|
||||||
|
||
|
Home > Encryption system software |
Related keywords: system, encryption, file encryption, System, Encryption, system tray, encryption software, email encryption, SYSTEM, content management system |
|
|
41. | WinQuota 2.5.4 (winquota.com) | ||
directories and files, including subdirectories, inner mount points, system and sparse files. Disk quota settings can not be exhausted by any kind of operation, including file moving, renaming, copying and other. WinQuota also enables to set soft quotas. This kind of quota can be exceeded but in this case Administrator will receive a log event with user and quota information. In | |||
Updated: 2, 2006 | Rating: 111 | Author: Michael Isaev | Size: 2002 kb | Commercial Go to category: System Utilities > File & Disk Management Similar programs | |||
42. | Sleep Timer Pro 4.8.2 (what-the.net) | ||
Timer Pro is an all-in-one System Utility to automate the use of your system. With Sleep Timer you may shutdown, reboot, or set an alarm all with a few clicks of the mouse. Set your time in intervals like 15,30,45,60,90 minutes. Version 3.x+ now includes Clock Syncronization to GMT/Navy Clock in minute intervals! You can also password protect your system options in 3.0 | |||
Updated: 2, 2006 | Rating: 61 | Size: 4813 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
43. | SmartPOP2Exchange 5.4.5 (jam-software.com) | ||
your POP3 accounts to an SMTP or Exchange mail server. Runs as system service in the background. An easy to use config tool allows you to manage you accounts. A Spam filter, a powerful rules engine and virus scanner integration are | |||
Updated: 2, 2006 | Rating: 26 | Author: Joachim Marder | Size: 6074 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
44. | MessengerLog 5 Pro 5.30 (foryoursoft.com) | ||
to run its main program when you chat or when you wanna track other's chat. It will start to work as long as the MSN messenger 6.x/7.x is opened -- like a spy! 3. Suitable for parent controls: Concerned parents can use it to track your kids’ activities on MSN messenger and protect them from | |||
Updated: 2, 2006 | Rating: 127 | Author: Leo F | Size: 1323 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
45. | Zultrax 3.60 (zultrax.com) | ||
users on a free peer-to-peer network equipped with advanced queuing system, multisource swarmed downloads and privacy protection. Zultrax is totally free of adware and spyware. We are now one of the few P2P-apps out there offering privacy protection. On most other networks it is an open book | |||
Updated: 2, 2006 | Rating: 189 | Author: Peter Bartholomeus | Size: 2333 kb | Freeware Go to category: Network & Internet > File Sharing/Peer to Peer Similar programs | |||
46. | Password Manager XP 2.1.322 (cp-lab.com) | ||
your private data with this password management utility. Program's unique features include capability to encrypt stored information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either a phrase or a sequence of 64 random bytes (the software provides a way for | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
48. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
Panel applets, including Display, Network, Passwords, Printers, and System. You can disable your boot keys, DOS programs, Registry editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Batch Image Commander 1.37 (batchimage.com) | ||
is a batch image processor made for command line operation and as a System Tray Icon application for timer based operation. The Command Line Operation mode allows you to use the program as part of a cronjob or to provide functionability as part of a Windows based CGI or part of an in-house program | |||
Updated: 2, 2006 | Rating: 0 | Author: Edwin Lau | Size: 6748 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
50. | BB EAP 5.38 (bbsys.com) | ||
referrals. User action tracking based on HIPPA regulations. B&B's EAP (Employee Assistance Program) software is specifically designed for client documentation, tracking/follow-up and reporting. Data elements include demographics, clinical notes - including automatic importation from transcriptionist files, Primary/Secondary assessments, DSMIV or ICD-9 classifications, Final | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Encryption system software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|