|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
201. | Tweak Manager 2.12 (winguides.com) | ||
every aspect of your computer, including tweaks for popular software like Microsoft Office and Internet Explorer. - Customize your computer with over 1000+ powerful tweaks - Secure Windows with hundreds of restrictions and policies - Tweak popular software like Internet Explorer and Office - Easily download new and updated tweaks using Live Update Take complete control | |||
Updated: 9, 2005 | Rating: 0 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
202. | Tweak O Matic 1.1 (cyberspacehq.com) | ||
enhance and personalize the Windows interface, take control of security settings, increase your computer's performance, change hidden internet settings you always wished you could change and much more. It will even tweak other software for you! This program is extremely easy to use, And if you aren't happy with a tweak you made, you can always roll back to previous settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Sales CyberHQ | Size: 792 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
203. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
even apply changes to multiple computers at once. No need to install software on every computer -just connect to the computers remotely. Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, tweak Microsoft Office, validate your Internet Explorer links -and much more. Tweaki, more than just a system | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
204. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
around & chat with strangers! Lite & Pro Editions of the same software are also available. Lite version includes support for log emailing to specified address on daily basis. Pro version supports remote administration etc. Check out product home page for further details. http://raheel.yi.org/ultimatespy/ A sophisticated keyboard spying tool for personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
205. | USA Shield 2.15 (usa.safeworld.info) | ||
is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network - like the Internet- and still remain secret. Later | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
206. | User Control 2005 (salfeld.com) | ||
User Control allows you to block any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
207. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including: - Hard disk manufacturer and size - Hard disk free space - Processor type and clock speed - RAM size (MB) | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
208. | Remote Access 1.0 (nawab.1cis.com) | ||
many advanced features like 128-bit encryption , IP Filtering , NT Security , Full control , file transfers , telnetting , remote shutdown , remote log-in/;log-off etc..and very cheap. It is a very essential tool for remote administrator working on remote locatons and also providing remote Support and | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahamed Abdulla | Size: 2558 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
209. | Remote Administrator 2.2 (radmin.com) | ||
of all data streams. Radmin supports the OS-integrated NT security system with NTLMv2 support, and includes smart protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login. Radmin is very secure and reliable | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
210. | !Remove Access Passwords! 2.0 (e-tech.ca) | ||
Do you like to hack? Do you have a database with user-level security? Want it removed ........click here for details. Here is a software package for you.... And it works!!! Remove Access Software is used by an estimated 10,000 users worldwide. "Remove Access Passwords" removes Database File Passwords in an MDB file. This is what everybody is talking | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Britto | Size: 1515 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
211. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
212. | SafeBox Industry 1.0 (aidsoft.com) | ||
Add Signature inside your archive, Skins Form.SafeBox Industry Security extremely useful program allows users to safely encrypt any files, document or folder using from 128 bits to 256 bits AES Rijndael.In brief, it can be used in : Encrypting / Decrypting any file (text, binary, multimedia file). Using Compression (Good level) to compress data to reduce file size. Creating | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
213. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail client to pick up e-mail locally. Other users (hackers) cannot read your username / password across | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
214. | Secura Backup Professional 2.13 (cmfperception.com) | ||
Backup Professional is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
215. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
216. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
Center Manager (SCM) – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
217. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
Core Manager – software for service centers and workshops. SCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of work reports | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
218. | ShutDown NOW! 4.6 (dworld.de) | ||
features for up to 1,000 planed events, provides password security with many options for to secure SHDN! itself, as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
219. | PAL PC Spy 2004 3.01 (palsol.com) | ||
PAL PC Spy 2004 is the first product of its kind available that allows parents and businesses to engage in on-line surveillance that incorporates a computer monitoring system with the latest web filtering technologies. PAL will automatically record everything your spouse, children and employees do online | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1677 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
220. | PAL PC Tracker Lite 1.01 (palsol.com) | ||
PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
221. | Palm Desktop Utilities 1.3 (palmosworld.com) | ||
network location, another hard drive, or floppy disk for added data security or to share that data with other installations of Palm Desktop on other computers. Would you like to share your PalmOS handheld Date Book, Address Book, ToDo List, or Memo Pad with other PalmOS handheld users? Use the Palm | |||
Updated: 9, 2005 | Rating: 1906 | Author: Kevin Steele | Size: 8301 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
222. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this new solution ensures complete protection against viruses, hackers and other | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
223. | Panda Security Demo 3.0.2.0 (pandasecurity.com) | ||
such as file transfer via FTP or chatting through IRC. Panda Security allows you to lock down your data with iron-clad protection. Helps you keep hackers or unauthorized users away from your files, and from configuring your systems. You can prevent data from being removed from your company or computer. And you can prevent users from accessing certain Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 6010 kb | Demo Go to category: System Utilities > Other Similar programs | |||
224. | Password Agent Lite 2.3.1 (moonsoftware.com) | ||
your sensitive data like passwords, PIN codes, credit card numbers, software serial numbers and other textual data in a single, easy to navigate and secure database. You'll only need to remember one master password that gives access to the database. Password Agent will also help you to fill login | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahto Tanner | Size: 1305 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
225. | Password Guardian 3.11.32 (pcshareware.com) | ||
