Blank And Secure 4.01

Blank And Secure 4.01: Is a portable tool to securely delete the data and block the recovering of data "Blank And Secure" is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted. 2.9.1: Secure Email with integrated Instant Messaging and collaboration features 2.9.1

Secure and encrypted email with integrated business class secure Instant Messaging. Collaborate with others with secure group chat and secure file sharing. Use secure message boards and securely leave documents for others. HIPAA and GLBA compliant. Works across networks and firewalls without a need for expensive VPN, PKI or complicated network setup and maintenance.

hippa, hipaa, sercure, glba, anonymous, instant, email, encrypted, messaging, security, file sharing

BarracudaDrive Pro 3.6: All in One Secure Advanced Remote Access
BarracudaDrive Pro 3.6

Secure File Server provides secure remote access to documents and files. The Secure File Server lets you map a standard Windows drive securely over the Internet. Web File Manager Server complements the Secure File Server and allows secure and easy access to documents using a browser. The Web File Manager Server lets you share files with your friends, customers, or colleagues using only a browser. BarracudaDrive is a Secure Web Server and provides

virtual private network, ssl vpn, vpn solution, computer remote control, web file manager, remote control, web server, remote access, remote desktop, pc remote control software, file server, telecommuting

No Image
SSH Server for Windows NT/2000/XP/2003 6.4

secure remote access to your Windows machine that includes: Secure Remote Console Secure File Transfer (SFTP and SCP) Port Forwarding (secure TCP/IP connection tunneling) GoodTech SSH Server is a server application that runs on a host computer and allows remote users to securely access the host. When GoodTech SSH Server is installed on your Windows system, you can securely telnet from remote systems and run programs on your Windows System. It is

windows nt telnet, port forwarding, secure file transfer, barcode, network products, remote administration, ssh server, terminal server, free, goodtech, daemon, low price, download

SoftX Secure Notes 3.4: Organize and securely store your personal information with SoftX Secure Notes.
SoftX Secure Notes 3.4

Secure Notes is a Personal Information Manager (PIM), which enables you to organize and securely store your important, personal, and sensitive information in a strongly encrypted database file. This information will be accessible from your personal computer or your Pocket PC. You can, for example, use Secure Notes to keep all of your logins and passwords in one safe place, and only have to remember one password in order to enter into the Secure Notes

encrypted notes, secure notes, pocket pc, personal information manager

F-Secure Anti-Virus 2007 2007: Protect your computer with an easy to use antivirus program
F-Secure Anti-Virus 2007 2007

F-Secure Anti-Virus 2007 offers an easy to use protection for your computer against viruses, worms and rootkits. The new F-Secure DeepGuard technology protects you against zero-day and other future threats. F-Secure Anti-Virus 2007 has been designed to automate all key tasks required to keep your computer and data safe from viruses. Includes intuitive product tutorial. New! Windows Vista (32-bit) support!

protection, protecting, deepguard, detection, malware, attack, virus protection, computer virus, rootkit detection, anti virus, data security, f secure, antivirus

SecureCAPI 1.1.0: You can use SecureCAPI to cryptify your ISDN connections (both voice and data).
SecureCAPI 1.1.0

SecureCAPI to cryptify your ISDN connections. It can be used to secure both voice and data connections. SecureCAPI accesses the driver of any ISDN cards. To build up cryptify connections, both stations have to be equipped with the SecureCAPI. Any commercial available ISDN applications can be used, without any further requirements or special functions. Application examples: Online banking via cryptified ISDN connections, Secure ISDN Data transfer (

telephone, capi, cryptification, cryptify, secure, isdn, bugproof, secureisdn, securecapi, line

More Results: 1  2  3  4  5  6  

World IT News