|
||||||
|
||
|
Home > Added files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files, multiple files |
|
|
351. | Simply Safe Backup 2005.734 (simplysafebackup.com) | ||
simple: Anyone can use this program, quickly and easily - from the pc novice, to the busy Network Administrator! With the ability to burn backups to CD & DVD or backup to tape, send backups to an FTP server or (network) file (server) on the fly, a few clicks will give you peace of mind without any hassle. It's safe: Choose our ultra secure backup file format | |||
Updated: 2, 2006 | Rating: 39 | Author: Joshua Butcher | Size: 2462 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
352. | SecureWord 1.5 (secureword.com) | ||
for storing important information such as logins, passwords and files. Taking into consideration that somewhat similar programs exist, let us explain you why you should choose SecureWord and in what ways we enhanced and developed our program for your convenience. We are using modern and secure encryption algorithms. The main method, used in SecureWord is AES, Advanced Encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
353. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
354. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
adds to applications the ability to create and present various kinds of diagrams: - flowchart and process diagrams - workflow and data flow charts - database entity-relationship diagrams - organizational and classification charts - hierarchy and relationship diagrams - networks and graphs The basic types of diagram elements - boxes, tables, and arrows - can be | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
355. | S.O.S.Automation 1.01 (sosautomation.com) | ||
Its installation is extremely simple and takes a few minuet. S.O.S.Automation serves also as a standard automatic answering machine. This enables S.O.S.Automation to share any telephone line with any other use. S.O.S.Automation supports also be directional communication. You can call S.O.S.Automation at any time and gain the same | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
356. | RoboTask 2.4 (robotask.com) | ||
simply launching web pages, to checking email, moving or backing up files to uploading or downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoWise Software | Size: 3265 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
357. | RegSnap 5.8.1920 (lastbit.com) | ||
saved snapshots and learn which keys were modified, deleted, or added|You can view, explore and compare saved registry snapshots and find which keys were modified, deleted, or added}{You can also analyze other sensitive system parts, such as a list of files in system directories|Also, you can analyze other system settings such as a contents of system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 768 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
358. | Reg Organizer 3.1 (chemtable.com) | ||
of tools required for effective System Registry and configuration files management. This software lets you view, edit and clean the Registry and preview the registry files you want to import (including the ability to preview files directly from Windows Explorer). The automatic Registry | |||
Updated: 2, 2006 | Rating: 0 | Author: Konstantin Polyakov | Size: 1440 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
359. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
when computers are not being used. It compresses and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
360. | Quicknote 5.2 (jens.metz-furniere.de) | ||
this purpose, you have to run the program first, then create a new file, then type a line or two and save the file. Too many things to do in order to simply write down a thought? With Quicknote, it does not matter which programs you are currently using; whenever you want to write something down | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Mьller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
|
Home > Added files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|