|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
201. | Advanced Password Generator 2.87 (segobit.com) | ||
Advanced Password Generator is a Windows based application designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password | |||
Updated: 2, 2006 | Rating: 16 | Author: Segobit Software Segobit Software | Size: 177 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
202. | Advanced Password Manager 2.33 (rayslab.com) | ||
sites assign you a password without letting you change it. Besides, security experts say that you should use different passwords to protect yourself. Are fed up with forgetting your passwords and getting "Your login or password is incorrect" messages? Then it's time you get Advanced Password Manager | |||
Updated: 9, 2005 | Rating: 0 | Author: Rayslab Inc. | Size: 1086 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
203. | Advanced Security Level 6.1 (softfolder.com) | ||
Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System, Add/Remove Programs | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
204. | AES Free 2.5 (aes.safeworld.info) | ||
files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal | |||
Updated: 9, 2005 | Rating: 245 | Size: 515 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
205. | AES Home 4.0 (aes.safeworld.info) | ||
are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
206. | AES Pro 5.5 (aes.safeworld.info) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS Public Key programs | |||
Updated: 9, 2005 | Rating: 16 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
207. | AllCleaner 6.5 (allcleaner.com) | ||
and most advanced privacy and PC cleaning tool. We invented this software category more than two years ago and since then more than one million customers worldwide have installed Windows AllCleaner on their PCs! If you are like most people on the Net, you've most likely downloaded music on the Net. Did you know that when you use these file sharing services, they track your | |||
Updated: 9, 2005 | Rating: 25 | Author: Leo van Opstal | Size: 4929 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
208. | Anti-Trojan Shield 2.1.0.14 (atshield.com) | ||
while maintaining an exceptional level of personal privacy and security. Without this tool, you definitely should worry about new Trojan horses and viruses, but with Anti-Trojan Shield you have no need for concern. Its integrated update utility always keeps the software on the cutting edge, fully armed for battle. Anti-Trojan Shield is an advanced, highly effective blocker of | |||
Updated: 9, 2005 | Rating: 280 | Author: ATShield Team | Size: 6366 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
209. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces: Skinnable Simple Interface - just select what do you | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
210. | Axessh Windows SSH Client 3.2 (labf.com) | ||
(apart from places where people aren't allowed to own cryptographic software). SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet ; cyber hackers stealing passwords and other important information. Axessh brings you | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
211. | BackRex Expert Backup 2.5 (backsettings.com) | ||
vulnerability! Imagine what would happen to your life if your social security data gets lost due to hardware crash… What would have happened to Tolstoy if he'd have lost his WarAndPeace.doc due to hard drive failure? Psychiatrists around the globe have already reported numerous hysteria and suicidal | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
212. | Bazooka Adware and Spyware Scanner 1.13.03 (kephyr.com) | ||
and trackware components; sources of irritation that antivirus software does not deal with. The scanning process will only take a fraction of a second and tell you how to uninstall the unwanted software using simple step-by-step instructions or put you in contact with the vendor for the most up-to-date and safe uninstall instructions. Spyware and adware is often bundled with | |||
Updated: 3, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 750 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
213. | BestCrypt 7.20.2 (jetico.com) | ||
is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
214. | Boss Key 1.6 (boss-key.com) | ||
using a hot key! Everybody should have such program for personal security. Imagine, you work with confidential information - maybe, just writing email to your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
215. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
216. | CDSHiELD SE 1.04 (mindestworx.free.fr) | ||
is a home-made cd-protector application which provide a awesome security against hackers. What's the benefits to using CDSHiELD ?: * Protect against unauthorised copying of the CD with a CD-Recorder using CD copying softwares. * Prevent users coying the contents of your CD-Rom to their hard | |||
Updated: 9, 2005 | Rating: 1704 | Author: Loki mindestworx | Size: 4390 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
217. | Chameleon 2.0 (members.optushome.com.au) | ||
your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily intercept your emails or scan your hard drive without your knowledge or consent. By using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
218. | CHAOS Generator 2.4 (safechaos.net) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
219. | CHAOS Messenger 4.0 (safechaos.net) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
220. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
221. | CHAOS Shredder 3.0 (safechaos.net) | ||
your disk, without the possibility to recover it by any practical software or hardware | |||
Updated: 3, 2006 | Rating: 16 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
222. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies. This software provides all the standard information about your chat partner plus a whole lot more. How many times have you | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
223. | ChatBlocker 2.6 (exploreanywhere.net) | ||
they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and restricting chat conversations | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
224. | Complete Cleanup 4.83 (softdd.com) | ||
cleanups which you would like to add to the cleanup list. This software will also improve the performance and disk reading speed of your pc. Simply run the self-extracting file to install. (Runs on all Windows systems). Protect your internet privacy, clean up all the garbage data on your pc, and improve your pc | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
