|
||||||
|
||
|
Home > Secure file software |
Related keywords: file, secure, File, file transfer, file management, file encryption, file manager, file sharing, Secure, file backup |
|
|
351. | Shred XP 2.00.10 (aidsoft.com) | ||
shredding methods, Shred XP returns control to you by securely deleting current files, previously 'deleted' files, the recycle bin, drive free space, file tips, names, dates, sizes, and starting sectors as well as securely removing Internet trails including Internet Explorer's history, cache and typed URLs. Additionally, Shred XP | |||
Updated: 9, 2005 | Rating: 16 | Author: Gale-Force Software | Size: 3063 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
352. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
encodes your text and packs it into an extra file that is to be attached to an outgoing email or uploaded to a website. The recipient thereof does not need to have ShyFile installed to be able to decode since any regular Internet browser is able to take care of it, i.e. opening it and prompting the user to enter a matching key phrase. Its user friendly interface is very intuitive | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
353. | PAL Evidence Eliminator 1.01 (palsol.com) | ||
PAL Evidence Eliminator can automatically clean up your browser's cache, cookies, history, recent document list, and more. PAL Evidence Eliminator includes a Secure Wipe feature that allows you to specify other files and folders that you would like to have removed making them unrecoverable. You can set PAL Evidence Eliminator to run automatically in the background | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 2200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
354. | Palm Desktop Utilities 1.3 (palmosworld.com) | ||
important Palm Desktop data again because of a hard drive crash, file corruption, or hotsync error. Palm Desktop Utilities gives you peace of mind in knowing that your Palm Desktop data is safe and secure and can be restored to the Palm Desktop in seconds in the event of a problem or data loss. Use the Information window to help shorten your call times with Palm Technical | |||
Updated: 9, 2005 | Rating: 1906 | Author: Kevin Steele | Size: 8301 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
355. | PalmTree 3.3 (clickok.co.uk) | ||
lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends, family,co-workers. Ban intruders. Guard against access without permission. No encryption. Full | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
356. | Paper Shredder 1.5 (winmeta.com) | ||
Visual Basic, Visual C++), empty recycle bin, delete temporary files, clear search history on Google Toolbar, block pop-up and pop-under ad windows, smart eject CD-ROM; Automatically clear items at startup, shutdown and timed intervals; Automatically delete temporary internet files when browser is closed. Friendly install interface and Complete uninstall capabilities. Paper | |||
Updated: 9, 2005 | Rating: 0 | Author: Duo Yi | Size: 1176 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
357. | Password Agent Lite 2.3.1 (moonsoftware.com) | ||
numbers and other textual data in a single, easy to navigate and secure database. You'll only need to remember one master password that gives access to the database. Password Agent will also help you to fill login prompts on web sites automatically. All information is grouped similar to folders on disk and it is very easy to find, even user interface is similar to Windows Explorer | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahto Tanner | Size: 1305 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
358. | Password Builder 1.0 (passwordbuilder.com) | ||
to use the dictionary for creation of the password by a mask. The file of the dictionary should be in Plain Text format and each word should begin with a new line. The length of the password can be as static and dynamic. If parameters of the minimal and maximal length are equal, the password will be static length. If parameters are various, the password will be casual length from | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Beliaev | Size: 249 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
359. | Password Creator 2.0 (promaxum.com) | ||
that Password Creator will help you create passwords that are more secure. Password Creator allows you to specify the type of characters to use when creating passwords. Gives you the option to create fixed or variable length passwords. Create any where from 1 to 10000 passwords at a time. Save to a | |||
Updated: 9, 2005 | Rating: 0 | Author: 1st Shareware Dot.com | Size: 3273 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
360. | Password Depot 2.0.8 (hello-engines.com) | ||
security: You can use the lock function to restrict other user’s access to your personal passwords. - Passwords analyzer: Check and improve the quality of your passwords. - Decrypt and encrypt external files. - Use variables in URLs to meet all the requirements. - Support of TANs for online banking. - Import/export of passwords from/to other password | |||
Updated: 9, 2005 | Rating: 0 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
361. | Password Guardian 3.11.32 (pcshareware.com) | ||
database that stores all of your passwords into a single, convenient file. Password information can be stored, edited and printed easily. Do you keep forgetting all those different passwords for America Online, the Internet, bulletin boards systems, ATM bank cards, accounts, PIN's, etc.? | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 400 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
362. | Password Protected Lock 2.91 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
363. | Password Safe and Sound 1.2.0 (northcardinal.com) | ||
Sound allows you to store all your passwords and related information securely, in an encrypted file that only you can view using your defined password. It also allows you to launch websites, programs, or files associated with your passwords with a simple click of the mouse. Features | |||
Updated: 9, 2005 | Rating: 0 | Author: North Cardinal Software | Size: 4819 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
364. | Password Security Vault 2.0 (hirtlesoftware.com) | ||
