|
||||||
|
||
|
Home > Secure mail software |
Related keywords: mail, e mail, secure, Mail, mail server, E mail, mail merge, Secure, bulk mail, send mail |
|
|
71. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and configure | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | ProBot SE 2.3.0 (nethunter.cc) | ||
keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for monitoring Internet activity because it enables you view all of the Web site URLs visited by a subject. ProBot SE is capable of | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Puffer 4.02 (briggsoft.com) | ||
utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | MediaRECOVER Data Recovery 3.0 (mediarecover.com) | ||
with hard drives, removable media such as compact flash, SmartMedia, secure digital, and xD. FEATURES -Restores your lost images, audio and video and allows you to preview recovered files before saving. -Works with all digital camera media, hard drives, floppy disks, etc. -Recovers your deleted, corrupt, lost or formatted files. -Supports all multimedia file types including JPG | |||
Updated: 9, 2005 | Rating: 58 | Author: MediaRECOVER LLC | Size: 2946 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
75. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
76. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
77. | Identity Knight 1.3 (fspro.net) | ||
machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
79. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
80. | Email Audit 3.2 (km-vision.com) | ||
add-in utility for Microsoft Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs belonging to your friends, colleagues | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secure mail software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|