|
||||||
|
||
|
Home > Bits software |
|
|
321. | Music Playlist Utility 1.0 (comcen.com.au) | ||
Playlist Utility is an Internet-ready 32-bit music playlist utility for Windows. Many people are now downloading and recording MP3 compressed music files as well as the standard audio CDA formatted files to CD media. A big problem is that when you create and burn your playlist to CD/DVD the titles are sorted alpahbetically but your player and the songs are never listed in the same | |||
Updated: 9, 2005 | Rating: 112 | Author: Bruce Cologon | Size: 378 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
322. | Business PDF Writer 1.02 (bureausoft.com) | ||
content protection, PDF compression, PDF split and merge, 128-bit encryption and decryption as well as PDF optimization. More than 60 languages are supported with special characters neatly printed in PDF files. As professional PDF publishing solution, Business PDF Writer offers quality PDF creation, conversion, and management that could be rarely found elsewhere. For more | |||
Updated: 9, 2005 | Rating: 0 | Author: Pierre Gilles | Size: 5671 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
323. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
324. | GreatCrypt 2.0 (miraxus.com) | ||
in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
325. | Handy Backup 2.1 (backup.novosoft-us.com) | ||
media, including various removable media, zip-drives and CD-R(W)s. You can also send backups to local network drives or to remote FTP servers. Flexible and powerful scheduler A versatile scheduler enables you to automatically back up your critical files on customized or regular basis, from hourly to monthly basis. At any time you can do your backup manually or modify the backup | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Vaschenko | Size: 1449 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
326. | Hermetic Stego 5.17 (hermetic.ch) | ||
-- as many images as needed to contain the message file. 2. The bits of the message are inserted into the bytes of the image files randomly and in such a way as to defeat the use of statistical tests to reveal the presence of a hidden message. 3. The program can be used with a user-specified | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
327. | Hide Folders XP 2.2 (fspro.net) | ||
we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of being disclosed. Hide Folders XP in innovative file and folder hiding and protection | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
328. | Hider 1.1 (amosoft.net) | ||
well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced compression, and password protection of files. You can secure any file type with Hider. Images and audio/video clips containing hidden files are fully functional and are identical to the original one. Hider is a special steganography application used to encrypt and hide | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
329. | iClip 2.5.2 (inventive.us) | ||
iClip, you quickly store, organize and access bits of information that just aren't practical to save as entire documents. It allows you to quickly copy & paste and drag & drop clippings to and from its multiple "clipping bins" so that you can easily access them in the applications you're using. You stay focused on the tasks you're accomplishing while saving time and streamlining your | |||
Updated: 9, 2005 | Rating: 0 | Author: John Casasanta | Size: 2587 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
330. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
machine to another. Now included with Icon Lock-iT XP is Moon Valley's Security Suite which includes a Password Assistant and System Security Check. These new features will help the user construct a computing environment free of external threats. Includes many features designed for home users, shared computers, and the mobile professional. The self-decryptor lets you send or | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Bits software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|