down nice and neatly. Not a bad idea, but certainly not very secure. Finally some people rely on their web browser to maintain login names and passwords such as cookies written to their hard drive. This will work also, but what if someone else uses your browser? All they would need to do is go to the web sites you have accounts with and everything will be prefilled for them. To | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 4764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
365. | PC DoorGuard 4 (astonsoft.com) | ||
together with any elements it may have left in registry/system files/memory. PDG also constantly monitors your system to prevent further infection, using weekly updated trojan database consisting of more than 75000 entries. Active e-mail Scan, full drive scan on demand, monitoring ports,- all this provides secure environment for your PC. Features: incoming e-mail scanning | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
366. | PC Optimizer 1.00 (aidsoft.com) | ||
traces in your system. System cleaner removes junk and obsolete files from your system. Manage AutoRun Programs lets you control which program should be run at startup and logon. Memory Optimizer optimizes the Memory Management of Windows. Find Duplicate Files : Finds and Remove the | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 178700 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
367. | PC Security 6.4 (tropsoft.com) | ||
your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
368. | PCWash 3.2 (pcwash.com) | ||
safely and securely erase the secrets your computer is keeping about you, eliminate evidence of your online surfing activities, delete sensitive data, cover your tracks and regain your personal privacy with PCWash. PCWash erases/deletes index.dat, internet history, cookies, auto complete, recent files lists, browser cache, browser history logs, site addresses | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Wroblewski | Size: 3134 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
369. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
370. | ProBot 2.5.0 (nethunter.cc) | ||
ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
371. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
372. | Puffer 4.02 (briggsoft.com) | ||
utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
373. | pwArch 1.0 (clarktisdale.com) | ||
to use and free. Your password data is stored in an encrypted .zip file, so it is secure. Store your passwords with a user by site or description. Passwords can be generated to be a specified length, with an adjustable set of characters, or by specifying a template for the password to follow. Once a password is generated it can be stored in the archive and retrieved | |||
Updated: 9, 2005 | Rating: 0 | Author: Clark Tisdale | Size: 246 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
374. | QuickWiper 7.6.3 (aks-labs.com) | ||
is a disk and file wipe utility. QuickWiper allows to wipe files in handy manner. Wiping free disk space option protects all the files you ever delete before beginning using QuickWiper. System Clearer clears in one-click cookies and history, IE cache and typed URLs, temporary and recent files. QuickWiper has several security modes. You can use | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
375. | Quicky Password Generator - Shareware 2.0 (quickysoftware.com) | ||
and can be copied to your clipboard easily or exported to a file. You can specify random passwords to be generated from alphabetic, numeric, alphanumeric, uppercase only, lowercase only, mixed and/or specified characters. Passwords can be variable length and may include special characters. Most feedback is included in future versions of the program The Quicky Password | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 610 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
376. | R-Wipe & Clean 5.1 (r-tt.com) | ||
& Clean is a complete solution to wipe useless files and keep your computer privacy. Irretrievably deletes private records of your on- and off-line activities, such as temporary internet files, history, cookies, autocomplete forms and passwords, swap files, recently opened documents list, Explorer MRUs, temporary files, etc. and free up your disk space. The | |||
Updated: 9, 2005 | Rating: 381 | Size: 1607 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
377. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
the most secure method to create passwords. Rated 5-Stars by ZDNET. This software may create up to 10,000,000 unique passwords with as many as 60 characters each in a single batch. You can run as many batchs as desired. Therefore, this software will NEVER run out of passwords, it will be useful for years. You may select the password criteria using numbers, upper and lowercase | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
378. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
Folders makes any folder you choose and all the files in that folder completely invisible to others, even on the network! Your invisible folders and files can't be deleted, viewed, modified, or run. For all practical purposes they don't exist. Use Magic Folders to protect your finances, taxes, and personal documents. Others won't know these files exist, and they won't | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
379. | Masking Password Generator Pro 3.0 (accusolve.biz) | ||
obscure them as much or little as you like so they are very secure but still easy to memorize. Define a mask that incorporates your company security policy and generate passwords as often as you need without any more worry about password policy compliance. The program can reside in the Windows system tray, with a hot-key and default mask defined so that passwords can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Peckham | Size: 3205 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
380. | MediaRECOVER Data Recovery 3.0 (mediarecover.com) | ||
is a data recovery and file undelete utility. Your once-in-a-lifetime images and files can be destroyed, erased by accident, or simply lost while transferring to your computer. MediaRecover data recovery restores completely your lost photos, audio, and video data files. The software keeps your digital camera media safe from errors and restores corrupt media that | |||
Updated: 9, 2005 | Rating: 58 | Author: MediaRECOVER LLC | Size: 2946 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
