Software Listing: Sensitive
- Sensitive
- License: Shareware

Sensitive is a remake of a fun little puzzle game on the C64. The original was made by Oliver Kirwa. There are 60 levels in this game, some of them almost too easy, others might make you want to never play the game again. That feeling will probably not last so long, as Sensitive is highly addictive..
- Publisher: tdbsoft.com
- Date:
- Size: 2867 KB
- Platform: Win2000, WinOther
- TK8 Safe
- License: Shareware
- Price: 19.95

TK8 Safe is useful when you have passwords to use and to remember. Keeping your passwords, serial numbers and other sensitive information is easy and secure. The software has many powerful features like sending login information automatically, customizable folder tree with unlimited folders and entries, auto backups of your information, password generator, password bar etc. All this in a compact and easy to use interface..
- Publisher: B & M Konsultatsioonid Inc
- Date: 02-05-2003
- Size: 2507 KB
- Platform: WinOther
- Secrets Protector
- License: Shareware
- Price: 24.95

It's the end of your worries about top-secret data of your company, your confidential files or the pictures from the last party. All these will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. It is the ultimate security tool to protect your sensitive information on PC, meeting the three most important security issues: Integrity, Confidentiality and Availability. This product gives you the features of a "folder locker" and a "secure eraser". Your secret information is available only trough this software and there is no other mean to access it.
- Publisher: E-CRONIS
- Date: 11-12-2004
- Size: 910 KB
- Platform: Win2000, Windows Server, WinOther
- EugeneShredder
- License: Shareware
- Price: 29.95

EugeneShredder is a file wipe utility. With EugeneShredder you can easily wipe sensitive files from your hard disk. EugeneShredder has three security levels. You can use simple file deletion (as in Windows), wipe files with single pass wiping and also use most secure NSA erasure algorithm..
- Publisher: EugeneSoft
- Date: 28-04-2003
- Size: 680 KB
- Platform: Win2000, WinOther
- Yamicsoft Password Storage
- License: Shareware
- Price: 24.95

The software will help you to to store secret and sensitive information on your PC. Now you can forget about all your headaches which were caused by loss of passwords, access codes and other sensitive information. You'll be able to store all your logins, passwords, PIN codes, credit card numbers and their access codes, and any other confidential information in one place. Yamicsoft Password Storage allows you to create several databases for storing your information. Each database will have its own access password that encrypted by algorithms. It has built-in password generator with many adjustable functions.
- Publisher: Yamicsoft
- Date: 01-11-2005
- Size: 1497 KB
- Platform: Win2000, Windows Server, WinOther
- AEVITA Erase Hard Drive
- License: Shareware
- Price: 29.95

When you give away your hard drive or sell off your old computer, you are basically "licensing" the third party to access your old e-mail, private customer information, corporate secrets, and other sensitive data. Even if you have deleted all data from your computer's hard disk and reformatted the drive, with the proper recovery tools, someone could retrieve your previously deleted files and even gather your personal information from the disk space of your computer. If you want to completely destroy your sensitive data on the disk, without leaving a chance for someone to recover the dataa, use the AEVITA Erase Hard Drive utility.
- Publisher: AEVITA Software Ltd.
- Date: 30-01-2006
- Size: 1945 KB
- Platform: Win2000, Windows Server, WinOther
- Shred Agent
- License: Shareware
- Price: 60

With the wide use of encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere. One way to attack is to try to recover supposedly erased data from a hard disk or random-access memory. Shred Agent is designed to protect your privacy. When you delete files in Windows it is possible to un-delete or recover them using various file recovery utilities. If you want to make sure that the file you delete cannot be restored by any means, Shred Agent is the right tool for you. To make sure nobody else has access to your private files, you might use some encryption software.
- Publisher: AKS-Labs
- Date: 21-09-2006
- Size: 1053 KB
- Platform: Win2000, Windows Server, WinOther
- Secure VDisk
- License: Shareware
- Price: 29.95

Secure VDisk is a compact program for creating on-the-fly-encrypted virtual disks. It helps you protect your sensitive files or data from unauthorized access with strong Encryptions. You can create a new volume which reside in a file, and mount it as a virtual disk. File operations on the virtual disk just like they are on any normal disk. Files that are being written/ read on virtual disk are automatically being encrypted/ decrypted on-the-fly, without any user intervention..
- Publisher: SecureVDisk.com
- Date: 13-6-2007
- Size: 1703 KB
- Platform: Win2000, Windows Server, WinOther
- Magical File Encrypt
- License: Shareware
- Price: 12.99

Magical File Encrypt is powerful tool to protect your sensitive Files.You data files undergo powerful cipher operations and makes them unreadable without first decrypting them.Even if an unauthorized person gets access to your files , he will not be able to read it without decrypting the files with the correct pass. It is impossible to decrypt the files without knowing the correct password..
- Publisher: ArzooSoft Solutions
- Date: 07-01-2008
- Size: 404 KB
- Platform: Windows Server, Windows Vista, WinOther
- AppleMacSoft Empty Trash for Mac
- License: Shareware
- Price: 29.95

