English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by file deletion monitor

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: PA Server Monitor 4.0
Download PA Server Monitor 4.0
more info
2005-10-27
Create secure files that carry your encoded contents. Use your browser to decode. Symmetric keys are employed for your email and HTML encryption, as well as for the binary file encryption. Includes a File Shredder. Max. 6144-bit depth of encryption.
2006-01-26
Allows you to quickly & easily monitor changes made to both local and remote files, the contents of those files, directory changes & structure modifications, entries written to local Event Logs etc.
2006-09-04
Allows you to quickly & easily monitor your Windows File & Print server, including local printers & print queues, changes made to both local and remote files, the contents of those files, directory changes entries written to local Event Logs.
Duplicate File Sweeper 1.0.010 by Delete Duplicate Adv.
2010-03-12
Use Duplicate File Sweeper and get up to 50% extra hard drive space. Duplicate File Sweeper will scan and analyze your entire hard drive or selected folder, and display its result within seconds.
2008-11-10
Allows you to quickly & easily monitor changes made to both local and remote files, the contents of those files, directory changes & structure modifications, entries written to local Event Logs etc.
WinUtilities File Shredder 4.71 by YL Computing, Inc
2011-12-09
WinUtilities File Shredder is a utility that securely deletes your files so they can't be restored using recovery software.
2023-03-09
Comprehensive complete file security SDK can help you to track file change, control file access on the fly, prevent your sensitive data from being accessed by unauthorized users or processes.Secure file sharing with digital rights management(DRM).
File Watcher 1.0 by Steve Lohja and Associates
2006-08-03
You use the File Watcher application to monitor a file system and react when changes to the directories or files it contains occur. This makes it possible for you to quickly and easily launch business processes.
2008-12-04
Computer monitoring Keylogger application store all typed keystrokes including special character used for login name, password, website, search keyword, chat conversation and many more in secure log file and not detect by any anti-Keylogger software.
0.027