Filefacts.com

  • Folder Protect

    NewSoftwares.net, Inc (Proprietary)

    Folder Protect is used for protecting important information stored in folders. The program allows users to protect or hide folders fro view. This prevents...

  • Folder Security Personal

    Y0YS Software (Freeware)

    Folder Security Personal is a software application developed by the company, Y0YS Software. This program enables users to protect selected folders from...

  • Folder Vault

    Gear Box Computers (Freeware)

    Folder Vault is a program used for locking and hiding folders and files on the computer. This program is useful especially on computers that are used by...

  • FortiClient SSLVPN

    Fortinet Inc. (Freeware)

    FortiClient SSLVPN is a security suite for mobile devices, laptops, tablets, and PCs. It was developed by Fortinet Inc. and it was designed to work with the...

  • Free Hide Folder

    Cleanersoft Software (Freeware)

    Free Hide Folder is an application that is used to hide users’ private folders and data to keep them away from others. Personal information cannot be...

  • Free USB Disk Security

    AVD SOFT (Freeware)

    Free USB Disk Security is a security tool developed by AVD Soft. It was released in May 2013. This program protects the computer from malicious programs...

  • FreeOTFE

    Sarah Dean (Freeware)

    FreeOTFE is an encryption computer program aimed at both Windows desktop and mobile users. Developed by independent developer, Sarah Dean, the program fully...

  • GhostSurf

    Tenebril Incorporated (Shareware)

    The GhostSurf application is used for anonymous web surfing. It is capable of hiding the computer’s IP address so that computer activities cannot be...

  • GiliSoft File Lock Pro 6.3

    Gilisoft (Shareware)

    GiliSoft File Lock Pro has the power to hide drives, folders, and files and lock them securely. It is a file encryption program that employs 256-bit AES...

  • GOTCHA! 3.06

    Prescient Systems (Shareware)

    GOTCHA! 3.06 is a surveillance program that can be used by anyone—even individuals with the most rudimentary understanding of computer and surveillance...