|
||||||
|
||
|
Home > Encrypt folders or files software |
Related keywords: files, encrypt, folders, hide files, Files, hide folders, PDF files, compare files, protect files, Encrypt |
|
|
41. | TracHound 3.0.6 (gracesoftwaresolutions.com) | ||
as tasks, bug reports, change request, work request, action items or any other project, business, or technical related issue that you need to track and or manage. TracHound has an intuitive interface that makes entering and viewing records a snap. You can customize the record to match your process and terminology, make fields required, remove fields, change captions and | |||
Updated: 3, 2005 | Rating: 0 | Author: Joey McCoy | Size: 5609 kb | Shareware Go to category: Business > Project Management Similar programs | |||
42. | Web Cache Illuminator 4.8.2 (nstarsolutions.com) | ||
you're a computer forensic professional or you just want to investigate what web sites someone has been visiting, the Web Cache Illuminator makes the task much easier. Just point and click to the web cache folder and it will create a meaningful list that not only displays all the file names in the cache; but, more importantly, displays the title given by the web | |||
Updated: 2, 2006 | Rating: 0 | Author: Jeff Camino | Size: 491 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
43. | Absolute Database 5.04 (componentace.com) | ||
DLLs; SQL'92 (DDL & DML) support; Single-user and mutli-user mode (file-server); Single database file; Unmatched ease-of-use; 100% compatibility with standard DB-aware controls; Strong encryption; BLOB compression; Full source code available; Royalty-free; Free for personal use; Ease of Deployment; No BDE, no DLLs; No special installation or configuration required; | |||
Updated: 2, 2006 | Rating: 226 | Author: ComponentAce LTD | Size: 24106 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
44. | Aurigma Image Uploader 3.5 (aurigma.com) | ||
3 thumbnails, so you need not generate them on the server. Non-image files can be also uploaded. It retrieves data to server in standard multipart/form-data format, so files can be handled by any script or platform: ASP, ASP.NET, Perl, PHP, ColdFusion, JSP, etc. Features: * Easy | |||
Updated: 2, 2006 | Rating: 1677 | Author: Fedor Skvortsov | Size: 2593 kb | Shareware Go to category: Development > Active X Similar programs | |||
45. | Cryptocx v5 5.1.6 (easybyte.com) | ||
designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
46. | Cryptocx v6 6.1.3 (easybyte.com) | ||
designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v6 builds upon the previous | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
47. | FolderView ActiveX control 3.2 (icxr.com) | ||
identical to the tree pane in Explorer. It displays a list of folders (and files) and allows browsing of the shell's entire namespace. Though it exposes and returns many properties and methods similar to that of the familiar TreeView control, it provides many other unique features: - The background of the control can be set to any color or a tiled | |||
Updated: 9, 2005 | Rating: 16 | Author: Panos Koutsoukeras | Size: 243 kb | Demo Go to category: Development > Active X Similar programs | |||
48. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user's network login username can be used. Once the user | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
49. | MacNames 1.1m (peccatte.karefil.com) | ||
transform automatically Macintosh filenames stored on a Windows NT or 2000 Server volume, removing illegal characters and adding filenames extensions; With this Mac to PC conversion Windows can identify the appropriate applications associated with renamed files. MacNames works as well a Windows NT 4.0 or Windows 2000 Service. It runs with Microsoft Services for | |||
Updated: 2, 2006 | Rating: 285 | Author: Patrick Peccatte | Size: 2191 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Encrypt folders or files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|