Software Listing: Sensitive

Sensitive is a remake of a fun little puzzle game on the C64. The original was made by Oliver Kirwa. There are 60 levels in this game, some of them almost too easy, others might make you want to never play the game again. That feeling will probably not last so long, as Sensitive is highly addictive..

  • Platform: Win2000, WinOther
  • TK8 Safe
  • License: Shareware
  • Price: 19.95
  • Rating

TK8 Safe is useful when you have passwords to use and to remember. Keeping your passwords, serial numbers and other sensitive information is easy and secure. The software has many powerful features like sending login information automatically, customizable folder tree with unlimited folders and entries, auto backups of your information, password generator, password bar etc. All this in a compact and easy to use interface..

  • Platform: WinOther

It's the end of your worries about top-secret data of your company, your confidential files or the pictures from the last party. All these will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. It is the ultimate security tool to protect your sensitive information on PC, meeting the three most important security issues: Integrity, Confidentiality and Availability. This product gives you the features of a "folder locker" and a "secure eraser". Your secret information is available only trough this software and there is no other mean to access it.

  • Publisher: E-CRONIS
  • Date: 11-12-2004
  • Size: 910 KB
  • Platform: Win2000, Windows Server, WinOther

EugeneShredder is a file wipe utility. With EugeneShredder you can easily wipe sensitive files from your hard disk. EugeneShredder has three security levels. You can use simple file deletion (as in Windows), wipe files with single pass wiping and also use most secure NSA erasure algorithm..

  • Publisher: EugeneSoft
  • Date: 28-04-2003
  • Size: 680 KB
  • Platform: Win2000, WinOther

The software will help you to to store secret and sensitive information on your PC. Now you can forget about all your headaches which were caused by loss of passwords, access codes and other sensitive information. You'll be able to store all your logins, passwords, PIN codes, credit card numbers and their access codes, and any other confidential information in one place. Yamicsoft Password Storage allows you to create several databases for storing your information. Each database will have its own access password that encrypted by algorithms. It has built-in password generator with many adjustable functions.

  • Publisher: Yamicsoft
  • Date: 01-11-2005
  • Size: 1497 KB
  • Platform: Win2000, Windows Server, WinOther

When you give away your hard drive or sell off your old computer, you are basically "licensing" the third party to access your old e-mail, private customer information, corporate secrets, and other sensitive data. Even if you have deleted all data from your computer's hard disk and reformatted the drive, with the proper recovery tools, someone could retrieve your previously deleted files and even gather your personal information from the disk space of your computer. If you want to completely destroy your sensitive data on the disk, without leaving a chance for someone to recover the dataa, use the AEVITA Erase Hard Drive utility.

  • Platform: Win2000, Windows Server, WinOther

With the wide use of encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere. One way to attack is to try to recover supposedly erased data from a hard disk or random-access memory. Shred Agent is designed to protect your privacy. When you delete files in Windows it is possible to un-delete or recover them using various file recovery utilities. If you want to make sure that the file you delete cannot be restored by any means, Shred Agent is the right tool for you. To make sure nobody else has access to your private files, you might use some encryption software.

  • Publisher: AKS-Labs
  • Date: 21-09-2006
  • Size: 1053 KB
  • Platform: Win2000, Windows Server, WinOther

Secure VDisk is a compact program for creating on-the-fly-encrypted virtual disks. It helps you protect your sensitive files or data from unauthorized access with strong Encryptions. You can create a new volume which reside in a file, and mount it as a virtual disk. File operations on the virtual disk just like they are on any normal disk. Files that are being written/ read on virtual disk are automatically being encrypted/ decrypted on-the-fly, without any user intervention..

  • Platform: Win2000, Windows Server, WinOther

Magical File Encrypt is powerful tool to protect your sensitive Files.You data files undergo powerful cipher operations and makes them unreadable without first decrypting them.Even if an unauthorized person gets access to your files , he will not be able to read it without decrypting the files with the correct pass. It is impossible to decrypt the files without knowing the correct password..

