|
||||||
|
||
|
Home > Find encrypted software |
Related keywords: find, encrypted, Find, find and replace, FIND, ebay find, auction find, file find, find email, find duplicate files |
|
|
41. | Image Albums (For Microsoft Access) 3.0 (jamiessoftware.tk) | ||
user interface and improved search feature, allowing you to quickly find and display images matching your search criteria. Image Albums is a Microsoft® Access presentation and storage application designed to allow you to organize and share your images in a | |||
Updated: 2, 2006 | Rating: 191 | Author: Jamie Czernik | Size: 966 kb | Demo Go to category: Graphic Apps > Other Similar programs | |||
42. | Kalimages 2.03 (peccatte.karefil.com) | ||
Easily manage your photo collection and use it as a professional assistant that helps you locating, tagging, categorizing images from your photo folders with preview, thumbnails, search and edit options, templates to standardize embedded IPTC metadata. The software includes support of the Thesaurus for Locate, select images by keywords, author, classification. Use IPTC editor w thesaurus | |||
Updated: 2, 2006 | Rating: 97 | Author: Patrick Peccatte | Size: 4244 kb | Shareware Similar programs | |||
43. | Regfixpro 1.2 (4diskclean.com) | ||
scans Windows registry for orphan file/folder references, finds these files or folders on your drives that may have been moved from their initial locations, and then corrects your registry entries to match the located files or folders. In addition, if your registry has links to files of deleted applications, Regfixpro will find these invalid entries and remove them from | |||
Updated: 2, 2006 | Rating: 0 | Author: RSS Systems | Size: 596 kb | Shareware Similar programs | |||
44. | UCCDraw ActiveX Control V8.0 8.0 (ucancode.net) | ||
UCCDraw ActiveX Control with FULL source code! UCCDraw is an ActiveX Component that enables you to build Visio-style charts from within your application. Figure 1:Allows you to create flow charts, vector drawings, raster images and more with the ability to include hyperlinks and various shading and | |||
Updated: 2, 2006 | Rating: 82 | Author: jack Misic | Size: 488 kb | Demo Go to category: Development > Active X Similar programs | |||
45. | Registry Cleaner - RegFix Mantra 2.1 (pcmantra.com) | ||
With due course of time, Windows Registry gets effected due to newer software installations, uninstallation, Adwares, spywares, Trojans, viruses etc. These changes generate inconsistencies in the Windows registry. The inconsistencies may be of varied nature like Empty keys, false uninstall information | |||
Updated: 2, 2006 | Rating: 115 | Author: PC Mantra | Size: 986 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
46. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
delete messages etc.. When wodMailBox opens mailbox, it expects to find there either regular mailbox just as is used on UNIX systems (one file with full mail messages one after another) or just one message inside, just as Outlook Express saves .eml files. When you need to parse received messages, it might be hard to check all the possibilities that one simple mail message may | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
47. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
with remote console-type services. It allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well to Telnet servers (using Telnet protocol that is NOT encrypted). For ones that don't know - the SSH transport layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
48. | wodSSH 2.3.7.0 (weonlydo.com) | ||
on UNIX OS), but wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3). For ones that don't know - the SSH transport layer is a secure low level transport protocol. It provides strong encryption, cryptographic host authentication, and | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
49. | Note Studio for Windows 3.1.1 (dogmelon.com.au) | ||
if their device is lost or stolen. Note Studio allows you to encrypt notebooks. This means that even if your device falls into the wrong hands, your notes will not be readable. But it is the ease of organizing notes that makes Note Studio most powerful. The way pages are organized in your notebook is very flexible. Because pages can contain links to other pages, your notebook can | |||
Updated: 2, 2006 | Rating: 0 | Author: Ant Wiese | Size: 10105 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
50. | Citation 3.15.14 (padfile.radsoftware.org) | ||
Further, Citation has powerful searching tools that let you find any one citation instantly, or assemble a sub-list of citations that have some common element(s) that you define. Finally, Citation has flexible printing options that let you print any one citation, or any list of citations. Altogether, Citation is a powerful, flexible tool for entering and maintaining a | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1163 kb | Commercial Go to category: System Utilities > Shell Tools Similar programs | |||
|
Home > Find encrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|