crash info) together with time and userID will be stored in a log file. Synchronization from your | |||
Updated: 9, 2005 | Rating: 0 | Author: victoria gross | Size: 1057 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Protect files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|