381. | BulletProof Server 2.15 (digitalcandle.com) | ||
info, products, contact, description of their services, and files securely over the Internet. Enter BulletProof FTP Server. When it comes to files such as software downloads, music, movies, documents the easiest and quickest way to distribute them to the people who need them is to use an FTP Server! With the ease of use of BPFTP Server, everybody can now host an | |||
Updated: 9, 2005 | Rating: 3198 | Author: Andrew Connell | Size: 1229 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
382. | Sector Tester 1.0 (digitalcandle.com) | ||
and data integrity in seconds. If you burn your own music CD's - you need to be absolutely sure they're readable before deleting any files from your hard drive. Sector Tester can read every track (sector) in seconds, giving you peace-of-mind that your CD-ROM collection is problem free. Sector Tester also works on MP3 files. Sector Tester is a new & used music | |||
Updated: 9, 2005 | Rating: 0 | Author: Josh Findley | Size: 672 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
383. | Lock Folder XP 3.4 (everstrike.com) | ||
Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
384. | Move Me 2.52 (spearit.com) | ||
quick, easy, and inexpensive way to move all of your programs and files from your old computer to your new computer, while leaving the new computer's pre-installed software intact. You will save hours or possibly days of work setting up your new machine, with no risk of leaving data behind | |||
Updated: 9, 2005 | Rating: 16 | Author: Dan Spear | Size: 2821 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
385. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple files and securely shred files. Multi-ZIP-licity | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
386. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
387. | My Passwords 4.0.1.0 (cbacorp.com) | ||
Passwords is a secure, central repository for managing all your personal information for Internet sites, software licenses, and credit cards just to name a few uses. You can create multiple data files for various purposes and store them in the folder of your choice. My Passwords stores category, service name, user names (IDs), passwords, hints, code words, web site URLs, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Bob Flenniken | Size: 12433 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
388. | NetChat 2.6 (barefootinc.com) | ||
for use. It allows you to chat in real-time with other users on a secure and private local network connection. * NetChat may be used as an electronic office in/out board See when other users are in the office and available. Helps keep track of employees in a small office. * True Peer-to-Peer | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Metzler | Size: 1162 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
389. | NetSupport DNA Enterprise Management 2.10 (netsupport-inc.com) | ||
agenda. Facilitating central management of your enterprise PCs in a secure, coordinated and efficient manner, NetSupport DNA features fully automated Discovery and Deploy of clients across your network, instant Hardware and Software Inventory, full change history reporting, Real-time Application and | |||
Updated: 9, 2005 | Rating: 16 | Author: Jenni Hilton | Size: 97391 kb | Commercial Go to category: Business > Other Similar programs | |||
390. | NovaStor Online Backup 5.1 (novastor.com) | ||
into a full-time backup device for your critical data. NovaStor's Online Backup allows you to select files on your system and back them up to NovaStor's secure Internet backup servers. The software is simple to use and can be easily automated. It allows backup of multiple computers to a single account. With NovaNet-WEB's bandwidth efficient FastBIT(TM) | |||
Updated: 9, 2005 | Rating: 0 | Author: Mike Dunham | Size: 13057 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
391. | Genkisoft TurboHex 1.0 (genkisoft.com) | ||
and edit physical and logical disks and partitions, and edit raw file data, including NTFS file streams. Works on CDs, ZIP disks, SmartMedia, and more. Genkisoft TurboHex is an extremely fast and lightweight hex editor that combines raw power with an extremely easy to use interface. It is an essential tool for every programmer and power | |||
Updated: 9, 2005 | Rating: 0 | Author: Thobias Jones | Size: 187 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
392. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
393. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
394. | GreatCrypt 2.0 (miraxus.com) | ||
is a powerful file encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
395. | Hide Folders XP 2.2 (fspro.net) | ||
day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of being disclosed. Hide Folders XP in innovative file and folder hiding | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
396. | HideInPicture 1.1 (braintwist-studios.com) | ||
enables you to encrypt and hide any type of Files inside of Pictures. This way your files are hidden in plain sight, and in a place that no one would even think to look. HideInPicture's purpose is to hide any data in a way that the viewer does not recognize any difference. Nobody will suspect hidden data inside the image. You also can create complete Web | |||
Updated: 9, 2005 | Rating: 0 | Author: Jens Huebner | Size: 979 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
397. | Hider 1.1 (amosoft.net) | ||
is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced compression, and password protection of files. You can | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
398. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
399. | Incredi IE Manager 1.3 (iemanager.com) | ||
maintaining , link checker, security features , temporary internet files cleaning, new window maximizer, window customization, hide annoying flash movies and more ... Take total control over your browser. Make your web surfing faster, secure , private and flexible. Add Many Features to | |||
Updated: 9, 2005 | Rating: 0 | Author: George Valtchew | Size: 1723 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
400. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Secure file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|