|
||||||
|
||
|
Home > Files security software |
Related keywords: security, files, Security, computer security, internet security, hide files, security software, Files, PDF files, compare files |
|
|
871. | ScreenLock Pro 2.0.41 (screenlock.com) | ||
World's Editor's Pick.! ScreenLock is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make ScreenLock ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to remember your question, and virtually impossible for others to guess what the | |||
Updated: 8, 2004 | Rating: 65 | Author: Gregory Nelson | Size: 5254 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
872. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
you to: save your records to more than one DesktopSafe database files; export/import your data to and from your PocketPC provided you have Cresotech PocketSafe installed there; adjust the program appearance (bacground colors and bitmaps used); remove final advertising screens on exit. With DesktopSafe Pro, you can easily export/import your data to and from your Pocket PC - just | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
873. | Data Destroyer 1.5 (braintwist-studios.com) | ||
you use generates its own history data, access logs, temporary data files, and each file contains time and date stamps. To ensure corporate and personal data security, this information, along with any Recycle Bin activity, all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
874. | Hiding CHAOS 5.6 (safechaos.net) | ||
a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient and user-friendly. The program has | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
875. | Online Services Center 2.3 (itlaurel.com) | ||
shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, OSC has great "Reports" section, covering all kinds of | |||
Updated: 8, 2004 | Rating: 0 | Author: Janice Petros | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
876. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can launch or delete PC | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
877. | Retrieve PDF V1.0001 (software.ebandwagon.co.uk) | ||
designed for the recovery of content from PDF files that have been locked, either where you have forgotten the user password, and so cannot even open the file to read it, or if you have just forgotten the owner password, and so cannot edit, copy, or print the file. This software was designed by our inhouse team due to a requirement from the publishing department | |||
Updated: 8, 2004 | Rating: 0 | Author: Neil Plummer | Size: 1418 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
878. | ScreenLock 9.0 (screenlock.com) | ||
others to guess what the answer is. ScreenLock is an excellent PC & file security program providing easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
879. | Security23 1.00 (security23.com) | ||
powerful tools to save your privacy in windows XP and protect your files from hackers , it contain those tools : personal firewall , useless files eliminator , files and folders encryptor , spay ware terminator , internet data eraser , memory optimizer , binary data eliminator , developed system information , programs uninstaller , plugs ins eliminator ,ports | |||
Updated: 8, 2004 | Rating: 0 | Author: Dored Ghanem | Size: 3544 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
880. | Service Center Operator 2.3 (newageit.com) | ||
shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, Service Center has great "Reports" section, covering all kinds | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Files security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|