|
||||||
|
||
|
Home > Password tool software |
Related keywords: tool, password, Tool, UML Tool, Modeling Tool, Web Development Tool, Password, Web Design Tool, password manager, password protection |
|
|
221. | DA Password Recovery Pro 2.03 (deskarsenal.com) | ||
yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at home and no one can overlook your password. You've been entering your password | |||
Updated: 9, 2005 | Rating: 740 | Author: DeskArsenal.com | Size: 656 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | Data Stash 1.5 (skyjuicesoftware.com) | ||
Stash is an award-winning clever little security tool that allows you to hide sensitive data files within other files. Select a large bitmap or database file (or any file you'd like to use) as a receptacle, then add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains fully functional. Password protection is also provided, using | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
223. | DeskBar 1.5 (barefootinc.com) | ||
Lock Desktop: Locks the Windows desktop until you enter your password. Run Application: Runs any application or opens a file without using the Start Menu. System Tools: Access common system tools, disk defragmenter, scan disk, character map, registry editor and more! Disk Drives: Shows all the available disk drives in a popup menu. Clicking one of the | |||
Updated: 9, 2005 | Rating: 16 | Author: Don Metzler | Size: 703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
224. | Desktop Scout 4.0 (globalpatrol.net) | ||
of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time from a remote computer, so you can monitor your kids or | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
225. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The images can later be viewed with the built-in image viewer or any external software | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
226. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
227. | EldoS PKI Tools 1.2 (eldos.org) | ||
PKI Tools is set of programs designed for encryption and signing of files using X.509 certificates and for management of these certificates. 1. File Processor allows you to pack, unpack, sign, encrypt, verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also allows to send encrypted or signed files by e-mail. File Processor seamlessly | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
228. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
229. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
230. | Excel Password 9.0.5351 (lastbit.com) | ||
Password: recover ANY Excel password just within a few minutes regardless of the password length! Excel Password is a guaranteed password recovery tool, which comes in very handy if you forgot, lost, or misplaced your password for Excel documents. Such situation may also occur if someone who does not work with you anymore password | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Password tool software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|