|
||||||
|
||
|
Home > Security utilities software |
Related keywords: security, utilities, Security, Utilities, computer security, internet security, security software, information security, SECURITY, internet utilities |
|
|
141. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
file. The encryption archive can be extracted by ArchiveExtractor utility comes with this setup. Self-Decryiption archive and Encryption archive can hold creators name and personal message . DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely and creates | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
142. | Disk CleanUp 2000 4.6 (gregorybraun.com) | ||
CleanUp is a small disk utility designed to clear previously deleted files. Deleting a file will normally just remove the file's directory entry, but the data itself still remains on the disk. CleanUp will completely eliminate the contents of your deleted files. Disk CleanUp provides options to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 721 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
143. | DLOCK2 2.01 (eBible.org) | ||
is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
144. | DriveScrubber 2.0a (iolo.com) | ||
is a utility designed to securely wipe all data from any hard or floppy drive, regardless of its file format or operating system. Its purpose is to ensure the safety, privacy, and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
145. | DiskSpaceFree 7.4 (cdxray.com) | ||
harddisk space . A review say: It is a powerful disk cleanup utility,cleanup trash and recycle bin , wipe security protect ! DiskSpaceFree also can help you analyses the files full of your harddisk, Let you know what the file is that wasted most of your harddisk space , what | |||
Updated: 3, 2005 | Rating: 0 | Author: Aceterm leo | Size: 1076 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
146. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
147. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
148. | Find Protected 2.0 (aks-labs.com) | ||
on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
149. | Enforcer 6.2 (posum.com) | ||
provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It is easy to configure and requires little to no modifications to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
150. | EugeneShredder 1.20 (eugenesoft.com) | ||
is a file wipe utility. With EugeneShredder you can easily wipe sensitive files from your hard disk. EugeneShredder has three security levels. You can use simple file deletion (as in Windows), wipe files with single pass wiping and also use most secure NSA erasure algorithm. EugeneShredder is a file wipe utility. With EugeneShredder you can easily wipe | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Konovalov | Size: 680 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security utilities software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|