|
||||||
|
||
|
Home > Secure file software |
Related keywords: file, secure, File, file transfer, file management, file encryption, file manager, file sharing, Secure, file backup |
|
|
421. | PDF Password Remover 2.5 (verypdf.com) | ||
Password Remover can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
422. | PDF-Pro Gold 1.1 (pdf-pro.com) | ||
Gold is a simple and fast tool to create and secure PDF files. It converts complex documents into PDF format 5-8 times faster than competitors. With simple and intuitive user interface, PDF documents can be created in a few seconds. In addition, PostScript based converting engine enables richer output than GDI based PDF creators. Features include PDF Creation, PS2PDF | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeong Kim | Size: 9042 kb | Shareware Go to category: Business > Other Similar programs | |||
423. | PDFWiz 1.0 (gnostice.com) | ||
PDFWiz supports filling and reading of PDF forms, compressing, securing, appending and merging of multiple PDF documents, stamping, setting bookmarks, and many more functions that can transform plain PDF documents into customized, easy to use containers of information. PDFWiz operates on existing PDF documents and can even create new ones by extracting pages from existing documents | |||
Updated: 9, 2005 | Rating: 0 | Author: Girish Patil | Size: 2185 kb | Commercial Go to category: Business > Other Similar programs | |||
424. | PixxxSafe 2.1.001 (studioahm.com) | ||
slide shows. Export, share or archive your encrypted image series. Secure 256 bit AES encrypted image library with batch downloader and animated slideshow | |||
Updated: 9, 2005 | Rating: 0 | Author: Studio AHM | Size: 2469 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
425. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
426. | pornOUT 1.0 (pornout.com) | ||
your kids, clients, and employees are surfing. Pornout™ is extremely secure by offering the latest in browser-workstation technology. Pornout™ uses two separate lists to control web browsing. By using the block list, you can stop the loading of unwanted sites. By using the bypass list, you can enable | |||
Updated: 3, 2005 | Rating: 227 | Author: Silvio Kuczynski | Size: 516 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
427. | Power Clock 6.03 (powerclock.com) | ||
and out using specially coded cards. Automatic synchronization of files among different physical locations. Power Clock can connect to remote sites via the internet or any TCP/IP network. If you have a central office and several stores or job sites, your stores can connect to the home office via | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
428. | Power Clock 5.26 (powerclock.com) | ||
and out using specially coded cards. Automatic synchronization of files among different physical locations. Power Clock can connect to remote sites via the internet or any TCP/IP network. If you have a central office and several stores or job sites, your stores can connect to the home office via | |||
Updated: 9, 2005 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
429. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
430. | PowerKey 2.11.01.22 (elcor.net) | ||
easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool designed to avoid restoration of sensitive data. It has in-built AntiPasswordSpy code | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
431. | PPPshar Pro 1.9 (pppindia.com) | ||
included. PPPshar Pro allows or blocks access to IP addresses and file types. This security feature can also be used by ADSL/cable modem users as a firewall to prevent attacks on their computers. PPPshar Pro is a proxy server that enables you to share a single Internet connection of any type | |||
Updated: 9, 2005 | Rating: 0 | Author: kanda samy | Size: 143 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
432. | Prevent Deletion 1.0 (members.tripod.com) | ||
this program you can prevent the deletion of certain files/folders on a shared drive in your network. For example you've got a file you want to show to your friends. So you copy it to a shared drive in your network, and ask your friends to check it out. But some jealous freak keeps on deleting it. This program will check whether your file exists on the shared drive | |||
Updated: 9, 2005 | Rating: 16 | Author: Mohammad Saiedi | Size: 30 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
433. | Privacy Cop 1.12 (mypersonalsoftware.com) | ||
all these information! Overwrite data before deleting: a secure option for removing definitively all the files! Remove traces of your internet activity! Erase cookies, history and cache Remember: every time you surf, you leave a trace on your pc! Use our simple software to erase all these | |||
Updated: 9, 2005 | Rating: 0 | Size: 1358 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
434. | Privacy Defender 7.0.2t (synergeticsoft.com) | ||
by removing all evidence of previously downloaded music, video files, images stored in your PC. It gets rid of the data that will remain on your hard drive even after reformatting. Powerful Evidence Eliminator-Privacy Defender protects you from unwanted data becoming permanently hidden in your PC, without the possibility to recover it. The program will not only erase cookies | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Anikin | Size: 433 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