  • Platform: Windows Server, Windows Vista, WinOther

Empty Trash is a Trash Cleaner for Mac OS X which allow you to automatically compress and securely delete your Mac Trash. With AppleMacSoft Empty Trash you may configure a System Preference and then use your Trash normally, the automatic compression and secure deletion will happen in the background using the intervals which you set. With AppleMacSoft Empty Trash it is also possible to manually compress your Trash at any time. Extract compressed Trash items, quickly delete compressed Trash items that are not private, and securely delete compressed Trash items that are private. AppleMacSoft Empty Trash provides three levels of secure delete, so you can choose how secure you want your Trash to be.

  • Platform: Mac OS X

Don\'t give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to government and industry standards or custom user security levels.

  • Platform: Linux, MS-DOS, Unix, Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Data Masking Suite- simple to install, flexible, and self-explanatory. Create test data and mask sensitive data. Data Masking Suite contains all you need for fast and reliable Data Masking. Orpheus Data Masking Suite is exceptionally easy to use. Try the free version of Data Masking Suite. Most business departments use our software without requiring the assistance of their IT department. Data Masking Suite supports any data source like Excel or CSV files, Access or SharePoint lists. You can also access any ODBC data source (MS SQL Server, Oracle, IBM DB/2, MySQL, ...). You can overwrite existing data or can insert the masked data into a separate new table or file.

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

1. Integrated data/files encryption/decryption management system which is very easily to manage files/data encryption 2. Self-Extracted/contained encryption make you fully use of this system and distribute all kind of your encrypted data/files anywhere securely and independently 3. Mutiple encryptions algrithms (4 encryption algrithms: DES,TripleDES,AES) and ramdonly apply one algrithm to encrypt a file 4. Multiple password hash algrithms (MD5, SHA1, SHA256, SHA384, SHA512) 5. Easily import multiple files or an entire folder, such as photos, videos or sensitive data, into this system. 6. Multiple files or a folder of files can either share a same password or set individual password for each file 7.

  • Platform: WinOther
  • Uimix
  • License: Shareware
  • Price: 19.95
  • Rating

Uimix is a window transparency manager that secures the viewing of sensitive information by allowing you to adjust the transparency of a selected window, mixing it with its background. Therefore, the information remains viewable for your eyes only, vital in today's organizations which often have open working areas. In addition, Uimix allows viewing information in windows normally hidden behind your main work window without switching applications. This is especially useful when working with combined applications, such as data sheets and a calculator, for example. Uimix is designed for Windows 2000/XP with .

  • Publisher: Mercanti
  • Date: 25-11-2012
  • Size: 262 KB
  • Platform: WinOther

Develop a hosted, context-sensitive User Help presentation facility.

  • Platform: Linux, Mac OS X, WinOther

PSF is a path-sensitive, inter-procedural program analysis framework developed on top of Soot..

  • Platform: WinOther

PSF is a path-sensitive, inter-procedural program analysis framework developed on top of Soot.
Path-sensitive Dataflow Analysis, Pattern Recognition Interfaces, Expression Tree Manipulation Interfaces
Serl's Path-Sensitive Framework (PSF) License - GNU General Public License version 3.0 (GPLv3).

  • Publisher: Serlpsf
  • Date:
  • Size: 4726 KB
  • Platform: WinOther

UNL SENF was created as an accessible, handy and easy-to-use software that allows users to locate sensitive numbers like social security or credit card numbers inside a certain file.

UNL SENF is written in the Java programming language and can run on operating systems such as Windows, Mac OS X and Linux.

.

  • Platform: WinOther

SecretSync is a great way to easily share proprietary, sensitive information using online synchronization utilities like Dropbox..

  • Platform: WinOther, WinVista

ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt all file types on your PC and laptop. That way only you will be able to access your confidential information.Unauthorized access is effectively prevented. ArchiCrypt Live is your last line of defense in the digital world. As private or corporate user you collect, create and store more and more confidential data on your PC, laptop or network every day. At the same time the threat towards your sensitive data rises everyday. Hackers, hijackers, competitors, nosy friends or relatives: Many people may be interested in accessing your data.

