|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
321. | Free Internet Eraser 2.05 (privacyeraser.com) | ||
Internet Eraser is an Internet privacy software that protects your Internet privacy by permanently erase internet history and past computer activities. Even though, many of the tasks can be performed manually, Free Internet Eraser can automate this process for you. Free Internet Eraser allows you to erase history, erase Internet history, internet cache, cookies, address bar search | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Kent | Size: 852 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
322. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
323. | GRL RealHidden 1.0 (grltechnology.com) | ||
RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
324. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
With a single mouse-click, Heidi R. Stealthy (TM) allows you to instantly conceal your current PC or laptop activities from your friends, family, coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
325. | Hide & Protect any Drives 2.01 (softstack.com) | ||
of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media. Protect Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives. Stop unauthorized software installations and data leak by removable | |||
Updated: 2, 2006 | Rating: 244 | Author: IM Soft | Size: 764 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
326. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
327. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
328. | Identity Knight 1.3 (fspro.net) | ||
of identity theft in the last five years! Holes in Internet Explorer software allowing 3rd party programs access to your private data surely help this number grow. So, is there a way to prevent identity theft? Yes! There is! Introducing Identity Knight: the unique credentials protection software that makes sure that no data from the IE AutoComplete list is left unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
329. | IIPwr Package 2.00 (iipwr.com) | ||
what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the data to your email. KeySpy's seamless installation makes it | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
330. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|