|
||||||
|
||
|
Home > Binary file analyzer software |
Related keywords: file, File, analyzer, binary, file transfer, file management, file encryption, file manager, file sharing, file backup |
|
|
1. | PowerGREP 3.2.0 (editpad.com.br) | ||
grep tool for quickly searching for a piece of information through files and folders on your computer, such as software source code, letters and correspondence, server or system logs, reference texts, historic archives, etc. Even if you do not know in advance exactly what you are looking for. In that | |||
Updated: 2, 2006 | Rating: 79 | Author: Jan Goyvaerts | Size: 3736 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
2. | Compare Suite 3.0 (aks-labs.com) | ||
Suite can compare both - related and non-related files. "By keywords" comparison feature highlights common and unique keywords, allowing to compare non-related files. Word-by-word comparison compares files with a common ancestor. Folder comparison function allows to compare two folders and files within it. If you work with plain text, then you can edit | |||
Updated: 2, 2006 | Rating: 0 | Author: AKS-Labs | Size: 2161 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
3. | Parse-O-Matic Power Tool 4.03.00 (members.aol.com) | ||
your file in the wrong format? Don't rekey or delete it - fix it! You can reformat your valuable data with the Parse-O-Matic Power Tool - a programmable file converter. Sample applications: Edit a text file automatically. Copy good data; repair or remove bad data. Restructure a print | |||
Updated: 9, 2005 | Rating: 0 | Author: Timothy Canada | Size: 1286 kb | Shareware Similar programs | |||
4. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Mutilate File Wiper 2.92 (home.att.net) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
6. | WinHex 11.26 (winhex.com) | ||
structures using templates * Concatenating, splitting, unifying, analyzing, and comparing files * Particularly flexible search and replace functions * Automation of file editing * Sophisticated undo mechanism * Drive imaging & drive cloning * 128-bit encryption, MD5, 256-bit digests, CRC32, checksums * Import of all clipboard formats * Conversion formats: Binary | |||
Updated: 9, 2005 | Rating: 2950 | Author: Stefan Fleischmann | Size: 727 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
7. | TextHarvest 3.10.00 (members.aol.com) | ||
is ... a simple text file filter; a programmable data conversion and extraction utility; a report mining converter. Copy, delete, parse, change (edit or reformat) records from ASCII or EBCDIC text or binary files. Reformat flat files from Windows, Unix or Mac, including fixed record length and character terminated (e.g. null or tab). Import data to create | |||
Updated: 9, 2005 | Rating: 2737 | Author: Timothy Canada | Size: 1142 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
8. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
9. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Xtreeme Search Engine Studio 2.0 (xtreeme.com) | ||
(with a HTTP crawler, an FTP / local disk scanner, or using an XML file) and then creates a professional, ultra fast search engine for your website (as a binary CGI script or PHP script) or an offline search for CD-ROM / DVD distributions. No installation on server required thanks to a built-in highly optimized database engine! The difference between Search Engine Studio and | |||
Updated: 9, 2005 | Rating: 0 | Author: Xtreeme | Size: 2376 kb | Demo Go to category: Web Development > Site Administration Similar programs | |||
|
Home > Binary file analyzer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|