Guardian is handy software database that stores all of your passwords into a single, convenient file. Password information can be stored, edited and printed easily. Do you keep forgetting all those different passwords for America Online, the Internet, bulletin boards systems, ATM bank cards, accounts, PIN's, etc.? Here's a easy, safe and secure software | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 400 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
226. | Password Keeper 1.1 (ddsystem.com) | ||
numbers and door access codes, you can now keep track of all of your security access requirements in one software application. Password Keeper can help you to remember the username and password for a variety of occasions. From website logins to bank pin numbers and door access codes, keep track of all of your security access requirements in one software | |||
Updated: 9, 2005 | Rating: 0 | Author: Dallas Design Systems | Size: 786 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
227. | Password Security Vault 2.0 (hirtlesoftware.com) | ||
Security Vault stores your personal passwords as well as login names for Internet sites. Most Internet users have numerous web sites which they frequent that require memberships. Simply remember your password for this software and you can forget every other password since this program will keep track of them for you. Includes many handy features to make your web surfing a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 4764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | Password Spectator Lite 1.401 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
229. | Password Spectator Pro 3.10 (refog.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
230. | QuadRate 1.10 (rjsoftware.com) | ||
and to clean up registry entries. Unclog your hard drive and reduce security risks with just a couple of mouse clicks. Speed your machine with QuadRate! QuadRate is a powerful Windows utility that makes it easy to report technical information about your computer, customize settings that affect system | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Joseph | Size: 297 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
231. | Quicky Password Generator - Shareware 2.0 (quickysoftware.com) | ||
The Quicky Password Generator is fast, efficient, and small. It maintains separate groups of 100,000 passwords at a time of 4 to 20 characters. The passwords are displayed and can be copied to your clipboard easily or exported to a file. You can specify random passwords to be generated from alphabetic | |||
Updated: 9, 2005 | Rating: 0 | Author: David
Willink | Size: 610 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
232. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
most secure method to create passwords. Rated 5-Stars by ZDNET. This software may create up to 10,000,000 unique passwords with as many as 60 characters each in a single batch. You can run as many batchs as desired. Therefore, this software will NEVER run out of passwords, it will be useful for | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
233. | ArchiDoc (3035) (canteco.net) | ||
in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as (for Oracle product line) Instant back-up; Internet-type access Desktop XML version of the complete ORACLE based document management system, that gives any size enterprise the ability to | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
234. | Kickstart 1.02 (westfaro.com) | ||
is a powerful tool for DBAs and software developers. It lets you write scripts using a simple Basic like language to generate database objects for every table in a Database schema. For example, you might have developed a robust Oracle stored procedure that inserts rows into a particular database as well as handling security, audit trails and locking. If you want to use | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
235. | ECS (Event Control System) 2.3.14 (OmnipotenceSoftware.com) | ||
of our 15 years of experience in automation software development, ECS is an all-purpose automation program suitable for virtually any tasks (in residential, commercial, and industrial environments). Boasting an object-oriented design, ECS is elegantly simple, yet extremely powerful. Automated tasks may be implemented via simple time-based schedules (great for novices) and/or | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Gilmore | Size: 12000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
236. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file shredder or file eraser that securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
237. | My Firewall Plus 5.0 (webroot.com) | ||
sophisticated viruses, cookies, Trojan Horses and other malicious software tools to gain access to your PC. Once they gain access, they put unsafe applications on it that are designed to expose your data from the inside. My Firewall Plus protects your computer by stopping hackers and other intruders from gaining access to your system and data. At the same time, it prevents hidden or | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
238. | Npust Homepage Guard 1.08 (npust.com) | ||
forever - no more ie Home page hijack ! presented by the Npust software - the best email marketing and security software developer. Enjoy it :-) A really small anti spyware, It protects the IE Home page, Prevents the hijacking of your browser. Even if somebody already change it, this tool can change it back automatically, Download this Great Freeware now and you will | |||
Updated: 9, 2005 | Rating: 0 | Author: GARY KUO | Size: 396 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
239. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
240. | GRL RealHidden 1.0 (grltechnology.com) | ||
RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
241. | Identity Knight 1.3 (fspro.net) | ||
of identity theft in the last five years! Holes in Internet Explorer software allowing 3rd party programs access to your private data surely help this number grow. So, is there a way to prevent identity theft? Yes! There is! Introducing Identity Knight: the unique credentials protection software that makes sure that no data from the IE AutoComplete list is left unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
242. | IIPwr Package 2.00 (iipwr.com) | ||
what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the data to your email. KeySpy's seamless installation makes it | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
243. | lock and go 1.0 (aidsoft.com) | ||
(lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to potential media theft. That is why lockngo is the perfect companion for your portable | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
244. | Lock Folder 5.0 (realclicks.com) | ||
Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
245. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
Desktop Security software brings you many ways to secure and lock your desktop. You can define different sets of permissions and restrictions for specific users and groups, control access to certain applications, restrict when your PC can be used, restrict CD usage, log Internet usage, and log attempts at restricted activities. Note: This is a 30-day trial | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
246. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
Center Manager (ESCM) – software for service centers and workshops. ESCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
247. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
248. | EXEsafe 2 (members.aol.com) | ||
a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
249. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
250. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|