|
||||||
|
||
|
Home > Art copy software |
Related keywords: copy, dvd copy, Copy, copy dvd, copy protection, Copy Protection, DVD copy, COPY, file copy, copy cd |
|
|
141. | Iside 1.3 (littlelite.altervista.org) | ||
their hash code (MD5,SHA1,CRC32,...). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool. The hash function is the fingerprint of file. It allows to determine if two files are different even if their size is the same. Ideal tool for | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 628 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
142. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
143. | EldoS KeyLord 4.0 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates with your web browser and helps you store login information not in insecure Windows Password Storage (for which browsers and crackers exist), but in encrypted KeyLord file. EldoS KeyLord lets you arrange confidential information (passwords, account | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
144. | Email Spy Pro 4.5 (email-spy.biz) | ||
available today. Once installed on monitored computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
145. | Filzip 3.04 (filzip.com) | ||
(AES) is also supported in Filzip 3.0. You can rename, move copy or delete archives within Filzip. Zipping features: add, delete, view, open files from an archive, view & edit the zip comment, password protect zip files, test files while extracting, automatic installation of archives. For visualization, Filzip supports printing of the archive listings to html, txt or your | |||
Updated: 9, 2005 | Rating: 16 | Author: Philipp Engel | Size: 1199 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
146. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
147. | Defrag for Windows 3.0 (pcmesh.com) | ||
Defrag for Windows FAQ and please feel free to download a trial copy and try. Why do I need this software? Because your programs and documents will load slower and slower by time due to fragmentation. Thus you need to defragment your files regularly. Since a complete defragmenting is a tedious and time-consuming task and involves some complicated steps, we have created Defrag for | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Mesh Marketing | Size: 635 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
148. | DiFolders 2.3 (difolders.com) | ||
folder and all the files that you put into the folder will be moved, copied or deleted according to the rules that you define. You can use DiFolders to sort your media (inc. MP3) files, documents, on-the-fly backups, etc. by file name, extension, part of file name, date, time, MP3 tag, HTML title | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Chestnykh | Size: 604 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
149. | DiFolders.Network 2.3 (difolders.com) | ||
and all files that appear on network computer will be processed (copied, moved, deleted) according to these rules. This program automates file distribution, sorting and backup in intranets (LAN). Files can be sorted (distribute, backup) with masks, variables, etc. You define rules and all files that appear on network computer will be processed with these | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Chestnykh | Size: 603 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
150. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Art copy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|