|
||||||
|
||
|
Home > Self help software |
|
|
71. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
- Catches and deletes spam BEFORE it reaches your inbox. - Self learns based on your spam and good email and adapts to new types of spam. - Detects spam with great precision and accuracy. - Stops viruses and malicious code. - Safe email preview - no pictures are downloaded, no hidden scripts or codes are executed. - Cuts down unproductive email traffic and saves bandwidth | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
72. | Hara-Kiri 2.02 (cyteg.com) | ||
way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
73. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Assistant and System Security Check. These new features will help the user construct a computing environment free of external threats. Includes many features designed for home users, shared computers, and the mobile professional. The self-decryptor lets you send or distribute encrypted files with peace of mind. Instead of simply locking your file or folder, Icon | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
74. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
75. | PicoZip Recovery Tool 1.0 (picozip.com) | ||
Recovery Tool is an easy-to-use program that can help you recover lost or forgotten passwords from password protected Zip files created by compression utilities like PicoZip, WinZip, PKZip, etc. Self-extracting Zip files are also supported. You have a choice of Brute Force or Dictionary based recovery methods. A 650,000+ words English dictionary is included. This program is | |||
Updated: 9, 2005 | Rating: 42 | Author: Christopher Tan | Size: 2794 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
76. | Splitty 3.0 (basta.com) | ||
The problem with files these days is disk size; floppy, zip and even CD-ROM disks have a modest capacity, especially when "small" downloads are often several megabytes in size and average ones are much larger. Even word processor files have been growing at an alarming rate, with embedded fonts and graphics | |||
Updated: 3, 2005 | Rating: 0 | Size: 494 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
77. | WinImage 8.00 (winimage.com) | ||
a need arises. In combination with a CD creating tool, WinImage can help you create your own custom boot disk with hardware diagnostic or virus cleaning software to bring a problem PC back up and running without being in Windows. As a hard-disk backup solution, WinImage allows you to save hours and even days restoring a system and configurations on a machine that has experienced a | |||
Updated: 2, 2006 | Rating: 42 | Author: Gilles Vollant | Size: 621 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
78. | XLRSecTool for Linux 1.0 (xlreader.com) | ||
helps creating either self-signed certificates or trusted CA (Certificate Authority). Once the certificate issued, you may sign your documents (JAR or XLR), applications, and applets (for use with SUN's JavaPlugin) The appli contains a step-by-step help to create your trusted certificate issued by Thawte or Verisign certificate authorities. XLRSecTool | |||
Updated: 8, 2004 | Rating: 42 | Author: Robert Della Malva | Size: 25400 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
79. | Zipfusion 3.1 (skaro.net) | ||
is a versatile self-extractor. It can be used with any zip tools that create type 0/8 (stored/deflated) format zip files e.g. WinZip (tm). Features include : three operational modes making it suitable for distribution of data files or software, end-user dialogs that can be easily translated into other languages, a sophisticated configuration editor, extensive online | |||
Updated: 3, 2006 | Rating: 0 | Author: James Turner | Size: 326 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
80. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
encrypt and encode data into text just as easily. The fully self-contained ActiveX control at the core of the library is all you need to include with your projects. It has no external dependencies such as MFC DLLs, runtime libraries or other resources. That translates to minimal hassle at distribution time. The library also supports all the available ActiveX functionality | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
|
Home > Self help software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|