|
||||||
|
||
|
Home > Software > Security & Privacy > Popular |
|
|
101. | 5Loaves 1.4 (ub2b.com) | ||
An open source, cross platform, secure, internet tunneling platform with file transfer, web server, remote admin, proxy, and load balancing. Enables connections through or around firewalls and across sub-networks. No installer is needed - the entire application is a single .EXE configured through an ASCII | |||
Updated: 9, 2005 | Rating: 148 | Author: Brian Aberle | Size: 2547 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
102. | Advanced Tracks Eraser 2.5 (benutec.com) | ||
Your computer is spying on you now! Windows stores all the tracks on your hard disk. Anyone using your computer can see where you have been on Internet, what images and movies you have seen and others could see even anything you have done on your computer. The Windows built-in functions will not protect you | |||
Updated: 9, 2005 | Rating: 146 | Author: Alex Freeman | Size: 603 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
103. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
Cryptainer LE Ttotally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
104. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
Typically you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
105. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
PC Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected while monitoring are saved to the encrypted log file located on the user's machine. The monitoring program works in the background | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
106. | TZ System Cleanser for Windows 5.0.0.2 (trackzapper.com) | ||
Shreds and Cleans cache, cookies, history, typed URLs, autocomplete memory, index.dat from your browser & temp folder, run history, search history, open/save history, recent documents, & more. Works with browsers AOL, IE, MSN Explorer, Opera, Juno & Netscape. TZ Windows Cleaner is a powerfull set of tools to | |||
Updated: 8, 2004 | Rating: 133 | Author: Ahmad Ayman | Size: 3314 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
107. | AntiVirus for MDaemon 2.2.9 (altn.com) | ||
AntiVirus for MDaemon is a virus scanner designed to detect malicious content embedded or attached to email messages. AntiVirus software integrates seamlessly with MDaemon on the server, stopping viruses, worms, or trojans before reaching individual users on the network. Features include heuristic detection | |||
Updated: 9, 2005 | Rating: 132 | Author: Arvel Hathcock | Size: 8329 kb | Demo Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
108. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
Advanced Anti Keylogger is powerful but easy to use anti-spy software to prohibit operation of any keyloggers currently in use or presently being developed anywhere. Once installed our anti-spy software will protect your privacy immediately and constantly. One particularly scary and dangerous feature of all | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
109. | absoluteTools-PassGen 1.0.0.0 (abspdf.com) | ||
A small utility to generate robust passwords of fixed length pronounceable or with digits or caps or h4ck3r talk style characters. This improves security since generated passwords aren't open to dictionary based attacks and can't be guessed using personal information about the owner. Easy to use, easy to Easy to use, easy to activate with Registration Wizard | |||
Updated: 9, 2005 | Rating: 132 | Author: Paolo Asioli | Size: 1171 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
110. | Advanced ACT Password Recovery 2.02 (elcomsoft.com) | ||
A program to recover or replace lost or forgotten passwords to protected BLB, MUD and ADF files created in ACT! contact management software (from Symantec and Best Software). All versions of ACT! (up to ACT! 2005) are supported. The passwords are recovered (for version 2005, removed or replaced) instantly | |||
Updated: 9, 2005 | Rating: 130 | Author: Vladimir Katalov | Size: 417 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
111. | SignIt! for Windows 1.1 (xlreader.com) | ||
3 features: 1) Sign a JAR file (main function) Objective: ensure integrity (protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, 1) sign a JAR file (main function), 2) create private keys, 3) manage private keys | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
112. | SafeLaunch 2.0 (safelaunch.com) | ||
Our virtual sandbox technology protects your system's integrity when running untrusted software. When you first run a program, you are allowed choose which types of activity you will monitor. Any attempt to modify files or the registry, to access a device directly, or to connect out over the network will | |||
Updated: 8, 2004 | Rating: 128 | Shareware Go to category: Security & Privacy > Other Similar programs | |||
113. | Lock Folder XP 3.4 (everstrike.com) | ||
Lock Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
114. | Eyes&Ears 1.8 (intech2.com) | ||
As seen on ZDTV's Call for Help, Eyes-N-Ears is a surveillance/webcam package that integrates frame-grabbers, webcams and sound cards into a powerful and easy to use package. Includes automated FTP and SMTP uploads, even over dialup lines. Video capture sessions can be motion-sensitive or time-lapsed | |||
Updated: 8, 2004 | Rating: 124 | Author: Kevin Crawford | Size: 2428 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
115. | AAA HTMLEncryptor 1.21 (share2.com) | ||
AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors. AAA HTML Encryptor can encrypt html web pages and make them unreadable. As a result, the source code of the website was protected from being analysed by hackers or competitors. | |||
Updated: 9, 2005 | Rating: 124 | Author: JiaFu Li | Size: 479 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
116. | GreatCrypt 2.0 (miraxus.com) | ||
GreatCrypt is a powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
117. | Outlook Password Recovery 1.3 (thegrideon.com) | ||
