|
||||||
|
||
|
Home > Sensitive information software |
|
|
71. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
of very different operation principles. Due to the Anti-keylogger's protection spy software will not be able to record and steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | Cartagio Pro 1.0.3.86 (missiontrek.com) | ||
into Snippets folders e.g. news items, prices, web forms, contact information (they might otherwise be gone next time you visit!)... · Create educational tours for use by others. In addition, with Cartagio Pro or Enterprise: · Access your projects from anywhere, · Team with your colleagues and clients on work projects, · Collaborate in real-time on project content and | |||
Updated: 9, 2005 | Rating: 42 | Author: John Moetteli | Size: 4532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Chameleon 2.0 (members.optushome.com.au) | ||
software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
74. | CHAOS Shredder 3.0 (safechaos.net) | ||
disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
75. | Cleaner 1.1 (softcomplete.com) | ||
after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that after deleting files in Windows, they can be restored. Cleaner securely deletes file data, located | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | ComfortAir HVAC Software 4.0 (comfortair-software.com) | ||
summary reports for peak conditions and a host of other useful information, such as reports and graphs of glass shading, from external shading devices like fins and overhangs. An example of how the hourly load tables can be useful, is in the design of thermal storage air conditioning systems, where ton-hour (kilowatt-hour) calculations have to be made in order to size the storage | |||
Updated: 2, 2006 | Rating: 79 | Author: Claon Rowe | Size: 1580 kb | Demo Go to category: System Utilities > Other Similar programs | |||
77. | Cryptgine Archiver 1.05 (infolocks.com) | ||
distributing sensitive files over the internet or storing sensitive files that are used infrequently, protect them with unbreakable and customizable security. The first in the Cryptgine application series, the Cryptgine Archiver creates file archives that are both compressed and/or encrypted. The encryption method used to secure the data can be the included 256 bit AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Info Locks | Size: 94264 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
78. | CryptoForge 3.2.5 (cryptoforge.com) | ||
professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | Data Destroyer 1.5 (braintwist-studios.com) | ||
Windows stores information about the programs you use, the documents and pictures you view, including many other things. Each application you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Sensitive information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|