225. | Crime Catcher 2.1 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
226. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
LE Ttotally free 128 bit disk encryption software. Simple, easy to use encryption application that creates encrypted "vaults". One can store any kind of data in them. Cryptainer LE allows you to encrypt any file or folder on any Windows PC. Protects all types of Media and any type of data. Password protect any file or folder with strong Encryption. It allows you to protect data | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
227. | CryptEnCrypt 1.10 (inetprom.com) | ||
is a powerful software application designed for electronic data protection. The files on your hard disk have no protection from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | CryptoMite 2.00 (baxbex.com) | ||
encapsulated inside the archive. CryptoMite is the first encryption software (and properly the only) which supports personal skins for encrypted exe-files (see http://www.baxbex.com/krprof.html http://www.baxbex.com/krprof.html for examples). You even could build encrypted exe-files in several languages (German, Spain, Italien, Portugues, French, Swedish). To send | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
229. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
which can be either a phrase or a sequence of 64 random bytes (the software provides a way for you to generate such random keys). Without the key the encrypted data is unintelligible and the information cannot be read. If your files are encrypted using ME6 then you can sleep easily at night knowing | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
230. | CSSS 2.2 (sarbash.com) | ||
your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The principle of action bases on microphone (microphones) real time | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
231. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
232. | Delete 2.10 (eBible.org) | ||
DELETE.EXE is a Win32 console application that deletes files. Win32 Console application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
233. | Desktop Lock 6.1 (toplang.com) | ||
Lock is a powerful computer security software, it locks your pc to prevent others from accessing your private documents or resources, after your computer was locked by Desktop Lock, people will not be able to access your documents, browse your computer, or use programs on your computer. Desktop Lock fully supports all Windows system, includes Windows 2000/XP/NT and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
234. | DLOCK2 2.01 (eBible.org) | ||
source code in your own products at no charge. This software is free, however you may send the author donations to express appreciation if you like. DLOCK2 is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code included. Version 2.01 is the same as the original DLOCK2, except recompiled for | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
235. | dsCrypt 1.10 (members.ozemail.com.au) | ||
is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 25 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
236. | DiskSpaceFree 7.4 (cdxray.com) | ||
a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what the mainly usage the disk driver/directory it is , It | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
237. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
Center Manager (ESCM) – software for service centers and workshops. ESCM represents new generation of management software for service centers. It manages full life cycle of repairing and tuning – from equipment reception to shipping repaired equipment back to customer. Along with management it provides profit and statistical analysis of activity by different types of | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
238. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! and it empowers you to save screen snapshots at any time | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
239. | EldoS KeyLord 4.0 (eldos.org) | ||
you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
240. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
encrypted by Encryption Workshop will not be decrypted by other software or vice versa. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
241. | EXEsafe 2 (members.aol.com) | ||
a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
242. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
243. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
244. | FileVault 3.0 (networktoolz.com) | ||
directories and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files that conceal your most sensitive documents. Send Vault files safely over the Internet safe in the knowledge that only the recipient can open them and that they will be completely meaningless to anyone who may | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
245. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
246. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Ness is security software to password protect and lock folders against unwanted access. Lock Ness will both secure your folders against accidental deletion and prevent other users from copying them. The folder can be locked or unlocked simply by right-clicking on it within Windows Explorer. The folder remains protected should your PC be rebooted into Windows Safe Mode, DOS or | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
247. | FolderSafe 2.1 (occultsoft.com) | ||
is FolderSafe FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
248. | Folder Shield 2003 1.3 (baxbex.com) | ||
the selected data disappear. Folder Shield vastly increases the security of your PC, while at the same time being so simple and very convenient to use. Folder Shield is multilingual and supports: English, Spanish, German, French, Italian, Portuguese (Brazil), Swedish, and Danish Folder Shield enables you to make folders completely invisible. Just specify all confidential folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 1269 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
249. | FolderAccess 2.0 (lockfolder.net) | ||
is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
250. | GreatCrypt 2.0 (miraxus.com) | ||
on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|