Empty Trash is a Trash Cleaner for Mac OS X which allow you to automatically compress and securely delete your Mac Trash. With AppleMacSoft Empty Trash you may configure a System Preference and then use your Trash normally, the automatic compression and secure deletion will happen in the background using the intervals which you set. With AppleMacSoft Empty Trash it is also possible to manually compress your Trash at any time. Extract compressed Trash items, quickly delete compressed Trash items that are not private, and securely delete compressed Trash items that are private. AppleMacSoft Empty Trash provides three levels of secure delete, so you can choose how secure you want your Trash to be.
- Publisher: AppleMacSoft.com
- Date: 09-04-2012
- Size: 1516 KB
- Platform: Mac OS X
- East-Tec DisposeSecure
- License: Shareware
- Price: 29.95

Don\'t give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. East-Tec DisposeSecure however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to government and industry standards or custom user security levels.
- Publisher: EAST Technologies
- Date: 27-07-2012
- Size: 9826 KB
- Platform: Linux, MS-DOS, Unix, Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
- Data Masking Suite
- License: Freeware
- Price: 0.00

Data Masking Suite- simple to install, flexible, and self-explanatory. Create test data and mask sensitive data. Data Masking Suite contains all you need for fast and reliable Data Masking. Orpheus Data Masking Suite is exceptionally easy to use. Try the free version of Data Masking Suite. Most business departments use our software without requiring the assistance of their IT department. Data Masking Suite supports any data source like Excel or CSV files, Access or SharePoint lists. You can also access any ODBC data source (MS SQL Server, Oracle, IBM DB/2, MySQL, ...). You can overwrite existing data or can insert the masked data into a separate new table or file.
- Publisher: Orpheus GmbH
- Date: 01-08-2012
- Size: 258976 KB
- Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
- Secure Privacy
- License: Shareware
- Price: 9.99

1. Integrated data/files encryption/decryption management system which is very easily to manage files/data encryption 2. Self-Extracted/contained encryption make you fully use of this system and distribute all kind of your encrypted data/files anywhere securely and independently 3. Mutiple encryptions algrithms (4 encryption algrithms: DES,TripleDES,AES) and ramdonly apply one algrithm to encrypt a file 4. Multiple password hash algrithms (MD5, SHA1, SHA256, SHA384, SHA512) 5. Easily import multiple files or an entire folder, such as photos, videos or sensitive data, into this system. 6. Multiple files or a folder of files can either share a same password or set individual password for each file 7.
- Publisher: Green Sun IT Studio
- Date: 17-09-2012
- Size: 1147 KB
- Platform: WinOther
- Uimix
- License: Shareware
- Price: 19.95

Uimix is a window transparency manager that secures the viewing of sensitive information by allowing you to adjust the transparency of a selected window, mixing it with its background. Therefore, the information remains viewable for your eyes only, vital in today's organizations which often have open working areas. In addition, Uimix allows viewing information in windows normally hidden behind your main work window without switching applications. This is especially useful when working with combined applications, such as data sheets and a calculator, for example. Uimix is designed for Windows 2000/XP with .
- Publisher: Mercanti
- Date: 25-11-2012
- Size: 262 KB
- Platform: WinOther
- Hosted Context-Sensitive User Help
- License: Freeware
- Price: 0.00

Develop a hosted, context-sensitive User Help presentation facility.
- Publisher: hosteduserhelp.sourceforge.net
- Date: 18-11-2012
- Size: 3587 KB
- Platform: Linux, Mac OS X, WinOther
- Serl's Path-Sensitive Framework (PSF)
- License: Freeware
- Price: 0.00

PSF is a path-sensitive, inter-procedural program analysis framework developed on top of Soot..
- Publisher: serlpsf.sourceforge.net
- Date: 11-05-2012
- Size: 4726 KB
- Platform: WinOther
- Serl's Path-Sensitive Framework (PSF)
- License: Freeware
- Price: 0.00

PSF is a path-sensitive, inter-procedural program analysis framework developed on top of Soot.
Path-sensitive Dataflow Analysis, Pattern Recognition Interfaces, Expression Tree Manipulation Interfaces
Serl's Path-Sensitive Framework (PSF) License - GNU General Public License version 3.0 (GPLv3).
- Publisher: Serlpsf
- Date:
- Size: 4726 KB
- Platform: WinOther
- UNL SENF
- License: Shareware

UNL SENF was created as an accessible, handy and easy-to-use software that allows users to locate sensitive numbers like social security or credit card numbers inside a certain file.
UNL SENF is written in the Java programming language and can run on operating systems such as Windows, Mac OS X and Linux.
.
- Publisher: Ashu Guru
- Date:
- Platform: WinOther
- SecretSync
- License: Shareware

SecretSync is a great way to easily share proprietary, sensitive information using online synchronization utilities like Dropbox..
- Publisher: getsecretsync.com
- Date:
- Size: 3543 KB
- Platform: WinOther, WinVista
- ArchiCrypt Live
- License: Shareware
- Price: 49.95

ArchiCrypt Live offers real-time encryption and protection for sensitive private or business data. ArchiCrypt Live lets you encrypt all file types on your PC and laptop. That way only you will be able to access your confidential information.Unauthorized access is effectively prevented. ArchiCrypt Live is your last line of defense in the digital world. As private or corporate user you collect, create and store more and more confidential data on your PC, laptop or network every day. At the same time the threat towards your sensitive data rises everyday. Hackers, hijackers, competitors, nosy friends or relatives: Many people may be interested in accessing your data.
- Publisher: archicrypt.org
- Date:
- Size: 13506 KB
- Platform: Win2000, Windows Server, WinOther, WinVista












