|
||||||
|
||
|
Home > Strong encryption software |
Related keywords: encryption, file encryption, Encryption, encryption software, encryption system, email encryption, strong, data encryption, hard disk encryption, ENCRYPTION |
|
|
171. | CrypTalk 1.0 (reymax.com) | ||
is a full-featured secure chat client based on strong public key cryptography. CrypTalk messages can include embedded pictures, data files, etc. Other features include: automatic or manual network computer detection, user groups, blacklists, auto responder, and message templates. Socks 4, 4a, 5 are supported. CrypTalk is a full-featured secure chat client based on strong | |||
Updated: 3, 2005 | Rating: 42 | Author: Max Nukin | Size: 680 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
172. | Leylines 1.04 (gamethoughts.com) | ||
or controlling enemies. Over time, unit gain experience and become stronger. Also units can be enhanced by a variety of spells, such as Flame Aura, Storm Run and Imperviousness. World maps range from tiny (24x24) to huge (64x64) and consist of twenty-five distinct terrain types. Instead of playing | |||
Updated: 3, 2005 | Rating: 0 | Author: Game Thoughts | Size: 6550 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
173. | EzBrowser 3.0 (ietoolbox.com) | ||
windows - Secure: your passwords and notes are encrypted with strong encryption Now your passwords will always be "right there" for you in IE when you need them. And EzBrowser can even fill-in the account name/user name/password automatically for you. And there is also a Notes tab where you can enter notes, such as transaction details, or anything that is important to | |||
Updated: 3, 2005 | Rating: 0 | Author: Brett Goodman | Size: 2045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
174. | hCrypt 3.0 (raysion.com) | ||
various advanced protection settings in a few simple steps. For strong protection you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
175. | Online Services Center 2.3 (itlaurel.com) | ||
shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, OSC has great "Reports" section, covering all kinds of | |||
Updated: 8, 2004 | Rating: 0 | Author: Janice Petros | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
176. | Service Center Operator 2.3 (newageit.com) | ||
shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, Service Center has great "Reports" section, covering all kinds | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
177. | SecurDataStor 5.01 (encryptx.com) | ||
SecurDataStor™ Platinum is a strong file encryption program for Windows. Encrypt files, folders, local and networked hard drives, CD, DVD and email attachments using a simple, intuitive interface. Hide encrypted folders and share sensitive data with recipients who can view decrypted files without having the software installed. Protect your private personal and business | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
178. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
that is running on your computer. All information is stored in strongly encrypted, compact log files, that can be easily archived. ActMon can hide the logs on the monitored PC or send them via network or email. The monitoring can be opted to be invisible to the user and ActMon is protected against manipulation: The program runs completely maintenance free. Activity data is | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
179. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
database can be password-protected, thus providing more security. Strong DES encryption algorithm and double password protection make sure that your confidential information is for your eyes only! PocketSafe also allows you to store information in several different files. It is quite handy to structure all the information you need for your employees, colleagues, kids or spouse | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
180. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Strong encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|