435. | Privacy Guard 1.4 (amicutilities.com) | ||
Guard is a professional utility to erase beyond recovery data files, using the latest available D.O.D technology, which overwrites the erased files up to 21 times with special chosen patterns of data to ensure that it will never be possible to recover it. It was designed to securely erase all your Internet History, browsing traces, temporary files, cookies and | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1183 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
436. | Privacy Guard 1.2 (amicgames.com) | ||
Guard is a professional utility to erase beyond recovery data files, using the latest available D.O.D technology, which overwrites the erased files up to 21 times with special chosen patterns of data to ensure that it will never be possible to recover it. It was designed to securely erase all your Internet History, browsing traces, temporary files, cookies and | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1183 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
437. | Privacy Guardian 3.0 (winguides.com) | ||
Guardian is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program history information that is stored in your browser and other hidden files on your computer. Privacy Guardian guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC | |||
Updated: 3, 2005 | Rating: 0 | Author: WinGuides Software | Size: 2753 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
438. | Privacy Guardian 3.2 (winguides.com) | ||
Guardian is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and other hidden files on your computer. Privacy Guardian guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Tools | Size: 2337 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
439. | Privacy Keeper 7.0.1 (pimasoft.com) | ||
Keeper is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC | |||
Updated: 9, 2005 | Rating: 207 | Author: G Larson | Size: 67800 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
440. | Privacy Master 3.9 (webroot.com) | ||
to multiple users making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from prying eyes. Powerful 128-bit encryption combined with a unique session-based program style provide the tools you need to secure your privacy on-line | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
441. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer - right from your Windows Explorer! Passwords manager that stores all your sensitive data in a single, hard-encrypted file | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
442. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
around through your private data! Keep all your sensitive data in a secure environment - you only have to remember ONE password and you can be sure your data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer - right from your Windows Explorer! Passwords manager that stores all your sensitive data in a single, hard-encrypted file | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
443. | PrivacyDefence 1.3 (privacydefence.com) | ||
programs and system tracks without breaking their functionality, it's fully customizable and supports 18 programs. Left as is, unwanted system logs can seriously impair your confidentiality because all your Internet activity can be easily recovered: Web pages you've viewed, pictures you've opened | |||
Updated: 9, 2005 | Rating: 0 | Author: MCMK Corp. | Size: 1594 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
444. | PrivacyWatcher 1.20 (managebytes.com) | ||
for protecting your privacy: - Highly reliable 448-bit Blowfish file encryption algorithm - Secure file deletion to prevent simple recovery with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing unauthorized access to your PC Without privacy there is no freedom. PrivacyWatcher | |||
Updated: 2, 2006 | Rating: 16 | Author: Mikhail Yurasov | Size: 1003 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
445. | PrivacyWatcher 1.11 (managebytes.com) | ||
for protecting your privacy: - Highly reliable encryption of files using 448-bit Blowfish algorithm - Secure files deletion to prevent their recovering with UnErase tools - Startup manager to prevent unwanted programs from loading on Windows startup - Desktop lockout feature for preventing the unauthorized access to your PC Without privacy there is no freedom | |||
Updated: 3, 2005 | Rating: 0 | Author: Mikhail Yurasov | Size: 995 kb | Shareware Similar programs | |||
446. | Private Encryptor 6.2 (tropsoft.com) | ||
technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encryption, My Passwords, My Private Notes, Installable Encryption Modules, Compression, Context Menu support, Stealth Media Encryption super speed for large image multimedia and exe files, and Self | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
447. | Private Encryptor 6.2 (tropsoft.com) | ||
technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encryption, My Passwords, My Private Notes, Installable Encryption Modules, Compression, Context Menu support, Stealth Media Encryption super speed for large image multimedia and exe files, and Self | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
448. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
449. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
450. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secure file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|