|
||||||
![]() |
![]() |
|||||
![]() |
||||||
|
||
|
Home > Secure form software |
Related keywords: secure, form, Form, Secure, form fill, electronic form, form filler, form filling, web form, Secure Shell |
|
|
111. | Essen Cyber Outlet 2.6 (essencomp.com) ![]() | ||
do not have one already. Collect your customers payments through Secured Online Payment Methods. Application connects you to popular Payment Gateways. Complete Credit Card processing. Create unrestricted number of Groups and represent them in a hierarchical form.(father-child relationship). Create unlimited number of items. Upload Images of your Products from anywhere | |||
Updated: 9, 2005 | Rating: 0 | Author: Apurva Parekh | Size: 6457 kb | Commercial Go to category: Network & Internet > Other Similar programs | |||
112. | Convert XLS to PDF For Excel 2.00 (8848soft.com) ![]() | ||
view PDF files. Document Format (PDF) is the fact standard for the secure and reliable distribution and exchange of electronic documents and forms around the world, and now you can convert any Ms Excel documents into professional-quality PDF file format only by one click. Convert XLS to PDF For Excel is a Excel Addin that convert XLS to PDF, Excel document to PDF | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Wang | Size: 3013 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
113. | Cynapse InfoCryptor 1.50 (cynapse.co.in) ![]() | ||
is a multi-user secure information storage application that assists you to manage and organise your critical information. InfoCryptor is specifically designed to store every kind of textual information, such as important notes, passwords, messages, security codes, large official documents, e-mail addresses and their passwords, credit card information, customer interface | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
114. | Bookmark, Password and Login System by M8 Software 4.30.001 (winm8.com) ![]() | ||
With a single click on it's Auto-Insert button it fills the log in form and clicks the submit button. If you have logon screens more complicated than just username and password - No Problem - It can set options and drop downs as well as fill any number of text fields. The small window can also be used without a bookmark to paste details like name, address and credit card No. to any | |||
Updated: 3, 2005 | Rating: 0 | Author: John Turnbull | Size: 1273 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
115. | Clear Your Footprints 1.4 (newpowersoft.com) ![]() | ||
The main features of Clear Your Footprints are: Delete the file securely and make it nonrecoverable. Delete the directory securely and make it nonrecoverable Browse and edit your typed URL history. Browse and edit IE History. Clear Internet temporary files,IE History,IE Favorites,cookies,Location bar addresses, password history,AutoComplete content on forms | |||
Updated: 3, 2005 | Rating: 16 | Author: Yong Li | Size: 1100 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
116. | Concentration - the Memory Games 4.1 (galleus.com) ![]() | ||
personal check, money order, cashier's check accepted. Integrated secure purchase. A memory game that combines tradition and innovation. Computer opponents. Tournament. Player statistics Randomly moving and teleportig cards. Joker and gravity. Card sounds and backgrounds. Match cards to descriptions. Customizable | |||
Updated: 3, 2005 | Rating: 0 | Author: Gábor Kertes | Size: 2384 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
117. | Lucigenic TCP 2.1 (lucigenic.com) ![]() | ||
for the HTTP protocol, DNS resolver services and 442 bit secure sockets. Lucigenic TCP/IP is a completely self-contained, very small footprint component that does not require any runtimes for it's operation. You can easily add Internet capabilities to applications written in just about any development system, including C++, VB, ASP, Pearl, Delphi, Visual FoxPro, PowerBuilder | |||
Updated: 3, 2005 | Rating: 0 | Size: 1750 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
118. | EzBrowser 3.0 (ietoolbox.com) ![]() | ||
tabbed browser, Passwords & Notes keeper, Form Filler, File Viewer, Favorites Viewer/Searcher, and QuickLinks toolbar. EzBrowser features: - Well-behaved: NO ADWARE, NO SPYWARE - Unobtrusive: no annoying "in your face" popup windows - Secure: your passwords and notes are encrypted with strong encryption Now your passwords will always be "right there" for you in | |||
Updated: 3, 2005 | Rating: 0 | Author: Brett Goodman | Size: 2045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
119. | SecurDataStor 5.01 (encryptx.com) ![]() | ||
different network and firewall technologies, and across different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a server-less authentication model. This file encryption software creates an encrypted archive or wrapper around the protected data and stores the permissions in that wrapper. This permission-based rights management feature enables the | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
120. | encryptX SecurDataStor Premium 6.0 (encryptx.com) ![]() | ||
and passwords. This file encryption program supports all primary forms of PC-based storage media (e.g. USB flash memory devices, CD-R/RW discs, DVD, Iomega™ Zip® and Jaz® disks, and floppy disks). Written in C++ to maximize performance and minimize footprint, the program can encrypt large volumes of data in moments. Microsoft verified for Windows XP. Strong file encryption | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Secure form software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|