|
||||||
|
||
|
Home > Document encryption software |
Related keywords: encryption, document, file encryption, Encryption, document management, Portable Document Format, encryption software, Document Management, encryption system, email encryption |
|
|
171. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
Crypt .NET is an advanced encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric encryption algorithms including AES (Rijndael), Blowfish, and Twofish. It provides the ability to easily create digital signatures for files or memory data, or verify digital signatures against incoming data or files. It allows for | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
172. | JGo 5.0 (nwoods.com) | ||
and SubGraph. JGo is 100% implemented in Java using Swing. Its Document/View/Tool architecture is very flexible and powerful. The classes provide many properties and overridable methods to make it easy to customize the appearance and behavior. JGo includes extensive and useful sample programs with | |||
Updated: 9, 2005 | Rating: 0 | Size: 2700 kb | Commercial Go to category: Development > Other Similar programs | |||
173. | StrongDisk Pro 2.9 (strongdisk.de) | ||
the protected disk to your hard drive before working with them. Any documents, tables and databases can be opened directly on the protected disk. On finishing the work or in the case of emergency all protected disks can be instantly dismounted, thus, locking access to the data. Some Applications * | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
174. | Find Shortcuts 1.0 (slashbacksoftware.com) | ||
on the target, the shortcut may open a folder, run a program, open a document, play a music file, open a web page, and so forth. When "Test" is selected (from the Edit menu, clicking the Test button, or by pressing F7), Find Shortcuts checks the target of each shortcut to see if it is valid. Since | |||
Updated: 9, 2005 | Rating: 0 | Author: John Homerstad | Size: 333 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
175. | SOCKShell 1.3 (socksoftware.com) | ||
Windows Explorer's File menu and context menu (the menu displayed when you right click on an item in the Explorer window) display the options that operate on the selected object. These operations include the standard Cut, Copy, Delete and Rename operations if they are appropriate, and will often include other operations which are specific to the type of object that was clicked on | |||
Updated: 9, 2005 | Rating: 0 | Size: 866 kb | Shareware Go to category: Desktop > Other Similar programs | |||
176. | GoDiagram 2.2 (nwoods.com) | ||
GoDiagram is 100% implemented in C# as a managed .NET Control. Its Document/View/Tool architecture is very flexible and powerful. The classes provide many properties & events to make it easy to customize the appearance and behavior. GoDiagram includes extensive and useful sample programs with | |||
Updated: 9, 2005 | Rating: 0 | Size: 6800 kb | Commercial Go to category: Development > Other Similar programs | |||
177. | LeoStatistic 11.7 (leokrut.com) | ||
of present statistical analysis can be saved in form of MS Word document. Universal tool for statistical analysis and modeling of experimental and market data. Support import data from variety of data sources. Statistical schemes cover all major data modeling operations. Create report ready | |||
Updated: 9, 2005 | Rating: 0 | Author: Leonid Sakharov | Size: 791 kb | Shareware Go to category: Education > Other Similar programs | |||
178. | PakVault V4.0.1 (pakvault.co.za) | ||
and accessible to no one that does not have both the password and encryption key (a second 8 character password). After the initial backup, which may take some time depending on your internet connectivity speed, only binary changes within the files are updated back to our storage platform so the daily backup is extremely efficient. Backup and Restore from anywhere in the world | |||
Updated: 9, 2005 | Rating: 61 | Author: Pierre Hefer | Size: 11791 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
179. | Secure Hive 1.1.0.0 (securehive.com) | ||
a simple but powerful means of encrypting parts of, or entire, documents, email messages, etc. Secure Hive offers the enterprise a method of: Securing sensitive documents Protecting information during transfer Securing emails Securing portions of a document (e.g. individual graphics or clauses in a contract) Protecting the integrity of your | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Morrow | Size: 986 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
180. | Aesthetic Memory Journal 1.03 (blackobelisksoftware.com) | ||
in a secure, easy to use, word-processing environment. A fast encryption algorithm protects both your dreams and the images inwhich they represent. Build excitement as the seconds pass by with the Aesthetic Journal Binder's Special Event Countdown. Create a collection of Scrapbooks that include pages of text and graphics representing the important moments of your life | |||
Updated: 9, 2005 | Rating: 0 | Author: Black Obelisk Software | Size: 2567 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
|
Home > Document encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|