|
||||||
|
||
|
Home > Encrypt a file software |
Related keywords: file, encrypt, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
411. | EasyHues Pro 2.1 (easytools.com) | ||
Pro, a program that lets you create color schemes and explore the world of colors. You can create your random color schemes from among 16 million colors with EasyHues Pro. Use the HEX value or the RGB value of the colors in your favorite image editing program. Are you fascinated about colors? Are you a person working with colors? Are you looking for new shades of | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 324608 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
412. | 12Ghosts ShowTime 7.10 (12ghosts.com) | ||
your taskbar clock to show the date and a second time zone. You may display seconds smaller and the date in a different color, for example. Everything is configurable, the display of the date and time, font, size, colors, alignment, and shadow effect. 12-ShowTime displays the time and date either in the tray or in a free movable window, which can be set to stay in | |||
Updated: 9, 2005 | Rating: 199 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
413. | StrongDisk Pro 2.9 (strongdisk.de) | ||
drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during disk creation, and/or insert electronic key or diskette with key file. Without required password and/or | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
414. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
self-extracting ZIP files optionally with unbreakable AES encryption. The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To unzip, a user must provide the same password that was used when creating the self-extracting EXE. AES encryption is much stronger than standard ZIP encryption, which is | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
415. | Event Log Janitor 1.0 (streiff-is.com) | ||
Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
416. | Find Shortcuts 1.0 (slashbacksoftware.com) | ||
window that appeasr as Find Shortcuts starts is similar to the Find Files window that comes with Windows 98. Most of the elements (menus, buttons, etc.) should be familiar. Shortcuts always have a "target" which will be invoked. Depending on the target, the shortcut may open a | |||
Updated: 9, 2005 | Rating: 0 | Author: John Homerstad | Size: 333 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
417. | SOCKShell 1.3 (socksoftware.com) | ||
Windows Explorer's File menu and context menu (the menu displayed when you right click on an item in the Explorer window) display the options that operate on the selected object. These operations include the standard Cut, Copy, Delete and Rename operations if they are appropriate, and will often include other operations which are specific to the type of object that was clicked | |||
Updated: 9, 2005 | Rating: 0 | Size: 866 kb | Shareware Go to category: Desktop > Other Similar programs | |||
418. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected computer. If it is exist - works alarm and programm issues the message "Name_of_the_computer is exist ". Also alarm works when the indicated computer disappears from the Net. This program can to change interval of a sending requests and their amount. Alarm | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
419. | CryptoText 3.0.0.1 (tmgdevelopment.co.uk) | ||
and .NET components for cross-platform Microsoft Windows text and file encryption on Pocket PC and Desktop, including components for dotNet, .NET CF, COM / ActiveX, PocketPC. With CryptoText you can encrypt text on a Pocket PC using RC4 or 3DES, transfer the encrypted BinHex string up to a webserver and decrypt in ASP script, or encrypt a | |||
Updated: 9, 2005 | Rating: 0 | Size: 751 kb | Commercial Go to category: Development > Other Similar programs | |||
420. | LeoStatistic 11.7 (leokrut.com) | ||
Universal input from outside data sources: from text or database files; file type and edit in spreadsheet like control; copy/paste from spreadsheets applications like MS Excel or Access; extract curve in numerical form from image chart. Data manipulation procedures permit to new create and modify existing variables using simple formulas or schemes. Syntax of formulas | |||
Updated: 9, 2005 | Rating: 0 | Author: Leonid Sakharov | Size: 791 kb | Shareware Go to category: Education > Other Similar programs | |||
|
Home > Encrypt a file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|