|
||||||
|
||
|
Home > Secret key encryption software |
Related keywords: encryption, secret, file encryption, Encryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, ENCRYPTION |
|
|
11. | CryptoCrat 2005 4.60 (secureaction.com) | ||
2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating self-decrypting exe archives. To send them to your friends and | |||
Updated: 9, 2005 | Rating: 39 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
logins, to encrypted easy-to-understand logs and can send reports secretly to your e-mail address or any number of other e-mails, specified by you. Advanced KEYLOGGER monitors the Internet activity precisely by logging all web-pages the user visits. Advanced KEYLOGGER records visual statistics of everything happening on the screen periodically (customizable time interval) | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons in the wrong hands. New added features to this version, The ISB is the Internet Speed Booster feature included to optimize the internet connections, The DLLs | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
14. | Safe Express Home 4.2 (netsafesoft.com) | ||
configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
15. | Plan4ME 4.54.17 (ByronSoftware.org.uk) | ||
send to your document, its that easy and has been accepted by school's inspectorate. All those cross curicular links plus differentiation and expected outcomes, of course you can edit, change or just type in your own plans. Schemes include all those from DfES and/or QCA, includes framework for | |||
Updated: 9, 2005 | Rating: 16 | Author: Neil Thompson | Size: 19295 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
16. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
17. | Winvestigator 2.4 (tropsoft.com) | ||
and runs undetectable in Windows capturing keystrokes, URL's, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator's settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface and thorough | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 795 kb | Demo Go to category: System Utilities > Other Similar programs | |||
18. | SpyMyPC 2.0 (benutec.com) | ||
Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Typical uses for SpyMyPC : Monitor Your Children's Activity ( Statistics : With an estimated 24 million children now online, one out of five have been solicited for sex in the last year. - Congressional Study submitted June 8, 2000 ) ; Keep Your Loved | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | TK8 Safe 2.5 (tk8.com) | ||
using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
20. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Secret key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|