|
||||||
|
||
|
Home > Find encrypted software |
Related keywords: find, encrypted, Find, find and replace, FIND, ebay find, auction find, file find, find email, find duplicate files |
|
|
421. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
of this century. Many people now rely on chatting in the hopes of finding their soul-mate. Unfortunately, there is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies. This software provides all the standard information about your chat partner plus a whole lot more. How | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
422. | Clear Your Footprints 1.4 (newpowersoft.com) | ||
logon history,connections history,AutoMatch History in "Find file",AutoMatch History in"Find computer",AutoMatch History in "Run" at start menu. Clears all of these items with a single right click Automatically clear items at windows startup, shutdown and timed intervals. Minimized in the system tray so it takes up no screen. Automatically exit after the user | |||
Updated: 3, 2005 | Rating: 16 | Author: Yong Li | Size: 1100 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
423. | Cloak 8.0 (insight-concepts.com) | ||
Cloak provides different levels of protection by allowing you to encrypt & hide documents within images, compress & encrypt documents, send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system. In addition to protecting documents and e-mails, Cloak also provides industry standard internet trace cleaning options | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
424. | COM Port Toolkit 3.6 (compt.ru) | ||
for use with the COM Port Toolkit software. Some scripts you can find in an application's examples directory. COM Port Toolkit can capture serial communications between the device and the software by using special serial port driver. So COM Port Toolkit acts as a software protocol analyzer in this mode. COM Port Toolkit works on Windows 95, Windows 98, Windows Me, Windows NT | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
425. | CryptoForge 3.2.5 (cryptoforge.com) | ||
you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
426. | CSDiff 5.0 (componentsoftware.com) | ||
ComponentSoftware Diff (CSDiff) is a free, advanced file-difference analysis tool for Microsoft Windows. CSDiff is a great asset to anyone in need of analyzing changes which have been made between two revisions of the same file or folder. CSDiff is commonly used when analyzing program source files, HTML | |||
Updated: 9, 2005 | Rating: 97 | Author: David Matyas | Size: 1332 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
427. | DCPP 2.7 (securstar.com) | ||
Plus Pack (DCPP) is a Full disk encryption software package which encrypts the operating system, and allows pre-boot authentication. The user can enter a password on computer start up, before the operating system boots up. DCPP is the fastest and most feature-rich real-time encryption system available, Special care has been taken to render all cryptographic parts as invisible & | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
428. | Desktop Scout 4.0 (globalpatrol.net) | ||
logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without administrator privileges to disarm or uninstall | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
429. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
430. | DeviceLock 5.73 (ntutility.com) | ||
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Find encrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|