|
||||||
|
||
|
Home > Lesson plans software |
Related keywords: lesson, guitar lesson, lesson plan, plans, tariff plans, house floor plans, floor plans software, Floor Plans, building plans, typing lesson |
|
|
191. | CHAOS Messenger 4.0 (safechaos.net) | ||
CHAOS Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
192. | CHAOS Self Decryptor 3.9 (safechaos.net) | ||
CHAOS Self-Decryptor is the utility program that creates self-decrypting chaos files for Windows. Self-decrypting chaos files are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt | |||
Updated: 9, 2005 | Rating: 16 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
193. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
194. | Clean Registry 2.0 (winenhance.com) | ||
to back up my registry? The registry is vital to your computer's ability to run smoothly. Any faulty keys, registry viruses, or fragments can cause your computer to either slow down or not function properly. If your registry becomes infected with a virus or you have lost keys, it may require you | |||
Updated: 9, 2005 | Rating: 246 | Author: WinEnhance Marketing | Size: 903 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
195. | Client for Remote Administrator™ 2.1 (volm.narod.ru) | ||
of nesting - connections layout on a "map" - on a floor or network plan - polling connections (ping and check RAdmin existence) - storage of passwords for connections and their automatic input on demand - remote install, setup and control of RAdmin server - scanning of a local network for new computers both with RAdmin and without it - and many others... See more at | |||
Updated: 9, 2005 | Rating: 25 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
196. | Active CHAOS 5.0 (safechaos.net) | ||
Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other | |||
Updated: 9, 2005 | Rating: 0 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
197. | Active Work Tracker 1.5 (brigsoft.com) | ||
Active work tracker is a PC events tracker that surveys the time you spend working on your PC. It is launched when Windows starts up and counts mouse and keyboard events. Either you are writing text or walking through Internet you are using a mouse and a keyboard. Activity Counter counts mouse and keyboard | |||
Updated: 9, 2005 | Rating: 0 | Author: Rest Alex | Size: 511 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
198. | Advanced Encryption Plug-In for Windows Explorer 4.0.2 (secureaction.com) | ||
and allows you to work with your important files using Explorer's context menu. It is easy as 1-2-3! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CASTt. All algorithms are industrial encryption standards. Shredding (Safely removing files from your system). The shredded files will never be restored even with using | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
199. | Advanced File Protector 2.2 (666soft.com) | ||
disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Joao Santos | Size: 3073 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
200. | Advanced Office Password Breaker 1.40 (elcomsoft.com) | ||
Forgot or lost your password to your MS Word or Excel 97/2000 file and now cannot read your own file? Don't feel alone. This is a common occurrence and you just happen to be in luck. Before now, if you used a moderately long and complex password it would take a lifetime to crack open your file even with a | |||
Updated: 9, 2005 | Rating: 4144 | Author: Vladimir Katalov | Size: 633 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Lesson plans software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|