|
||||||
|
||
|
Home > Workplace safety software |
Related keywords: safety, workplace, Material Safety Data Sheet, internet safety, child safety filter, child safety, Internet Safety, computer safety, Data Safety, Internet Child Safety |
|
|
121. | CHAOS Messenger 4.0 (safechaos.net) | ||
CHAOS Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
122. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
CHAOS Self-Decryptor is the utility program that creates self-decrypting chaos files for Windows. Self-decrypting chaos files are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
123. | CHAOS Shredder 3.0 (safechaos.net) | ||
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
124. | Cloak 8.0 (insight-concepts.com) | ||
Cloak is an award winning security package designed to safeguard your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
125. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
126. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
127. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
128. | DriveScrubber 2.0a (iolo.com) | ||
its file format or operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously existed thereon. Most people believe that when a drive is | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
129. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
130. | febooti fileTweak 1.3 (febooti.com) | ||
Change file / folder date, time (timestamp) and attributes. Expands Windows "property" tabs to display additional file properties. View file and folder content (copy file list to clipboard). View file and directory description. Easy to use. It has an ability to manage Creation date, Modified date and Last | |||
Updated: 9, 2005 | Rating: 0 | Author: febooti software | Size: 356 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Workplace safety software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|