  • Platform: Win2000, Windows Server, WinOther, WinVista

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Typing Invaders - Free Typing Game

Typing invaders is a free ware typing game, which (in short) essentially takes the concept from the game space invaders, and applies it to a fun typing improving game. It does this by taking all the core gameplay elements of space invaders, and then ...


Coin World

Coin world is an interesting platforming demo game in which you play as “Colin the coin” as you take on the evil “bank note flash”. The premise alone is an interesting enough reason to play the game, and combined with the ...


Speedtest4free

For a long time now, Internet Service Providers have been battling it out, attempting to bring their customers the latest and greatest internet speeds available, to beat their competitors and steal their customers. Its always a good idea to know ...


File Finder

File Finder is such a simple and easy program to use to track down and locate files and folders on your system. I think this has to be a fantastic selling point, but maybe also its downfall. It instantly took me back to the retro MS-DOS based ...


Audacity

Audacity is one of the few free audio recording programs out there, which is great for people like me who need to record audio on a regular basis. Audacity is more than just  the simple “microphone to MP3” software that many will ...


Auslogics Duplicate File Finder

If you have a lot of data and perform regular backups, or are particularly bad at keeping your system clean, tidy and organized, you may find that your computer starts to get a little clogged up with duplicate files. In my case, this is most obvious ...


Slash Xonix

Slash xonix is a freeware game which takes the lesser known classic title xonix, and revamps and reworks it into a title for the desktop computer. Xonix (the game on which slash xonix is obviously based) is a game in which you must split the screen ...


Chicken Invaders

Chicken invaders is a free ware arcade shooter game that hasheavy influence from classic titles like space invaders, or arcanoid. What chicken invaders does to the concept, however is add its own level of humour and gameplay to the mix. For ...


FILExtinguisher

FILExtinguisher is a simplistic looking data removal tool, that will assist you in totally and completely removing sensitive data from your computer hard drive. This means that you can securely remove your online surfing history, banking details, ...



New Downloads

dbForge Query Builder for
MySQL

dbForge Query Builder for
MySQL is a visual tool for
quick queries creation and
extended data management. With
the help ...

Start Menu 8

Start Menu 8 is a desktop
customized utility for Windows
users, specifically designed
to bring back the familiar
Classic ...

2D Barcode VCL Components

The components set is designed
for generating and printing 2D
barcode in your Delphi or C++
Builder application. Most ...

Excel Add-in for SQL Server

Devart Excel Add-in for SQL
Server allows you to use
powerful Excel capabilities
for processing and analysis of
data from ...

ODBC Driver for Amazon
Redshift

Devart ODBC Driver for Amazon
Redshift provides
high-performance and
feature-rich connectivity
solution for ODBC-based ...

Zebra Total Video Converter

Zebra Total Video Converter is
capable of converting nearly
all popular videos formats
like AVI, MP4, WMV, MKV, MOV,
MPG, ...

Ultra Nitro Racers

You need to use nitro to win
this crazy racing. Turn it on
and your car will gain
incredible speed. Win
competitions and ...

SysGauge Server

SysGauge Server allows one to
monitor the CPU usage, memory,
disk activity, network
activity, file system
performance, ...

Shortcut Racers

3D racing game. This top-down
racing game takes place in 4
European capitals. Master the
championships to unlock new
cars ...



Related Searches

Cisco Context Sensitive Text Editor
Clean Sensitive Data
Clear Memory Card Sensitive Data
Context Sensitive Editor
Context Sensitive Help Authoring
Data Recovery Sensitive Data Privacy
Excel Storing Sensitive Data
Firefox Sensitive Data Cleaner
Flash Mouse Sensitive Menu
Flash Mouse Sensitive Scroll
Flash Sensitive Scroll
Motion Sensitive Video Capture