|
||||||
|
||
|
Home > Secure desktop software |
Related keywords: desktop, secure, Desktop, desktop utility, desktop enhancements, Secure, desktop publishing, desktop decoration, desktop management, active desktop |
|
|
1. | Alpha Journal 3.5.1.0 (alpharealms.com) | ||
private journal, diary or log for personal or business use, but that's not all... Entries are stored in an encrypted file with optional password protection and can contain formatted text, pictures, sounds and even other documents. Entries can be added, deleted, edited, browsed by day, month, year or | |||
Updated: 3, 2006 | Rating: 81 | Author: Alpha Realms | Size: 2760 kb | Shareware Go to category: Home & Hobby > Personal Interest Similar programs | |||
2. | 007 Spy Software 3.86 (e-spy-software.com) | ||
files operation, Web site visited, and take snapshot of the entire | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | EF Mailbox Manager 2.50 (efsoftware.com) | ||
Manager remove you annoying spam e-mail directly on the server, it's not necessary to retrieve it. Save online costs. Optionally can, if the mail server supports it, which is used safe connection (APOP). During the registration process no passwords are dispatched over the InterNet. Various functions use the installed standard e-mail client to provide and answer the messages | |||
Updated: 3, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1140 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
4. | Clean Disk Security 7.54 (diskcleaners.com) | ||
program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
files are converted to Flash format, which is smaller, more secure and suitable for online use. Once converted to Flash, the presentation can be easily viewed with any web browser. No special software is required, since 98% of the browsers have the Flash plug-in already installed. When performing the conversion, the size of the output files is reduced with up to 90%, which is | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
6. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
you ever forget your password? Secure Password Manager is a desktop utility that spares you the trouble of filling in your logins, passwords, and other personal data manually. You can automatically fill in password in ANY application (IE, Netscape, Opera, ICQ, MSN...) . Secure Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Roll Call 3.15 (westbrooksoftware.com) | ||
Call is an employee in and out board and a secure instant messaging system. The main fallacy of in and out boards is people forget to change their status. With Roll Call, you only need to remember to change it when you leave your desk, not when you return. When you click your mouse or type on your keyboard for the first time after being away from your desk, Roll Call will | |||
Updated: 2, 2006 | Rating: 0 | Author: David Westbrook | Size: 2610 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
9. | Data Destroyer 7.31 (hermetic.ch) | ||
get worried, not knowing how long it still has to run. A program for secure file deletion and disk wipe which destroys (by overwriting) data in multiple files and multiple folders on floppy, ZIP or hard disk so that the data cannot be recovered. Single-file or batch-mode | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
10. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
|
Home > Secure desktop software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|