|
||||||
|
||
|
Home > File encryption software software |
Related keywords: software, file, Software, encryption, File, RAD Software, free software, spy software, file transfer, file management |
|
|
371. | BestCrypt Corporate 1.12 (jetico.com) | ||
provides protection of data in corporate networks using strong encryption algorithms. BestCrypt Corporate includes standard BestCrypt software that performs encryption/decryption operations creating virtual drives acting as regular drives. The core of BestCrypt Corporate is BestCrypt Central Manager that provides all range of functions: automatic | |||
Updated: 9, 2005 | Rating: 0 | Author: Jetico Inc. | Size: 5828 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
372. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
of BitZipper's dominant strengths is its built-in support for ACE, ARC, ARJ, BH, CAB, GZ, JAR, LHA, LZH, RAR, TAR, TGZ, UUE, WAR, XXE, Z, ZIP and ZOO files; no third-party products are needed. You can access almost every compressed file with just this one tool. No need for additional software applications; no wasted expense. Another one of BitZipper's | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
373. | BKS 3.2.4.30 (backup2001.com) | ||
Source> > Target< | |||
Updated: 2, 2006 | Rating: 16 | Author: RD Technologies | Size: 4664 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
374. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other hidden texts) - Log file is encrypted and can be protected with a password | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
375. | Bonodi XML Editor 2.12 (zero.ad.jp) | ||
adds and enhances features of Bonodi. Scripts are plain text files that contain software programs. Keyboard shortcut keys can be customized. Bonodi's search feature facilitates searching XML document(s) by XPath pattern and other search methods available in Bonodi. Bonodi's search feature can be applied to an opened XML document, or all opened XML | |||
Updated: 9, 2005 | Rating: 39 | Author: Yuji Ichikawa | Size: 3788 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
376. | Canary Standard 2005.01.28 (11) (alphalink.com.au) | ||
what your child does when using the home computer (programs run, files printed, programs installed,...), and while surfing the Internet (web sites visited, files downloaded, emails sent,...). Each order comes with a FREE report that contains more than 30 vital parenting principles that, together with Canary, will enable you to develop a more open relationship with your child | |||
Updated: 9, 2005 | Rating: 16 | Author: Serge Botans | Size: 848 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
377. | CD-DVD Lock 2.01 (getfreefile.com) | ||
the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
378. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
379. | CHAOS Generator 2.4 (safechaos.net) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
380. | CHAOS Messenger 4.0 (safechaos.net) | ||
Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > File encryption software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|