|
||||||
|
||
|
Home > Encryption library software |
Related keywords: encryption, library, file encryption, Encryption, Library, encryption software, encryption system, email encryption, ftp library, data encryption |
|
|
331. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
332. | Registry Doctor 1.00 (aidsoft.com) | ||
Registry Doctor is a tool to optimize WIndows. Comes with 1.System Files backup and Restore : backup your system registry and restore it in case of System Failure. 2.Registry Cleaner and Optimizer : Registry cleaner cleans the windows Database Registry for invalid information 3.Registry Defragger and | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2002 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
333. | SC-KeyLog Free 2.25 (soft-central.net) | ||
SC-KeyLog is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
334. | Secura Backup Professional 2.13 (cmfperception.com) | ||
FTP sites, CD/DVDs, and even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
335. | Secure Disk 1.1 (wekasoft.com) | ||
algorithm will make your encrypted disk military strong. Very fast encryption. You may even not notice the time it used. Easy to use. Both the creation of a new container and the mount process are very simple. Support FAT16/FAT32/NTFS driver format under Windows 2000/NT/XP. No limit on the number of SecureDisk volumes exist on a single disk. Act as a Windows service | |||
Updated: 9, 2005 | Rating: 0 | Author: weka zhang | Size: 1682 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
336. | Secure Password Store 0.91 (lmphotonics.com) | ||
by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted. - Print out of database. - Export Database to CSV format in encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
337. | Security Folder 2.0 (everstrike.com) | ||
application combines the ultimate power of industry-standard strong encryption algorithms with unique stealth technologies to protect your data from both unauthorized access and modification/destruction by malicious programs. Unlike other security software, available on the market, Security Folder was | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
338. | On-Time Operator 03.02 (isuru.com) | ||
On-Time Operator is the key to unattended execution of computer operations. The core application has the facility to run a computer program, such as .exe, .bat, music files, etc., at predetermined intervals (e.g., every 20 minutes) or at a given time of the day. An advanced graphical user interface enables for unattended processing. Logs in all work performed and the success/failure can be EMailed to third parties | |||
Updated: 9, 2005 | Rating: 0 | Author: L Dias | Size: 1143 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
339. | Paper Shredder 1.5 (winmeta.com) | ||
Paper Shredder is an easy to use Privacy utility. An easy to use Privacy utility which delete internet cache, history, cookies, location bar address, clear recent documents, media clips (Windows Media Player and RealPlayer) and Projects (Delphi, Visual Basic, Visual C++), empty recycle bin, delete temporary | |||
Updated: 9, 2005 | Rating: 0 | Author: Duo Yi | Size: 1176 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
340. | Password Administrator 3.0 (infintron.com) | ||
reporting tool, auto-logon, minimize to system-tray, secure encryption, access log, password generator, import/export, and more. 10 fields including notes, web addresses, ID's, email, assign and expire dates. Simple to operate and fast when finding passwords accounts. Award-winning utility to manage password accounts. Features include grouping and sub-grouping | |||
Updated: 9, 2005 | Rating: 48 | Author: Jeff Carpenter | Size: 4762 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Encryption library software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|