|
||||||
|
||
|
Home > Organize passwords software |
Related keywords: organize, passwords, Passwords, Organize, store passwords, manage passwords, organize files, organize notes, save passwords, random passwords |
|
|
391. | BackUp32 2.0 (soft-one.com) | ||
for command line execution, archiving to removable media, archives password protection, .BAK files creation, support for commentaries and descriptions, lists of 'included', 'excluded' and 'excluded from compression' files, fast compression speed, nice interface and many options that affect the | |||
Updated: 9, 2005 | Rating: 0 | Author: Vsevolod Vasilyev | Size: 2663 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
392. | Bookmark, Password and Login System by M8 Software 4.30.001 (winm8.com) | ||
website loads, it shows a small window on top with your username and password ready to paste in. With a single click on it's Auto-Insert button it fills the log in form and clicks the submit button. If you have logon screens more complicated than just username and password - No Problem | |||
Updated: 3, 2005 | Rating: 0 | Author: John Turnbull | Size: 1273 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
393. | BootLocker 7.85.11 (bootlocker.com) | ||
does not allow intruders to access anything without a username and password. There is system tray support, password recovery, and locking screen saver. All in an easy to use interface. BootLocker is a desktop security program that protects your computer from Windows startup. It does not allow intruders to access anything without a username and password. There is system | |||
Updated: 9, 2005 | Rating: 0 | Author: Steven Eppler | Size: 3148 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
394. | Boss Everyware 2.85 (bosseveryware.com) | ||
from view, and secretly log usage information. The program can be password protected, and accessible only to the network administrator. Boss Everyware data logs can be written in comma-separated values, dBase or in a proprietary format, and can be easily exported to popular database and spreadsheet programs. The program's powerful internal reporting system lets you select | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
395. | Boss Key 1.6 (boss-key.com) | ||
your girlfriend, or entering your credit card information, or typing password to login somewhere, or,maybe, working with CIA files. WARNING! Someone comes to you. What will you do? Close program? - are you sure you can do it really fast? And don't forget about "Do you want to save" dialogs | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
396. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption. However, as a drawback we get the situation | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
397. | Chameleon 2.0 (members.optushome.com.au) | ||
security for your Chameleon files by inserting a 40 character Password. You can even hide Chameleon files in a Chameleon file. Example 1. You could create a music file (MP3) that looks and behaves exactly like any other music file but contains inside some video files and some pictures. Upload the to your website and share them with your friends. Your friends must use | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
398. | CHAOS Messenger 4.0 (safechaos.net) | ||
Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active Chaos files are ideal for safe electronical distribution of the information because they contain multiple compressed and encrypted files and folders. This feature is especially | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
399. | Cipherlok 2.1 (softlok.com) | ||
files cannot be retrieved. Cipherlok works either with traditional passwords or for extra security can use our USB Cipherlok Tokens. Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook. Secure file deletion and automatic encryption features. Uses Blowfish algorithm and either passwords or our USB | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
400. | Clear Your Footprints 1.4 (newpowersoft.com) | ||
by using this powerful tool.It allows you to clear your browser's location pull-down bar, history, cache, cookies, password history ,IE History ,IE Favorites ,recent documents,etc.It also allows clear your history at windows startup, shutdown and timed intervals automatically The main features of Clear Your Footprints are: Delete the file securely and make it | |||
Updated: 3, 2005 | Rating: 16 | Author: Yong Li | Size: 1100 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Organize passwords software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|