|
||||||
|
||
|
Home > User password software |
Related keywords: password, user, Password, password manager, password protection, password recovery, password generator, password keeper, user interface, lost password |
|
|
371. | AES Home 4.0 (abensoft.com) | ||
necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information because they contain multiple compressed and encrypted files and | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
372. | AES Pro 5.5 (abensoft.com) | ||
necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS Public Key programs installed. AES Pro is the suite of encryption tools for personal and | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
373. | CHAOS Messenger 4.0 (safechaos.com) | ||
necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active Chaos files are ideal for safe electronical distribution of the information because they contain multiple compressed and encrypted files and folders | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
374. | CHAOS Self Decryptor 3.9 (safechaos.com) | ||
a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and encrypted files and folders. This feature is | |||
Updated: 9, 2005 | Rating: 0 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
375. | StrongDisk Pro 3.0 (strongdisk.com) | ||
encrypting on-the-fly with strong crypto-algorithms. To mount disk a password and an external key is required. Any files, documents and databases can be kept on and opened directly from encrypted disks. The content of disk is physically stored in a common file. Thus backup can be made easily. You may | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
376. | DynamicalPassword 1.1 (advmathappl.com) | ||
"Dynamical Passwords" you may generate passwords on any date (even each day). There is no need to remember or save all these generated passwords as far as you can remember you personal password (key) and the date. It is also useful for discovering weak links in a complex security system with many passwords protected elements/units. With "Dynamical | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor | Size: 11 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
377. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
378. | Private Encryptor 6.2 (tropsoft.com) | ||
file/folder shredder, file/folder Backup with auto encryption, My Passwords, My Private Notes, Installable Encryption Modules, Compression, Context Menu support, Stealth Media Encryption super speed for large image multimedia and exe files, and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
379. | StrongSearch 1.3.1 (kraslabs.com) | ||
connect their computers into networks and prompt their employees to use shared resources, searching for files over LAN becomes an increasingly difficult task. Frequently, people do not remember the exact file names, which results in a horrendous amount of time spent waiting for the search results. Plus there are other issues, like searching through hidden shares | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Startsev | Size: 1434 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
380. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
software, it has high speed in pdf to text conversion, you can use it to convert pdf to text file, you can convert a lot of pdf files on the fly to text files once time! Function and face: 1.pdf to text SDK-COM supports extract external text to txt file. 2.pdf to text SDK-COM can keep the text layout in pages. 3.pdf to text SDK-COM supports PDF1.5 protocol (supported by | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > User password software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|