Folder Security Freeware


Advertisement

Folder Lock Lite  v.7.5.0

Folder Lock Lite is a revolutionary concept in data security engineered for home or office use. Folder Lock Lite allows you to Lock and Hide your data, keeping your data secured and hidden at all times so that you won't have to worry about the confidentiality ...

Fast Folder Eraser  v.1 2

Fast Folder Eraser is an application that allows you to quickly delete folders with a large number of files. If you have ever tried to delete a large folder structure with thousands of files, you probably noticed that Windows can take some time to delete ...





Advertisement

PC Security  v.6.5

This software offers Explorer control, file lock, folder lock, system lock, Internet lock, shortcut and software Lock, restricted system, Window lock, intruder detection with alarm, flexible and complete password protection and drag-and-drop support.Lock ...

Folder Castle

Folder Castle protects your personal data from snoopers and thieves. You can either lock away files and folders, or put them into Secure Storage with on-the-fly AES-256 encryption. Protected data cannot be seen or accessed in Windows Explorer even in ...

Folder Shield

Folder Shield is Comprehensive Application that protects your Folders and directories from unauthorized access with as ease you can imagine! Protect your folder(s) by either hiding them completely or just make Folder contents invisible. So your data stays ...

Folder Lock  v.7.8.9

Folder Lock is a file locking software that lets you encrypt files and create a real-time back-up of the encrypted files on the cloud. It lets you protect portable devices like USB drives, Flash disks, shreds unwanted files, creates digital wallets and ...

PowerCryptor Free Edition  v.1.05

To password protect your file or folder, just right-click on it in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. PowerCryptor Free Edition includes ...

The Lock

Provides user audit, access, Internet and system security for any computer running Windows 2000, 2003, XP, and Vista. User security is group based and Meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Stand-alone, ...

LockMyText

LockMyText is a text security tool used for sending and receiving private messages and documents securely. LockMyText has its own built-in encryption security key for use in locking and unlocking text. With LockMyText, you can share private information ...

PortPeeker  v.2.7.0.21

PortPeeker is a freeware utility for capturing network traffic for TCP, UDP or ICMP protocols. With Port Peeker you can see what traffic is being sent to a given port, easily and quickly.
Once you have started PortPeeker you have to configure it ...

NoVirusThanks Malware Remover  v.2 30



It can also detect and remove rogue security software, spyware and adware. This program is not an Antivirus and does not protect you in real time, but it can help you to detect and remove trojans, spywares and rogue security software installed ...

Fortres 101  v.6 5

The superior desktop security of Fortres 101 can easily lock down your Windows computers. Fortres 101 is the solution to malicious or accidental destruction of computers, problems with inconsistent interface, and inconsistent printing behavior. Fortres ...

GiliSoft File Lock  v.5 1

This software is designed to password-protect or monitor your sensitive files, folder and drives on your local computer.It protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody ...

TweakSEC  v.1.0

TweakSEC is powerful Windows 95/98/Me and Windows 2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system ...

The Lock XP  v.5.06.0102

Provides user audit, access, Internet and system security. User security is group based and meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Standalone or multi-system network use is supported. Restrict access to ...

Pages : < 1 | 2
Newest Reviews