|
||||||
|
||
|
Home > Encrypt prevent software |
Related keywords: encrypt, prevent, Encrypt, file encrypt, encrypt file, ENCRYPT, encrypt visual basic, encrypt html, encrypt pdf, encrypt email |
|
|
21. | DriveCrypt 3.03a (drivecrypt.com) | ||
When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | GroupMAN 1.01.177 (groupman.com) | ||
or the list owner. - Ban an abusive subscriber from your list preventing them from posting or receiving emails. -Customizable set of email templates with full support of internal variables. -Create custom filters to incoming mail to screen out bounced mail, auto-replies spam and attachments with certain extensions. GroupMAN (Group Manager) functions as a list-server program and | |||
Updated: 3, 2005 | Rating: 0 | Author: TNL Total Solutions TNL Total Solutions | Size: 5377 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
23. | Help Desk Software - Service Log for Access 3.1 (icon.co.za) | ||
tools needed to provide the support and attention to detail, that prevents logs from falling between the cracks. Service Log is a multi-user workshop help desk solution, that is affordable, simple to install, and easy to use. Fast, easy help desk call logging, easy help desk call tracking, with the full history of all actions | |||
Updated: 9, 2005 | Rating: 0 | Author: Nic Martens | Size: 10107 kb | Shareware Go to category: Business > Other Similar programs | |||
24. | InfoSafe Plus 3.4.6 (wakefieldsoft.com) | ||
and MORE! Password Protection - Choose your own password to prevent unauthorized access to your data. The password is not stored on the handheld or PC, so no one else will be able to retrieve it. Data Encryption - Records are encrypted with 128 bit encryption for security. Customizable Fields List - Customize the fields list. Change any field name for any record! User | |||
Updated: 9, 2005 | Rating: 16 | Author: Shawn Wakefield | Size: 4687 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
25. | SIGNS 6.12 (rad2themax.com) | ||
S.I.G.N.S. gives you the data you need to detect, intervene and prevent. S.I.G.N.S. has been designed so that it is easy for anyone having a basic familiarity with computers to learn, while at the same time having features and customization options that make it suitable for even the largest security operations. Some notable features of S.I.G.N.S. include: - Exhaustive options for | |||
Updated: 3, 2005 | Rating: 55 | Author: Paul Pleasant | Size: 22648 kb | Demo Go to category: Business > Databases & Tools Similar programs | |||
26. | TimeCard Plus 3.4 (mycroftcomputing.com) | ||
to other software packages you may use. A Manager Access password prevents unauthorized access to sensitive information and older records. You enter the punch-in and punch-out times and TimeCard does the rest. TimeCard Plus tracks employee time and attendance, and records and calculates regular and overtime hours worked. It also records hours employees were not at work, by category | |||
Updated: 2, 2006 | Rating: 0 | Author: Gordon Turner | Size: 2721 kb | Shareware Go to category: Business > Other Similar programs | |||
27. | TimeCard Standard 3.4 (mycroftcomputing.com) | ||
to other software packages you may use. A Manager Access password prevents unauthorized access to sensitive information and older records. You enter the punch-in and punch-out times and TimeCard does the rest. TimeCard Standard tracks employee time and attendance, and records and calculates regular and overtime hours worked. It also records hours employees were not at work, by | |||
Updated: 2, 2006 | Rating: 0 | Author: Gordon Turner | Size: 2713 kb | Shareware Go to category: Business > Other Similar programs | |||
28. | ACProtect standard 1.20 (ultraprotect.com) | ||
Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application. CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code more closer and prevent | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | EXECryptor 2.3.7 (softcomplete.com) | ||
can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
30. | FreeTextBox 1.6.3 (download.componentspot.com) | ||
code, such as changing relative URLs to absolute. Developers can prevent this by using the control’s properties. Some developers have noted that it has problems in Opera 7. It lacks find and replace, as well as a context menu. The FreeTextBox control provides a WYSIWYG HTML editing environment for ASP.NET (Web Forms) Web pages. Visitors can edit text and click on buttons to format | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 1042 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
|
Home > Encrypt prevent software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|