|
||||||
|
||
|
Home > Information privacy software |
Related keywords: privacy, information, internet privacy, personal information manager, Privacy, Information, online privacy, Personal Information Manager, information manager, privacy software |
|
|
81. | Cloak 8.0 (insight-concepts.com) | ||
award winning security package designed to safeguard your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system. In addition to | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
82. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
an internal Safe inside your computer where you can store your vital information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection, event recording, and notification | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
83. | Complete Cleanup 4.83 (softdd.com) | ||
you browse the internet many websites store information about your browsing habits on your computer. Every webpage you browse is also stored on your machine, and this can allow anyone who shares your computer with you to snoop and view what type of websites you have been visiting. Complete Cleanup displays all your file statistics, improves pc performance, and cleans up all cookies | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
84. | CryptEnCrypt 1.10 (inetprom.com) | ||
forget your password then you will not be able to decrypt data and information will be unrecoverable. CryptEnCrypt allows you to choose several encryption algorithms to protect your data. These are AES, Triple-DES, GOST, RC2, RC4 and Data Protection API based algorithms. Strong encryption ensures that your information would not be easily stolen from your computer by hackers | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | CryptoForge 3.2.5 (cryptoforge.com) | ||
for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later, the information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | DriveScrubber 2.0a (iolo.com) | ||
format or operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously existed thereon. Most people believe that when a drive is | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
87. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
88. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
89. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
90. | Evidence Destructor 2.14 (emailarms.com) | ||
or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Information privacy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|