|
||||||
|
||
|
Home > Encryption library software |
Related keywords: encryption, library, file encryption, Encryption, Library, encryption software, encryption system, email encryption, ftp library, data encryption |
|
|
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | Snare Agent for Windows 2.5.1 (intersectalliance.com) | ||
Snare for Windows is a Windows NT, Windows 2000, Windows XP, and Windows 2003 compatible service that interacts with the underlying Windows Eventlog subsystem to facilitate remote, real-time transfer of event log information. Event logs from the Security, Application and System logs, as well as the new | |||
Updated: 3, 2006 | Rating: 259 | Author: InterSect Alliance | Size: 600 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
26. | COM Port Toolkit 3.6 (compt.ru) | ||
an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by other developers to automate some specific tasks: CRC calculations, special transfer rules, outgoing | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | LeoPicture 1.5 (leokrut.com) | ||
Select and modify part of image. Copy/paste image or selected area(s). Print and print preview images. Analyze color distribution and symmetry patterns in image and create MS Word report. Intuitive, colorful, rich and transparent user interface All intermediate variants of picture are | |||
Updated: 3, 2006 | Rating: 16 | Author: Leonid Sakharov | Size: 284 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
28. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | HTMLProtector 3.5 (antssoft.com) | ||
to their hard drive. HTMLProtector offers three JavaScript based encryption methods to choose from and a variety of other features like right click disable, printing disable, password protect your pages, insert copyright information and more! HTMLProtector will meet all your web page protection needs -- compared to similar products currently available, HTMLProtector contains | |||
Updated: 2, 2006 | Rating: 0 | Author: Lewis Hong | Size: 1098 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
30. | EXECryptor 2.3.7 (softcomplete.com) | ||
PellesC, Visual Basic, PowerBASIC, IBASIC, PureBasic. All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
|
Home > Encryption library software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|