|
||||||
|
||
|
Home > Key changer software |
|
|
271. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree and export data to | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
272. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can apply to a PDF. The first is the owner password. Opening a PDF with this password will allow you full access to the PDF when a user password has been assigned as well. This means that even if printing was disabled you will still be | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
273. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can apply to a PDF. The first is the owner password. Opening a PDF with this password will allow you full access to the PDF when a user password has been assigned as well. This means that even if printing was disabled you will still be | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
274. | File Monster 2.6.7 (nstarsolutions.com) | ||
the original file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
275. | File Spy 3.0 (soft9000.com) | ||
had a sad story to tell: It seems that he has an employer that changed the rules half way into his tenure on the job. After having been forced to sign an agreement that Bob would not have done when he had several competitive job offers pending, he exclaimed: "It's not fair, I've worked on my time for them, but they will no longer let me work on their time, for me!" So I wrote File | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1484 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
276. | FileMap by BB 4.0.4 (dogkennels.net) | ||
security. It does not have to be running in the background to detect changes, in fact, it simply gives a reliable comparison between before and after file lists. It downloads in a few seconds and has a simple drag and drop installation, with no changes to the computer. This program is a FREE | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
277. | Finders Keepers 2.02.2 (yadudigital.com) | ||
Choose from 4 levels of confirmation, including word by word. Changed files are backed up automatically. You can replace by regular expressions. You can use a password to disable replace functions for risky users, such as kids or new users. Index selected files or your entire hard drive to find a word with split-second text retrieval. Immediately see the list of files the word | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
278. | Folder Cache 2.6 (nesoft.org) | ||
- some minor bugs are fixed. Interested in a FREE registration key? Translate the language interface into your own language, or update the older language files to the newer Folder Cache 2.x version. To accomplish this task, if you speak english, you would take the file “english.lng” (from the Folder Cache folder or get it from our site www.nesoft.org) and replace each of | |||
Updated: 9, 2005 | Rating: 39 | Author: Michail Anisimov | Size: 578 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
279. | Folder Express 2.0.1 (changefolder.com) | ||
- Integrate Folder Express into shell context menu - Press a hot key - Right click window buttons (maximize, minimize, help or close button) - Right click Folder Express tray icon Folder Express provides a lot of features including: - Fully configurable for almost every feature - Assign a hot key to your favorite folder and change to the folder with a single | |||
Updated: 9, 2005 | Rating: 0 | Author: He Huang | Size: 1797 kb | Shareware Go to category: Desktop > Other Similar programs | |||
280. | Hermetic Stego 5.17 (hermetic.ch) | ||
addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be recovered when you need to get at it. This program allows hiding a file of any size in one or more BMP image files, with or without the use of a user-specified | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Key changer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|