|
||||||
|
||
|
Home > Sensitive files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, sensitive, delete files, recover files |
|
|
11. | Antechinus JavaScript Editor 7.0 (c-point.com) | ||
for batch processing and common computing tasks on your local files or the intranet - without the web pages or the web browser! How? By using the Editor's built-in interpreter. 4. Create stand-alone programs: create fully-fledged HTML Applications (HTA) powered by JavaScript. 5. Tap into the power of .Net: design, compile and maintain JScript.Net applications and | |||
Updated: 2, 2006 | Rating: 275 | Author: Alex Davidovic | Size: 5546 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
12. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
encrypt a PDF without to allow to print it. The button to print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing the user to read it only if he know the correct password. Note, The source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
13. | Steganography 1.7.1.1 (securekit.com) | ||
an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
14. | Steganography 1.7.1.1 (pipisoft.com) | ||
an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Interlex 2.5.0.5 (vocab.co.uk) | ||
keyboard and font selection; selection of ready-to-use vocabulary files for French, German, Italian, Portuguese, Russian and Spanish; wide range of user preference options; context-sensitive Help and daily tips. Interlex provides a highly focused, interactive learning environment that allows | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Quilley | Size: 858 kb | Freeware Go to category: Games & Entertainment > Kids Similar programs | |||
16. | Ultimate Date Calculator 2.8.8 (lawtech.com.au) | ||
report formats that include paper, web page, RTF, CSV and SYLK files. It stores multiple calculations in a table so all of calculations can go into a single report. You have the option of excluding weekends and holidays. It uses a combination of tabs and wizards to guide the user through each calculation, and has extensive context-sensitive help, while the Start page | |||
Updated: 2, 2006 | Rating: 0 | Author: Trevor Lewis | Size: 7555 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | Password Manager XP 2.1.322 (cp-lab.com) | ||
your private data with this password management utility. Program's unique features include capability to encrypt stored information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | Silver Key 3.3 (filecryption.com) | ||
you need to send sensitive data over the Internet you should encrypt it first. Anybody knows this. Right, but what about the other side? You correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Silver Key 3.3 (kryptel.com) | ||
you need to send sensitive data over the Internet you should encrypt it first. Anybody knows this. Right, but what about the other side? You correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | Pocket CHM 4.1 (flyskysoft.com) | ||
manuals, or ebooks in CHM format. Drag a folder containing HTML files and drop it onto Pocket CHM, then click "Compile to CHM". How simple it is! And more, it also provides powerful functions for editing HTML files, customizing Help, designing TOC and Index, and so on. With it you can Create HTML Help, Create context-sensitive Help, Edit existent HTML Help files | |||
Updated: 2, 2006 | Rating: 420 | Author: Samuel Song | Size: 2398 kb | Shareware Go to category: Development > Help Tools Similar programs | |||
|
Home > Sensitive files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|