security shareware downloads
Search results for «security»:
FoolProof Security 5.0
… applications and Control Panels
Directs file saving
Provides internet access security…
BPS Security Console Toolbar 1.0
… over
BPS Data Shredder
BPS Popup Shield
BPS PC System Tweak for Windows
BPS Phishing Blaster.
If a security tool is installed in your system (either trial or free) the caption of the b…
Menonsoft Outlook Security 1.0
… pes.
In addition, it offers a few other tweaks, including disabling of MSN Messenger, auto-archiving and more.
Limitations
The trial version has a nag screen…
SingleClick Wireless Security 1.0.352
… eation
Home Network Auditing
Wireless security Auditing and Reporting
Wireless security Configuration
Intruder Monitoring and Blocking
Limitations…
Essential Security Suite 2.0
… power to securely encrypt and attach a digital signature to any file. Moreover, Essential security Suite ensures that your outgoing emails and files can be opened ONLY by your intended recipient(s).
Essential security Suite is intuitive and very easy to use. All security functions are available…
X-Ways Security 1.3
…
Wipe free drive space and clear slack space, to get rid of sensitive data from deleted files, esp. temporary files.
Clean formerly used NTFS file records, which contain filenames and other data
Erase logical drives or entire physical disks compl…
Email Security Labels for Outlook 1.0
… ned to comply with Defence Signal Directorate's (Australia) rules about email protective marking, and can be integrated with gateway products such as NetIQ's MailMarshal.
Requirements
Outlook 2000, 2002, 2003
Admin for install only.…
Network Security Map Poster 2006
… twork security fields.
Large (27 in x 39 in) and high quality poster for offices, labs, class rooms and homes.
Sof…
Absolute Security Pro 3.7
… Absolute security will secure the privacy of the files you keep on your PC, you send through email and over the internet.
Using strong encryption Absolute security protects the confidentiality of sensitive infor…
Computer Security 1.5
… lcomed quests".
Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.…
Related: disable programs security parental control security audit Chili Security Internet Security security software security tool encryption security security file utilities encryption tools shredder utility hide files hide folder monitor internet use web security internet security