|
||||||
|
||
|
Home > Files security software |
Related keywords: security, files, Security, computer security, internet security, hide files, security software, Files, PDF files, compare files |
|
|
801. | Mutilate File Wiper 2.92 (home.att.net) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
802. | My Personal Favorites 3.3 (webroot.com) | ||
from prying eyes, maintains user names and passwords in encrypted files, organizes your bookmarks into clear and concise groups, and allows you to move bookmarks easily from any browser to another and back! Even better - multiple users on the same system can maintain their own My Personal Favorites | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 1060 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
803. | PalmTree 3.5 (clickok.co.uk) | ||
lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full | |||
Updated: 9, 2005 | Rating: 42 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
804. | Paper Shredder 1.3 (winmeta.com) | ||
(Delphi, Visual Basic, Visual C++) Empty Recycle Bin and Temporary Files Automatically clear items at startup, shutdown and timed intervals Smart Eject CD-ROM, when windows shutdown or log off Compatible with Internet Explorer (4.x or higher) Compatible with Windows 98, 2000, ME, XP Friendly | |||
Updated: 9, 2005 | Rating: 0 | Author: Duo Yi | Size: 715 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
805. | Password Depot 2.0.8 (hello-engines.com) | ||
on USB flash drives with the help of the wizards. - Perfect local security: You can use the lock function to restrict other user’s access to your personal passwords. - Passwords analyzer: Check and improve the quality of your passwords. - Decrypt and encrypt external files | |||
Updated: 9, 2005 | Rating: 42 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
806. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like. You can have the | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
807. | Password Security Vault 2.0 (hirtlesoftware.com) | ||
Security Vault stores your personal passwords as well as login names for Internet sites. Most Internet users have numerous web sites which they frequent that require memberships. Simply remember your password for this software and you can forget every other password since this program will keep track of them for you. Includes many handy features to make your web surfing a simple | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 4764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
808. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
809. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
810. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Files security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|