|
||||||
|
||
|
Home > Secure file software |
Related keywords: file, secure, File, file transfer, file management, file encryption, file manager, file sharing, Secure, file backup |
|
|
441. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
442. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
443. | Puffer 4.02 (briggsoft.com) | ||
utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
444. | pwArch 1.0 (clarktisdale.com) | ||
to use and free. Your password data is stored in an encrypted .zip file, so it is secure. Store your passwords with a user by site or description. Passwords can be generated to be a specified length, with an adjustable set of characters, or by specifying a template for the password to follow. Once a password is generated it can be stored in the archive and retrieved | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Tisdale | Size: 246 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
445. | Quemix Utilities 2.0c (quemix.com) | ||
you will be able to visualize your documents. Protect any type of file, texts, spreadsheets, databases, photographs, Quemix Utilities helps keep your computer running at top efficiency and speed with powerful tools to optimize system performance and diagnose, repair and prevent PC problems and | |||
Updated: 8, 2004 | Rating: 42 | Size: 4667 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
446. | QuickWiper 7.6.3 (aks-labs.com) | ||
is a disk and file wipe utility. QuickWiper allows to wipe files in handy manner. Wiping free disk space option protects all the files you ever delete before beginning using QuickWiper. System Clearer clears in one-click cookies and history, IE cache and typed URLs, temporary and recent files. QuickWiper has several security modes. You can use | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
447. | Quicky Password Generator - Shareware 2.0 (quickysoftware.com) | ||
and can be copied to your clipboard easily or exported to a file. You can specify random passwords to be generated from alphabetic, numeric, alphanumeric, uppercase only, lowercase only, mixed and/or specified characters. Passwords can be variable length and may include special characters. Most feedback is included in future versions of the program The Quicky Password | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 610 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
448. | R-Wipe & Clean 5.1 (r-tt.com) | ||
& Clean is a complete solution to wipe useless files and keep your computer privacy. Irretrievably deletes private records of your on- and off-line activities, such as temporary internet files, history, cookies, autocomplete forms and passwords, swap files, recently opened documents list, Explorer MRUs, temporary files, etc. and free up your disk space. The | |||
Updated: 9, 2005 | Rating: 381 | Size: 1607 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
449. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
the most secure method to create passwords. Rated 5-Stars by ZDNET. This software may create up to 10,000,000 unique passwords with as many as 60 characters each in a single batch. You can run as many batchs as desired. Therefore, this software will NEVER run out of passwords, it will be useful for years. You may select the password criteria using numbers, upper and lowercase | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
450. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
unattended and automatically to regularly save important data securely off-site. A versatile scheduler launches the online backup Client, usually at night when computers are not being used. It compresses and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
451. | Reclip 2.2.2 (lockettefamily.com) | ||
the toolbar or system tray icon. - Installs cleanly, only 2 files are copied to your system (1 program file and 1 help file). - Uninstalls completely, removes all associated INI files and registry entries. - Online help. - Free upgrades for registered users. 95/98/NT4 that organizes all | |||
Updated: 9, 2005 | Rating: 0 | Author: Ragan Lockette | Size: 539 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
452. | Recover4all Professional 2.26 (recover4all.com) | ||
the Recover4all® Software you can easily recover (undelete) files that were accidently deleted under Windows. It does not matter if the files went through the recycle bin (and have been lost since the bin was emptied) or were directly deleted. The program is fast and very easy to use. To prevent files that were already deleted from becoming overwritten, Recover4all® | |||
Updated: 9, 2005 | Rating: 48 | Author: Advanced Utilities GmbH | Size: 386 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
453. | Remote Administrator 2.2 (radmin.com) | ||
the award-winning remote control program that is fast, reliable and secure, which enables you to work on one or more remote computers from your own computer. You see the remote computer desktop displayed either in a window or full screen on your computer monitor. All your mouse and keyboard functions | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
454. | RemoteExec 3.07 (isdecisions.com) | ||
machines. RemoteExec® will dramatically minimize, simplify and secure all software and operating system administration tasks (Application and upgrade deployment, script and batch launching…), without disrupting on-going production. FEATURES: - Remote running of program files (.exe, .bat, .cmd…), scripts (.vbs, .js…) and all associated file types (.doc | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
455. | #Remove Access Security 3.0 (e-tech.ca) | ||
reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords, corrupted workgroup files, forgotten passwords | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
456. | SafeBox Industry 1.0 (aidsoft.com) | ||
Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
457. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
the encrypted volumes require password authentication before the files become accessible. SafeHouse provides transparent on-the-fly hard drive encryption for your PC. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse appears to Windows as another drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
458. | SafeOffice 1.1 (codetek.com) | ||
own personal preferences. The internet applications currently secured by SafeOffice include: - Microsoft Internet Explorer 6.0 - Microsoft Outlook Express 6.0 - Microsoft Outlook (2000 and 2002) - AOL Instant Messenger - Netscape 6 - Microsoft Windows Messenger - And others. SafeOffice protects you from being attacked through common internet | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
459. | ScreenLock 9.0 (screenlock.com) | ||
others to guess what the answer is. ScreenLock is an excellent PC & file security program providing easy, yet secure access to your computer while denying other's attempts to access your computer. Keep children, intruders and unwanted visitors from using the Internet or your | |||
Updated: 8, 2004 | Rating: 0 | Author: Gregory Nelson | Size: 1977 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
460. | Search and Recover 3.0d (iolo.com) | ||
tools designed to allow you to quickly recover deleted or destroyed files, folders, songs, pictures, videos, programs, critical system components, web pages, and even email messages in Microsoft Outlook and Outlook Express, Netscape, and Eudora. It works with any hard or floppy drive, any drive format, and can even recover deleted items from digital cameras, MP3 players, USB flash | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Secure file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|