|
||||||
|
||
|
Home > Sensitive information software |
|
|
61. | Sensomap Pro 2.0 (imint.com) | ||
compiling technical/scientific documentation where you need pop-up information for strangely shaped parts? Are you preparing and distributing plans of your building to emergency services? All of these situations require sensomap navigation. Main features: Imagemap applet which can manage complex | |||
Updated: 9, 2005 | Rating: 0 | Author: Image Intelligence | Size: 298 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
62. | SureClean 2.0.1002 (panicware.com) | ||
for you and your computer. This product will make sure that your sensitive information is erased permanently. Erase Internet surfing information and clean URL history, browser history, cache, cookies and index.dat. Prevent data theft - Prevent business data, credit card information | |||
Updated: 6, 2005 | Rating: 0 | Author: Panicware Inc | Size: 802 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
63. | WipeUrTrax 1.30 (aidsoft.com) | ||
has been cleansed. WipeUrTrax also allows users to manage history information without the need to re-boot the computer or even close the browser.WipeUrTrax features Collake Software's new DeepSearch engine. The DeepSearch technology finds history information that other browser history tools can't. Other browser history tools leave sensitive files | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Overton | Size: 188 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
64. | Deductus disk catalog 1.53 (aolej.com) | ||
text files, HTML files, documents and MP3s. You can store information about hundreds of all kind of media like local disks, network disks, CD ROMs, ZIP disks and other removable sources. Transparent browsing is supported in ZIP, RAR, ACE and tar.gz archives. Deductus has built-in image viewer and document preview with search term highlighting. Search results can be exported to | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Olej | Size: 1420 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
65. | SecurPad 1.2 (intellisoftdesign.com) | ||
is often used to send encrypted documents over email or to protect sensitive information such as passwords, credit card numbers, or any other confidential data. The editor utilizes 256-bit Advanced Security Standard (AES) symmetric encryption based on the Rijndael algorithm, which guarantees high security and confidentiality. SecurPad is a secure alternative to WordPad that | |||
Updated: 3, 2005 | Rating: 1254 | Size: 670 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
66. | Hot Corners 2.3 (southbaypc.com) | ||
are away. For people who work in an office environment, where the information on their screen is sensitive and possibly confidential, the ability to have instant privacy is crucial. Hot Corners is very customizable, and even allows you to control the power saving features of your monitor. Hot | |||
Updated: 2, 2006 | Rating: 0 | Author: South Bay Software | Size: 185 kb | Shareware Go to category: Desktop > Similar programs | |||
67. | Active Kill Disk - Hard Drive Eraser 2.0 (killdisk.com) | ||
that can be started using a DOS floppy disk. Access to the drive's data is made on the physical level via the Basic Input-Output Subsystem (BIOS), bypassing the operating systems logical drive structure organization. Regardless of the operating system, file systems or type of machine, this utility can destroy all data on all storage devices. Thus it does not matter operating systems | |||
Updated: 9, 2005 | Rating: 985 | Author: LSoft Technologies Inc. | Size: 252 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
68. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
the current window or program that is running on your computer. All information is stored in strongly encrypted, compact log files, that can be easily archived. ActMon can hide the logs on the monitored PC or send them via network or email. The monitoring can be opted to be invisible to the user and ActMon is protected against manipulation: The program runs completely maintenance | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
69. | Adios! Extreme Filesystem Cleaner 2.23 (martinbeek.net) | ||
virus quarantine, Norton protected bins, Internet browser cache(s), sensitive usage information, memory dumps, Windows update and servicepack garbage and much more. Fully configurable. Analysis, (de-)selection and deletion stages. Uses fast low-level filesearch routines. Free download. Program can be easily updated with "pattern files" provided by the author. Now | |||
Updated: 9, 2005 | Rating: 299 | Author: Martin Beek | Size: 987 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
70. | Advanced File Shredder 1.14 (ashkon.com) | ||
Windows physically does not remove files from your hard disk and sensitive data like business or financial information can be easily recovered. Note: when you normally delete files using Windows Explorer and even emptying the Recycle Bin it is still possible to recover data or some of its contents. Advanced File Shredder securely erases files or folders on your PC using seven | |||
Updated: 9, 2005 | Rating: 357 | Author: Ashkon Software | Size: 512 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Sensitive information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|