Internet Secure Tunneling 2.0.0.228
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example…
Big Crocodile 3.11
Big Crocodile is a powerful, secure password manager. Stores all your logins and hyperlinks in a securely encrypted file. Passwo…
 
   
   
     
Example:  Norton Antivirus
 
• New       • TOP       • Most popular       • All soft       • Advertising       • Add program       • Support       • Link to us       • About       • Board      
audio & multimedia  business  communications  desktop  development  education  games & entertainment  graphics apps  home & hobby  network & internet  security & privacy  servers  system utilities  web development  A B C D E F G I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9

Home > File encrypting software

Related keywords: file, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE, file compare

Home
Software
New soft
TOP-10
Best 1000
All Soft
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Number of references on page:10 | 20 | 30 | 50 | 100
Language: Any | English | German | French | Italian | Japanese | Portuguese | Spanish
License: Any | Freeware | Shareware | Demo | Adware | Commercial | Data Only
Installation: Any | Install and Uninstall | Install Only | No Install Support | Uninstall Only
Operational system: Any | Windows 95 | 98 | ME | NT | 2000 | XP | CE | Unix | Palm | Mac


Search result:
programs found: no less than 1000.

431.StrongDisk Pro 2.9 (strongdisk.de) free  StrongDisk Pro download
drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access existing protected disk user must enter password, which is specified during disk creation, and/or insert…
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware
Go to category: Security & Privacy > Encryption Tools
Similar programs
432.Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) free  Chilkat Zip Self-Extractor download
self-extracting ZIP files optionally with unbreakable AES encryption. The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To unzip, a user must provide the same password that was used when creating the self-extracting EXE. AES encryption is much stronger than standard ZIP encryption, which is…
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware
Go to category: Development > Other
Similar programs
433.Event Log Janitor 1.0 (streiff-is.com) free  Event Log Janitor download
Supported logs: APPLICATION, SECURITY, SYSTEM, DIRECTORY SERVICE, FILE REPLICATION SERVICE, and DNS Server. Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration…
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware
Go to category: System Utilities > System Maintenance
Similar programs
434.Find Shortcuts 1.0 (slashbacksoftware.com) free  Find Shortcuts download
window that appeasr as Find Shortcuts starts is similar to the Find Files window that comes with Windows 98. Most of the elements (menus, buttons, etc.) should be familiar. Shortcuts always have a "target" which will be invoked. Depending on the target, the shortcut may open a folder, run a program, open a document, play a music file, open a web page, and so forth. When…
Updated: 9, 2005 | Rating: 0 | Author: John Homerstad | Size: 333 kb | Shareware
Go to category: System Utilities > File & Disk Management
Similar programs
435.SOCKShell 1.3 (socksoftware.com) free  SOCKShell download
Windows Explorer's File menu and context menu (the menu displayed when you right click on an item in the Explorer window) display the options that operate on the selected object. These operations include the standard Cut, Copy, Delete and Rename operations if they are appropriate, and will often include other operations which are specific to the type of object that was clicked…
Updated: 9, 2005 | Rating: 0 | Size: 866 kb | Shareware
Go to category: Desktop > Other
Similar programs
436.Ping Alarm 1.4 (Pingalarm.narod.ru) free  Ping Alarm download
of a sending requests and their amount. Alarm can issue sound. Log-file is exist. Position of forms are saving before quit. Tray. This small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected…
Updated: 9, 2005 | Rating: 0 | Author: Roman Balabolko | Size: 290 kb | Shareware
Go to category: Network & Internet > Network Monitoring
Similar programs
437.P-Guard 1.03 (softmajor.com) free  P-Guard download
uses strong and certified cryptographic services, which allow encrypt any type of sensitive user's data. Only person, who is owner of encrypted file may decrypt this file. Shell integration allows to use P-Guard with maximum comfort: You can start P-Guard from right-mouse context menu or you can easily integrate the P-Guard in your favorite…
Updated: 9, 2005 | Rating: 42 | Author: SoftMajor http://www.softmajor.com | Size: 384 kb | Freeware
Go to category: Security & Privacy > Encryption Tools
Similar programs
438.CryptoText 3.0.0.1 (tmgdevelopment.co.uk) free  CryptoText download
and .NET components for cross-platform Microsoft Windows text and file encryption on Pocket PC and Desktop, including components for dotNet, .NET CF, COM / ActiveX, PocketPC. With CryptoText you can encrypt text on a Pocket PC using RC4 or 3DES, transfer the encrypted BinHex string up to…
Updated: 9, 2005 | Rating: 0 | Size: 751 kb | Commercial
Go to category: Development > Other
Similar programs
439.LeoStatistic 11.7 (leokrut.com) free  LeoStatistic download
Universal input from outside data sources: from text or database files; file type and edit in spreadsheet like control; copy/paste from spreadsheets applications like MS Excel or Access; extract curve in numerical form from image chart. Data manipulation procedures permit to new create and modify existing variables using simple formulas or schemes. Syntax of formulas…
Updated: 9, 2005 | Rating: 0 | Author: Leonid Sakharov | Size: 791 kb | Shareware
Go to category: Education > Other
Similar programs
440.PakVault V4.0.1 (pakvault.co.za) free  PakVault download
Secure Online Backup Tool - Data is Encrypted and Remains Confidential Install this program on your PC and have the piece of mind that all your most critical data will be backed up on line to a secure storage platform, fully encrypted and accessible to no one that does not have both the password and encryption key (a second 8 character password). After the initial backup…
Updated: 9, 2005 | Rating: 61 | Author: Pierre Hefer | Size: 11791 kb | Demo
Go to category: System Utilities > Backup & Restore
Similar programs

Sort programs by: relevance | date | alphabet | popularity
Result Page: « Previous | | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | Next »


404 Not Found

404 Not Found


nginx

Home > File encrypting software

!!!! Winners Online Casino 1.0
Online casino games to play for free or real money. Play games at the internet's most trusted casino designed for Microsoft windows. 80…
Chilkat AES & RSA Encryption Component 2.2.0
Chilkat Crypt is an advanced ActiveX encryption component that offers both RSA encryption with digital signatures as well as sym…
HieroNote 3.0
HieroNote V 3.0 is an ancient Egyptian Hieroglyphic Tutorial. Learn over 150 hieroglyphic words, over 120 determinatives, over 425…

Copyright © 2004 - 2010 allworldsoft.com Contact Page