|
||||||
|
||
|
Home > Command line encrypt software |
Related keywords: encrypt, line, command, command line, on line, off line reader, Encrypt, Line, file encrypt, encrypt file |
|
|
91. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
92. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
93. | Groone's Macroer 2.6 (groonesworld.com) | ||
worry about repitive tasks again! Groone's Macroer simplifies those redundant day to day tasks. By creating simple text routines you will free up hours on the keyboard. There are no complicated scripting languages to know and no list of forced to remember keyboard strokes. YOU define everything. Now you don't have to remember hundreds of passwords that may fill your day at work | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
94. | HS CleanDisk Pro 5.00 (haysoft.com) | ||
Windows system optimizer which cleans hard-disk and system registry, tunes-up system specific settings , checks folder usages, optimizes memory and uninstalls software no longer wanted MAINTENANCE * Cleans drives from files left aside and unused. * Cleans system registry from uninstalled software junks | |||
Updated: 8, 2004 | Rating: 42 | Author: Cenker Sisman | Size: 1207 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
96. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | JvCrypt 1.0 (vandaveer.com) | ||
encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
98. | Mouse and Key Recorder 5.7 (kratronic.com) | ||
in any window, but it also contains more than 130 additional commands. These commands allow controlling the macro run (loops, conditions, goto, variables, etc.), manipulating files (delete, rename, etc.), starting or switching to programs, manipulating cursors, reading/writing files, logging your keystrokes, etc, etc. The Mouse and Key Recorder activities are stored in a | |||
Updated: 2, 2006 | Rating: 16 | Author: John Krauer | Size: 3737 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
99. | OrphansRemover 1.8.9 (digiarch.org) | ||
orphaned shortcut files • Support for user defined folder • Command line options • Straight forward interface OrphansRemover scans your computer and finds broken shortcuts (*.lnk files) on your Desktop, in your Start Menu, Recent Documents, Program Files folder and other (custom) | |||
Updated: 2, 2006 | Rating: 0 | Author: Tijn Hoekstra | Size: 737 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
100. | Pad 4.00 (hds-pad.com) | ||
is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular expressions, a block (column) selection mode, line bookmarks and line | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
|
Home > Command line encrypt software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|