|
||||||
|
||
|
Home > Search encrypted software |
Related keywords: search, Search, search engine, encrypted, search and replace, search engines, search engine optimization, word search, search tool, image search |
|
|
11. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
13. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
15. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | Sprintbit File Manager 2.3 (sprintbit.com) | ||
Synchronizer, Link Validator for validating LNK and PIF links, Search & Replace for replacing specified files with the one source file. Encrypt & Decrypt tool supports most known encryption algorithms, File Searcher, Split - Merge, Join Files, File Attributes and more. Fully configurable interface allow you to change colors, fonts, skins, layout, view files with | |||
Updated: 3, 2006 | Rating: 0 | Author: Sprintbit Software | Size: 10664 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
17. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | SwordSearcher Bible Software 4.8.1.2 (swordsearcher.com) | ||
for both devotional and in-depth study. In addition to making Bible searches fast and simple, SwordSearcher includes a Topic and Verse Guide function designed to make accessing a vast amount of library material as simple as typing in a verse reference or subject. You can specify any verse reference or passage to study, and SwordSearcher will instantly show you every book, commentary | |||
Updated: 2, 2006 | Rating: 0 | Author: Brandon Staggs | Size: 10466 kb | Shareware Go to category: Home & Hobby > Religion Similar programs | |||
19. | Project Analyzer 8 (aivosto.com) | ||
code to considerably reduce the size of your program. You can also search for duplicated code blocks that frequently result from copy-paste coding. — Project Analyzer lets you navigate your projects with hypertext and graphical views. Click objects to see their use and declarations. Locate code via the enhanced Find window. Copy syntax-formatted code to documents. Understand | |||
Updated: 2, 2006 | Rating: 1787 | Author: Aivosto Oy | Size: 4712 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
20. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
credit cards, software serial numbers and confidential notes in an encrypted form securely and easily. It can automatically fill login information for you. Features include password generator, backup options, auto complete sequence editor, lock, windows clipboard support, and clipboard clearing. You can organize your information into custom folders and categories, copy usernames and | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Search encrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|