|
||||||
|
||
|
Home > File protect software |
Related keywords: file, protect, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
501. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
502. | Evidence Exterminator 2.14 (softstack.com) | ||
information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
503. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
504. | Excel Password 9.0.5351 (lastbit.com) | ||
also occur if someone who does not work with you anymore password protects your vital information that is absolutely necessary to retrieve. The program features various approaches to the password recovery problem, from straightforward brute-force attack and dictionary search, to unique Guaranteed | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
505. | Recovery for Excel 3.0.0543 (officerecovery.com) | ||
for Excel fixes corrupted Microsoft Excel spreadsheet files (.XLS). Unfortunately, bad floppies and corrupted file systems pop up and scramble Excel spreadsheets at the worst possible times. Everybody knows the sinking feeling of discovering that an important spreadsheet has been corrupted. Important sales data disappear, analysis has to be redone, and vital research is | |||
Updated: 2, 2006 | Rating: 0 | Author: Recoveronix | Size: 951 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
506. | EXEsafe 2 (members.aol.com) | ||
allows you to put a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When the protected program is run, the EXEsafe lock will process all the | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
507. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
508. | EzCrypt+ 2.01 (kmgi.com) | ||
Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
509. | Fast Cleaner 4.7 (eshinesoft.com) | ||
disk space by cleaning up those error-making and useless garbage files! Professional,skinnable and easy to use interface. Features include 1. Seamless integration with Context-Menu to perform Disk Cleanup! (New) 2. Extremely high speed to search for garbage files on your harddisks. 3. Multiple cleanup methods including RecycleBin,Backup Folder and Direct Deletion. 4 | |||
Updated: 2, 2006 | Rating: 0 | Author: Jerry Jones | Size: 3577 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
510. | Fast Cleaner Gold 1.61 (eshinesoft.com) | ||
Fast Cleaner,you can clean up those error-making and useless garbage files securely. With Clean Assistant,you can perform system cleanup with ease,and you can protect your online privacy by cleaning up IE Cache,Cookies,History,etc Key Features: 1.Professional,skinnable and easy to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Haitao Zhao | Size: 2312 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > File protect software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|