|
||||||
|
||
|
Home > Encrypt folders or files software |
Related keywords: files, encrypt, folders, hide files, Files, hide folders, PDF files, compare files, protect files, Encrypt |
|
|
11. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | InSync Backup Software 7.0.82 (dillobits.com) | ||
automatically make identical copies of directory structures and all files within. 1-way, 2-way, and backup synchronization modes are supported. This is useful in performing backups and propagating data from one machine to another. Using InSync you can define and run multiple synchronization jobs that | |||
Updated: 3, 2006 | Rating: 77 | Author: Dillobits Software Dillobits | Size: 1380 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
13. | InSync Backup Software 7.0.82 (dillobits.com) | ||
automatically make identical copies of directory structures and all files within. 1-way, 2-way, and backup synchronization modes are supported. This is useful in performing backups and propagating data from one machine to another. Using InSync you can define and run multiple synchronization jobs that | |||
Updated: 3, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 1380 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
14. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
15. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
17. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
18. | WinCatalog Standard 1.53 (wincatalog.com) | ||
managing your collection much easier: you can divide it by virtual folders and add to the catalog not only disks and folders, but also the individual files. There is one more new feature: WinCatalog Standard supports non-file items enabling you to catalog your books, videos | |||
Updated: 3, 2006 | Rating: 42 | Author: Michael Rusakov | Size: 1667 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
19. | Sprintbit File Manager 2.3 (sprintbit.com) | ||
File Manager for Windows 98/ME/NT/2000/XP is a fully featured application for viewing and managing files on your computer. You can perform all standard file operations like copying, moving, renaming, deleting, creating folders, shortcuts or new empty files. It has several File Managers with multiple browsers that supports Drag & Drop | |||
Updated: 3, 2006 | Rating: 0 | Author: Sprintbit Software | Size: 10664 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
20. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Encrypt folders or files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|