|
||||||
|
||
|
Home > Unencrypted software |
|
|
1. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
he know the correct password. Note, The source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can apply to a PDF. The first is the owner password. Opening a PDF with this password will allow you full | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | Silver Key 3.3 (filecryption.com) | ||
Key Shell to create more advanced parcels. You can add encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Silver Key 3.3 (kryptel.com) | ||
Key Shell to create more advanced parcels. You can add encrypted and unencrypted comments, create shortcuts on the target computer, request opening the file after decryption, and even include the uninstaller! Silver Key fully supports automated batch processing and it is ideally suitable for | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Ultimate ZIP Cracker 7.3.1.5 (vdgsoftware.com) | ||
will decrypt your whole encrypted .ZIP file if you have another unencrypted ZIP file (called plaintext file) which contains at least one file from the encrypted archive. The trial version of Ultimate ZIP Cracker will reveal your password free of charge (for up to 5 characters in length). For all passwords greater than 5 characters you will need to purchase the full version. The | |||
Updated: 2, 2006 | Rating: 1397 | Author: Dmitry Sushkov | Size: 920 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
7. | Registrar Registry Manager 4.03 (resplendence.com) | ||
Registrar Registry Manager is a complete registry management solution with a wealth of powerful features. It is intended as a complete and safe solution for administrators and power users for maintaining the registry on both the desktop as well as remote computers on the network. It offers the benefit of a | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
8. | Active Whois Browser 2.6 (johnru.com) | ||
Active Whois is an easy-to-use network tool for the retrieving of all information such as country, email and postal addresses for the owners of IP addresses and Internet domains. Unlike other WHOIS clients, Active Whois does not require special skills to collect the desired information. The latest technology | |||
Updated: 2, 2006 | Rating: 141 | Author: Ivan Mayrakov | Size: 724 kb | Shareware Go to category: Network & Internet > Trace & Ping Tools Similar programs | |||
9. | Registrar Registry Manager 4.03 (resplendence.com) | ||
Registrar Registry Manager is a complete registry management solution with a wealth of powerful features. It is intended as a complete and safe solution for administrators and power users for maintaining the registry on both the desktop as well as remote computers on the network. It offers the benefit of a | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Terhell | Size: 2239 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
10. | IEWatch 3.0 (iewatch.com) | ||
and POST data. Even data sent over secure HTTPS can be viewed in unencrypted form. IEWatch allows the most extensive filtering, including filters on HTTP headers and response content. The HTML code window features color syntax highlighting and a breakdown of the HTML elements such as images, links, forms, flash objects and scripts. The innovative 'HTML Spotlight' feature allows | |||
Updated: 2, 2006 | Rating: 0 | Author: IEWatch Software | Size: 870 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Unencrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|