|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
411. | FileMonkey 9.07 (homepage.ntlworld.com) | ||
FileMonkey file operations package automates common file management tasks which would otherwise be tedious and time consuming. Main features of FileMonkey include: Perform search and replace on multiple file contents, file names or names. Rename files or folders to match a | |||
Updated: 9, 2005 | Rating: 0 | Author: monkey job | Size: 1508 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
412. | Finders Keepers 2.02.2 (yadudigital.com) | ||
Keepers(tm) can search files, replace text, index entire hard drives for instant text retrieval, view or launch any found files, zip found files, and edit the found ASCII text files. Search files 4 ways: plain-text search, regular expressions, approximate, and sound-alike. Find words even if they are misspelled. View | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
413. | Ghost Keylogger 3.80 (keylogger.net) | ||
easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
414. | HexCmp 2.19 (fairdell.com) | ||
new program HexCmp, which combines together the features of a binary file comparison application and a convenient hex editor. The program will help you to compare files in binary format, at the same time serving as a hex editor that will edit and modify your files. Comparison is made on-the-fly, while scrolling down the files. Enhanced with features like color | |||
Updated: 2, 2006 | Rating: 39 | Author: Fedor Mishin | Size: 687 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
415. | IECitater 1.04 (newpulses.com) | ||
enhance effectiveness of your Internet browsing. Select fragment of text or pictures and gather selected fragments to Word document. At the end - you have all cites in the one file. All fragments are automatically commented by item names. You can get selection from any program or document. Now | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Mainitchev | Size: 275 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
416. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 82 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
417. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
418. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
419. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
420. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|