Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for sensit Acronis Drive Cleanser 6.0 1.0 in Acronis Drive Cleans Software Acronis Drive Cleanser 6.0 guarantees the complete destruction of data on selected partitions and/or entire disks. With Acronis Drive Cleanser you can 151 Delete all the sensitive data from an old or leased PC 151 Wipe the entire hard disk or individual partitions 151 Format the hard disk, divide it on partitions 151 Use 8 national data destruction standards 151 Review the resAntechinus JavaScript Editor Professional 1.0 in Antechinus JavaScrip Software Become a JavaScript expert in record time with JavaScript Editor, and reap the benefits - Design great web pages transform your Web pages from displaying static content to live, dynamic, interactive applications. - Save time and automate everything run JavaScript directly from the Editor for batch processing and common computing tasks on your local files or the intranet, and - Create stand-alone programs create fully-fledgedEzCrypt+ 1.0 in EzCrypt+ Software EzCrypt+ by KMGI makes protection of sensitive data as simple as a mouse click.Hide Folders Pro 1.0 in Hide Folders Pro Software Hide Folders is an access control utility that allows you to hide your sensitive folders out from users and applications. You need only to select folder(s) you wish to hide from prying eyes and click a button to hide these folders.Batch Replace Online (Server Side) 1.0 in Batch Replace Online Software Batch Replace Online is batch files content find and replace scripts for your website server online. You can replace batch HTML, HTM, PHP or other pages on server directly and quickly. Search and Replace any text , case sensitive, in a directory or a whole site, include subdirectory or not, You can now replace thousands of HTML files for words, numbers, mailbox, terms, affiliate link code, google adsense code or fix site errors in minutes.DC Help Authority 1.0 in DC Help Authority Software DC.HelpAuthority is a COM based component that allows you to assign a sensitive help for every control in within your form or even every column in your grid DC.HelpAuthority may be used with any developing language support COM based application like Visual Basic,Visual C++,Borland C++,Delphi and others ..EgyFirst has done a lot of work for you. now you can develop your application and make it comprehensive by supporting it with your sensitive helEffective Password Manager 1.0 in Effective Password M Software Effective password manager is the perfect tool for storing all yourmost sensitive and valuable information like passwords, logins, pincodes and access codes as well as credit card and account numbers,lock combinations etc. It creates a reliable and well protecteddatabase which you can conveniently search and get the rightinformation in no time. You can also store backup copies on varioustypes of media and easily restore the database in case of aSpam Terrier 1.0 in Agnitum, Ltd. Spam Terrier brings comprehensive antispam protection to users of varying computer skills. It comes free and doesn't stress even a low-end computer. Effortlessly integrating into Outlook and Outlook Express, the program provides a wide array of filtering options, including self-learning Bayesian-based filter that can be trained to individual preferences. These, plus a handful of other innovative features make Spam Terrier the program of choice.East-Tec DisposeSecure 2007 Enterprise 4.0 in EAST Technologies Don't give away sensitive information with the old computers that you or your company resells, donates or removes from operation. Deleting all files, formatting the hard disk or using FDISK is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure 2007 Enterprise removes all traces of data from the computer hard disk by overwriting and destroying beyond recovery every sector and bit of information.Shred Agent 1.1 in AKS-Labs Shred Agent works at the hardware level, wiping your files completely, eliminating any possibility of recovery. What makes Shred Agent different from most other file wiping utilities is the capability to control the wiping of files in the background. For example you can configure the filters to wipe temporary files created by office programs.Enigma Folder Lock 1.0 in Vinasoft Plus a security application to protect your most sensitive and secret data files or documentsHorses World Screensaver 1.0 in Altix Soft This screensaver shows very beautiful images of graceful horses. The horse is one of the the most beautiful animal on our planet. On your screen: amazing arabic horses, horses in calm conditions, the animals in fast jogging and galloping, the horse and foal, horse romantic, sensitive views of loving horses couples and other nice views. Real sounds is included also. Just enjoy view of this remarkable creations!Go CryptSecure 2006 in Go Download Go CryptSecure 2006 keeps your data safe from hackers or from nosy people. Hackers can access your computer using the Internet. Your friends or colleagues can access your computer while you are away. Your laptop is stolen while you travel. Someone else using your computer opens private files by mistake.NET Video Spy 2.0 in SARBASH Lab. NET Video Spy - is a video-surveillance system that allows you to monitor remote locations using local network or Internet. NET Video Spy utilizes the power of your webcam and\or microphone to allow you to create your own video-surveillance system or online security camera. The idea behind this software is about using hardware already available at your disposal for creating cost-effective video-surveillance solutions.PowerKey 2.11.01.22 in Elcor Software PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool designed to avoid restoration of sensitive data.
|