secure information shareware downloads
Search results for «secure information»:
CryptoHeaven 3.8.1
… Personal Information - no names, no addresses, no credit card numbers required.
Your data and your information stored in our Secure Data Center is illegible to anyone without your private key and passphase.
Limitations
Storage space limited.…
Secure Information Courier 1.2
… s been subject to extensive peer review.
Customers send email and documents securely and directly to your mail server. Mail is never stored on the servers of the customer's ISP.
Compatible with SecExMail and Crypto Anywhere encryption software.…
inTouch Secure Password Wallet 1.0
… t".
inTouch Secure Password Wallet features
Create, Modify and delete users
Create, Modify and delete encrypted data
Synchronize with inTouch Secure Password Wallet for PocketPC
Multilanguage
Limitations
30-day trial, 3 entries per user…
Secure Password Generator 2.2
… cure Password Generator lets you create passwords from 1 to 100 000 characters long.
Secure Password Generator is very quick and easy-to-use - simply select the password length and press the Generate Now button.
Limitations
10 day trial…
Secure Notes 3.1
… ords, credit card numbers, website logins, etc.) in a very strong encrypted database.
Secure Notes is a security tool that allows you to manage and store your information.
The same database file can be used both in desktop and PocketPC version.…
SoftX Secure Notes 3.1
… re at work or on a trip.
By purchasing SoftX Secure Notes you will get both versions in one package. You can use the same serial number for both versions, leaving no need to purchase two separate licenses.
Limitations
14 days evaluation period…
Secure Links 1.1
… r this password" feature, Secure Links provides full access to the data and ability to edit all saved information.
Secure Links is also a convenient place to keep record of all other "user names" and "passwords " (not related to Internet).…
Secure Endpoint USB 1.0.1.4
… use Secure Endpoint is notified that a device is trying to connect to your machine before the operating system is notified. This is yet another layer of protection Secure Endpoint uses to guard against potential threats.
Limitations
30 day trial…
CryptoHeaven for Java 2.7.0
… r any other operating system capable of running Java 1.3 or better.
Pentium III or better CPU
64 MB of available RAM
35 MB of available disk space (3 MB if you already have Java installed)
Internet connection, high speed or broadband is ideal…
Secure Address Book 1.0
… pty your Windows Address Book. Turn off a couple of checkboxes in Outlook or Outlook Express and remain totally invisible to email worms and viruses searching for your valuable email contact info.
Be sure to download the free 10 day trial!…
Related: secure information f secure pdf secure ssh secure most secure