|
||||||
|
||
|
Home > Store command software |
Related keywords: store, command, command line, e store, online store, Command, Store, store passwords, in store, store builder |
|
|
131. | Cresotech TypeRecorder 1.0 (cresotech.com) | ||
software, you can click on the TypeRecorder button in order to store/paste any text fragment or keystroke succession using a special buffer. If you enable the T-Rec function while playing some Windows-based and keyboard-controlled software, you can easily re-simulate (and edit) your actions for any time. This effect gets more pronounced when T-Rec is used with multimedia musical | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1491 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
132. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
133. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
134. | CryptoForge 3.2.5 (cryptoforge.com) | ||
algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
135. | Delenda 2.415 (peccatte.karefil.com) | ||
use it as a Windows NT or 2000 or Windows XP service or in command line mode for cleaning via batch processing. Of course Delenda can also process Macintosh files stored on Windows NT/2000/XP file server. Suppress files older than n days in selected folders, move files to archive folders using file creation, modification, last access date. You choose purge days,expired | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
136. | Deletor 3.1 (basta.com) | ||
Deletor also has support for filter packs, which allow you to store sets of your most commonly used file deletion specifications. Combine this with file date filtering and command line access to the program, and you can easily automate the cleaning process with batch files, shortcuts, or a scheduler. Deletor helps you keep your disks clean by deleting or shredding files | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
137. | Disk CleanUp 2000 4.6 (gregorybraun.com) | ||
deleted files. Deleting a file will normally just remove the file's directory entry, but the data itself still remains on the disk. CleanUp will completely eliminate the contents of your deleted files. Disk CleanUp provides options to specify an NSA approved disk erasure method and background execution priority. Disk CleanUp works with any FAT16 or FAT32 hard drive, as well as MS | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 721 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
138. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
139. | EasyConsole 1.2 (peccatte.karefil.com) | ||
you navigate in drives and through folders using Windows issuing DOS commands on a slave MSDOS console, saving command-line instructions for future use. Last 20 commands are memorized and you will be able to store 10 long most used or favorite command lines on 10 buttons | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 1476 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
140. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Store command software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|