|
||||||
|
||
|
Home > Encryption tools software |
Related keywords: encryption, tools, Tools, UML Tools, Modelling Tools, file encryption, Encryption, encryption software, encryption system, webmaster tools |
|
|
251. | 12Ghosts ShowTime 7.10 (12ghosts.com) | ||
Enhance your taskbar clock to show the date and a second time zone. You may display seconds smaller and the date in a different color, for example. Everything is configurable, the display of the date and time, font, size, colors, alignment, and shadow effect. 12-ShowTime displays the time and date either in | |||
Updated: 9, 2005 | Rating: 199 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
252. | SOCKShell 1.3 (socksoftware.com) | ||
Windows Explorer's File menu and context menu (the menu displayed when you right click on an item in the Explorer window) display the options that operate on the selected object. These operations include the standard Cut, Copy, Delete and Rename operations if they are appropriate, and will often include other operations which are specific to the type of object that was clicked on | |||
Updated: 9, 2005 | Rating: 0 | Size: 866 kb | Shareware Go to category: Desktop > Other Similar programs | |||
253. | GoDiagram 2.2 (nwoods.com) | ||
or process or workflow editors, flowcharts, or software design tools. GoDiagram includes many predefined kinds of nodes, links, and basic shapes including text and images. It supports layers, groups, subgraphs, scrolling, zooming, selection, drag-and-drop, clipboard, in-place editing, tooltips, grids, printing, overview window with panning, and a palette for draggable nodes. Links | |||
Updated: 9, 2005 | Rating: 0 | Size: 6800 kb | Commercial Go to category: Development > Other Similar programs | |||
254. | LeoStatistic 11.7 (leokrut.com) | ||
tool for statistical analysis and modeling of experimental and market data. Universal input from outside data sources: from text or database files; file type and edit in spreadsheet like control; copy/paste from spreadsheets applications like MS Excel or Access; extract curve in numerical form from image chart. Data manipulation procedures permit to new create and modify | |||
Updated: 9, 2005 | Rating: 0 | Author: Leonid Sakharov | Size: 791 kb | Shareware Go to category: Education > Other Similar programs | |||
255. | PakVault V4.0.1 (pakvault.co.za) | ||
Secure Online Backup Tool - Data is Encrypted and Remains Confidential Install this program on your PC and have the piece of mind that all your most critical data will be backed up on line to a secure storage platform, fully encrypted and accessible to no one that does not have both the password and encryption key (a second 8 character password). After the initial backup | |||
Updated: 9, 2005 | Rating: 61 | Author: Pierre Hefer | Size: 11791 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
256. | m9P Database 1.2 (mental9Production.com) | ||
m9P Database is a professional database builder and manager for home and business. While being easy-to-use, the product is powerful and capable of creating databases that can be used for a wide range of needs. Whether you want to keep a simple list of contacts’ info, or you want to build secure and complex | |||
Updated: 9, 2005 | Rating: 51 | Author: Khaled Aboulhosn | Size: 12566 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
257. | Secure Hive 1.1.0.0 (securehive.com) | ||
Hive is a powerful tool for secure archiving and sharing of files. It enables you to create encrypted archives and self-extracting .exe files for secure storage and file sharing. It also includes a simple but powerful means of encrypting parts of, or entire, documents, email messages, etc. Secure Hive offers the enterprise a method of: Securing sensitive documents | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Morrow | Size: 986 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
258. | ProTrader (.Net client) 21.07.2005 (pfsoft.com) | ||
of response. -Security. The high level of security is ensured by encryption of all information streams by the advanced encryption algorithm. -Division of the users on the basis of roles. The system provides 4 roles of the user - the Trader, the Dealer, the Administrator and the Market | |||
Updated: 9, 2005 | Rating: 0 | Author: Denis Borisovsky | Size: 3333 kb | Freeware Go to category: Business > Investment Tools Similar programs | |||
259. | RbApp 1.0 (excelsoftware.com) | ||
and Find/Replace RbView - Drawing Framework Based on REALbasic's Graphic Classes RbCommand - Undo/Redo Command Framework RbPalette - Tool Bars and Palettes for any Platform RbStringList - Add, Delete, Alphabetize, Iterate and Manipulate a List of Strings RbXML - Single Class to Easily Read and Write Data to XML Files RbHelp - Add Interactive Help Using QuickHelp to | |||
Updated: 9, 2005 | Rating: 690 | Author: Harold Halbleib | Size: 4697 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
260. | ANObrowse 1.0.3 (members.inode.at) | ||
providing your true IP address! By using anonymous proxies, it's not longer you who browses the web - it's the proxy that does so. You tell the proxy ''visit site X'' and the proxy will visit the site, gathering all the datas of the website (HTML code, java scripts, pictures, ...) and passing them to you. You indeed never ever visit the website physicaly! You never ever | |||
Updated: 9, 2005 | Rating: 55 | Author: Wolfgang Brucker | Size: 2033 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
|
Home > Encryption tools software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|