|
||||||
|
||
|
Home > Email passwords software |
Related keywords: email, Email, passwords, bulk email, email marketing, email extractor, email address, email software, email client, bulk email software |
|
|
151. | CryptoMite 2.00 (baxbex.com) | ||
compressed exe-files, so you can send your encrypted files via email in a manner that allows the recipient to decrypt the files without having installed the program. All that is needed is the password used for the encryption; decrypting and decompressing engine is encapsulated inside the archive. CryptoMite is the first encryption software (and properly the only) which | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
152. | Desktop Scout 4.0 (globalpatrol.net) | ||
deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
154. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
155. | ExpressZIP 4.5.0 (avantrix.com) | ||
types of archives including ACE, CAB and RAR style archives, Full Email integration allowing easy archive attachments to Email messages, Full network support for file selection and extraction, Supports the new 64-bit ZIP format, Can record a currently open archive to a CD/DVD media disc without the need for other software, Extended EXE creation support allowing more properties | |||
Updated: 2, 2006 | Rating: 0 | Author: AVANTRIX Inc. | Size: 3998 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
156. | EzCrypt+ 2.01 (kmgi.com) | ||
Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress. “Encrypt and | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
157. | FineCrypt 8.1 (finecrypt.net) | ||
with a single mouse click; secure communication with other users by email; task manager; key manager; file manager; encryption of files, folders and whole directory trees; creation of encrypted archives; creation of self-decrypting executables which can be decrypted without FineCrypt; encryption with | |||
Updated: 9, 2005 | Rating: 0 | Author: Crypto Systems | Size: 4239 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
158. | Ghost Keylogger 3.80 (keylogger.net) | ||
to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly invisbly on all operating systems, even in the | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
159. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer. with its bulit-in spy | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
160. | Groone's Macroer 2.6 (groonesworld.com) | ||
worry about repitive tasks again! Groone's Macroer simplifies those redundant day to day tasks. By creating simple text routines you will free up hours on the keyboard. There are no complicated scripting languages to know and no list of forced to remember keyboard strokes. YOU define everything. Now you don't have to remember hundreds of passwords that may fill your day at | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Email passwords software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|