|
||||||
|
||
|
Home > Database encryption software software |
Related keywords: software, database, Software, encryption, Database, RAD Software, free software, spy software, file encryption, backup software |
|
|
161. | MClipboard 2.1 (fgroupsoft.com) | ||
those who work with word processors, do a lot of programming or use databases, because it was developed as a quick clipboard assistant for computer pros. Additionally MClipboard saves the clipboard history as a report, sounds operations, restores data after reboot, allows you to use the clipboard just | |||
Updated: 9, 2005 | Rating: 0 | Author: F-Group Software | Size: 1219 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
162. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
163. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
164. | #Remove Access Security 3.0 (e-tech.ca) | ||
Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords, corrupted workgroup files | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
165. | SecureWord 1.5 (cezeo.com) | ||
our program for your convenience. We are using modern and secure encryption algorithms. The main method, used in SecureWord is AES, Advanced Encryption Standard- the one, accepted by American government in 2002 for using everywhere. We are using the most secure configuration, with the longest code. We also use RipeMD- European standard of digital signature, SHA- Security Hash | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
166. | Tray Safe 4.3 (fgroupsoft.com) | ||
Tray Safe password manager is a proud holder of the world's most secure password keeper title because of its unique hardware ID feature. Basically, it means that the program works only on a single PC (yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
167. | WatchetBurn! 2.72 (watchetsoft.co.uk) | ||
technology writes direct to all types of CD/DVD with no additional software required. Create multi-session archives or automated backup projects. Writes only updated files - save space/ time but can locate files from any session on the backup. WatchetBurn! creates revolutionary see-thru disks - all | |||
Updated: 3, 2005 | Rating: 0 | Author: Colin Balkham | Size: 5711 kb | Shareware Similar programs | |||
168. | ActionOutline 2.1 (actionoutline.com) | ||
and you will have over eight hundred titles to choose from. This software niche is very, very hot. Yet, strangely enough, a recent survey shows that after using organizers and PIMs for over 6 months, 50% people abandoned them. And only 15% said that the software really helped them become more | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 978 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
169. | Address Database Professional 4.4 (pragmaticsw.com) | ||
Database Professional is a sophisticated Windows rolodex that allows you to easily store names, addresses and notes. You can filter the names to display and print the names based on selection criteria. You can print phone lists, address books, lists of people to send holiday cards and gifts, mailing labels, envelopes and file folder labels. Reports may be previewed or printed on | |||
Updated: 9, 2005 | Rating: 58 | Author: Steve Miller | Size: 1374 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
170. | Citation 3.15.14 (radsoftware.org) | ||
is law enforcement software that is specifically designed to enter and maintain traffic citation information into a database in an efficient, secure, and effective medium that is never lost, misfiled, or mishandled. Further, Citation has powerful searching tools that let you find any one citation instantly, or assemble a sub-list of citations that have some common | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1163 kb | Commercial Go to category: System Utilities > Shell Tools Similar programs | |||
|
Home > Database encryption software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|