-- Outlook Password allows you to recover passwords which MS Outlookâ„¢ Personal Storage (.PST) files are protected with (including multilingual and Unicode ones). -- Outlook Password can also recover account information. Your emails addresses, mail server addresses (pop3, imap, http), usernames for email | |||
Updated: 9, 2005 | Rating: 124 | Author: Maxim Tomashevich | Size: 564 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
118. | Webroot Spy Sweeper 4.5 (webroot.com) | ||
NEW Spy Sweeper 4.5 takes another leap ahead of the competition. As the leading anti-spyware product available, it detects and completely removes the nastiest spyware out there like Elite Keylogger, LOP, Trojan Backdoor-Haxdoor & iSearchDesktop. Webroot pioneered always-on protection and arms Spy Sweeper with | |||
Updated: 2, 2006 | Rating: 124 | Author: Webroot Software | Size: 8959 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
119. | SuperCleaner 2.89 (southbaypc.com) | ||
SuperCleaner is an all in one disk cleaner for Windows. Its built-in Garbage Finder can find hundreds or even thousands of megabytes of unneeded files taking up space on your computer. The Internet Privacy features of SuperCleaner will let you erase your web browser's cache, history, cookies, and even the | |||
Updated: 2, 2006 | Rating: 121 | Author: South Bay Software | Size: 409 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
120. | FolderSafe 2.1 (occultsoft.com) | ||
What is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI - Easier | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
121. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
More than an AntiVirus product, BitDefender Professional ensures antivirus protection, as well as data confidentiality, active content control and Internet filtering. BitDefender Professional is an ICSA Labs certified solution for Microsoft Windows XP, allowing users to enjoy their data protection as they solution for Microsoft Windows XP, allowing users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus protection, features as Internet filtering or | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
122. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
Computers play significant role in our everyday life. We rely on tireless machines in almost every aspect of our business and private life. Everything from important corporate budget planning to vacation photos comes digital. And as we enjoy this new electronic world we sometimes seem to forget how many | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
123. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
124. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
125. | Crypton 1.0 (uic.nnov.ru) | ||
Crypton is a multi-utility security suite, which provides strong security for you files. Crypton uses Blowfish algorithm for encryption and decryption, also allows file compression and file Wiping (Completely removing the file and all traces of it's data). Crypton is a multi-utility security suite, which provides strong security for you files | |||
Updated: 3, 2005 | Rating: 114 | Author: Sergey Semin | Size: 495 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
Secure Disk Pro completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
127. | Keyboard Collector 2.07b (softdd.com) | ||
Secretly log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard Collector | |||
Updated: 2, 2006 | Rating: 113 | Author: SoftDD Software | Size: 715 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
128. | Access Administrator 4.14 (softheap.com) | ||
Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
129. | BitDefender Professional Plus 9 (bitdefender.com) | ||
Antivirus - Heuristic in Virtual Environment Permanent antivirus protection peer-2-peer application protection innovatvative behavior blocking full e-mail protection Firewall - Internet Traffic Control active content control dial control cookie control Antispam - Anti-phishing self-learning bayesian filter | |||
Updated: 2, 2006 | Rating: 108 | Author: Alix Aranza | Size: 17010 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
130. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
Internet Cleaner is an award-winning privacy protection and hard drive clean-up utility that helps you remove all traces of your online and offline activity and free up some space on your hard drive by removing the unnecessary files. As its name implies, Internet Cleaner can easily eliminate all records of | |||
Updated: 2, 2006 | Rating: 107 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
131. | encryptX SecurDataStor Premium 6.0 (encryptx.com) | ||
encryptX SecurDataStorâ„¢ Premium is a strong file encryption program for Windows. Encrypt files, folders and CD, DVD on local and networked drives; encrypt email attachments using a simple, intuitive interface. Hide encrypted folders and share sensitive data with recipients who can view decrypted files | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
132. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
Anti-keylogger for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs | |||
Updated: 2, 2006 | Rating: 107 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
133. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
Typically you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
134. | InfoLock 1.51 (whimsysoft.com) | ||
Interlock 1.5 InfoLock is a software that can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information,such as DES | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
135. | CleanCache 3.1 (buttuglysoftware.com) | ||
CleanCache 2.0 is a free (for 1 - 2 systems), very powerful Internet Explorer 6.0 and Windows 2000/XP cleaner. It will delete all IE tracks (including cleaning/deleting index.dat files), Mozilla, Firefox, Opera, AutoComplete, WinXP tracks and the deletion of user created additives. The following is a | |||
Updated: 9, 2005 | Rating: 101 | Author: William Baugh | Size: 1243 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
136. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
137. | Anti-BO 1.5b (swiftp.com) | ||
Anti-BO is a listening device which sits in your system tray awaiting hack attempts from Trojan programs like Back Orifice and Netbus. The program works my making your system look vulnerable to those who scan the internet for infected machines, and logs attempts of entry with your attackers IP address & | |||
Updated: 3, 2005 | Rating: 95 | Author: Ben Hynes | Size: 1100 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
138. | Atomic Mailbox Password Cracker 2.00 (atompark.com) | ||
Atomic Mailbox Password Cracker is a software solution capable of recovering lost or forgotten mailbox passwords for the e-mail clients that work with mail servers using POP3 and IMAP4 protocols. The program is universal and is independent of the e-mail client work design. Current version has a user-friendly | |||
Updated: 9, 2005 | Rating: 95 | Author: Andrew Koptiaev | Size: 1370 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
139. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
Remove Internet tracks and past computer activities. It can quickly erase your cache, cookies, history, visited URLs, typed URLs, index.dat, Clean Forms Passwords data, temp folders and more. The cookie-cleaning and typed URLs feature allows you to specify which item to keep, so that you don't erase your | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
140. | Tracks Eraser Pro 5.61 (acesoft.net) | ||
Your computer is spying on you now! It stores all the evidence of your activities into your hard disk. Anyone using your computer can see where you have been on Internet, what images and movies you have seen, and even anything you have done on your computer could be seen by others. The Windows built-in | |||
Updated: 2, 2006 | Rating: 90 | Author: Acesoft | Size: 1624 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
141. | I-Cipher AP 2.2.2 (ambitware.com) | ||
Extremely fast and reliable image file encryptor/decryptor with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images | |||
Updated: 9, 2005 | Rating: 90 | Author: Peter Vlach | Size: 4927 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
142. | Crypto Anywhere - OpenPGP Edition 2.0 (bytefusion.com) | ||
Secure Email .Standalone or integrated with Outlook Express. Can decrypt and encrypt messages to friends using PGP, OpenPGP, SecExMail and many more. Crypto Anywhere allows you to make a travel floppy which can be used in internet cafe's or at work. You don't even need to install the software - just run it | |||
Updated: 9, 2005 | Rating: 86 | Author: Bytefusion Sales | Size: 2987 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
143. | Advanced WordPerfect Office Password Recovery 1.22 (elcomsoft.com) | ||
A program to recover lost or forgotten passwords to Corel WordPerfect Office documents: WordPerfect (*.wp, *.wpd), QuattroPro (*.qpw, *.wb?, *.wq1, *.wq2), Paradox (*.db). All versions of WordPerfect Office and its components and protection modes are supported; the passwords are being recovered instantly or | |||
Updated: 2, 2006 | Rating: 86 | Author: Vladimir Katalov | Size: 545 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
144. | Password Reminder 1.6 (newpowersoft.com) | ||
Password Reminder is easy to install and easy to use. All you need to do to recover a password is just drag the magnifying glass from Password Reminder over the "****" field.It can reveal almost any password in Windows--IE Password,Administrator Password in 2000/NT,Cache Password in 95/98/ME,etc.With this | |||
Updated: 3, 2005 | Rating: 86 | Author: Yong Li | Size: 721 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
145. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
Absolute Key Logger is a small program that records all keystrokes into a log file, so that you can use this data later. You can use Absolute Key Logger to: - restore lost typed text. Computers can suddenly crash, freeze or get accidentally reloaded. Or you can lose your text data while filling out web - restore lost typed text in documents and web forms - find forgotten passwords and logins - have full control of your computer, control your kids and employees | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
146. | AnVir Virus Destroyer 3.7 (anvir.com) | ||
Antivirus tool that protects computer against viruses and manages running processes and startup files. 1. protect computer from been infected with viruses 2. cure infected computer 3. view full info about running processes including processor and memory usage 4. manage Windows startup files 5 | |||
Updated: 9, 2005 | Rating: 82 | Author: Ivan Ivanov | Size: 350 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
147. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
Evidence Killer 2005 completely eliminates all hidden evidence of activities on your computer and allows you to clean up the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
148. | Groone's Macroer 2.6 (groonesworld.com) | ||
Never worry about repitive tasks again! Groone's Macroer simplifies those redundant day to day tasks. By creating simple text routines you will free up hours on the keyboard. There are no complicated scripting languages to know and no list of forced to remember keyboard strokes. YOU define everything. Now | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
149. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
150. | P-Encryption Suite 3.6.2.11 (cadabrasoftware.com) | ||
P-Encryption Suite is a powerful encryption program for the windows operating system used to store your private documents into a single encrypted file. There are two different encrypted archives P-Encryption Suite can create, Stealth and Normal. Stealth archives are PES archives disguised as a different file | |||
Updated: 2, 2006 | Rating: 82 | Author: Josh Sanford | Size: 10092 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Software > Security & Privacy > Popular |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|