|
||||||
|
||
|
Home > Password encryption software |
Related keywords: password, encryption, Password, file encryption, password manager, Encryption, password protection, password recovery, password generator, encryption software |
|
|
501. | Backup4all 3.0 (backup4all.com) | ||
valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with support for SSL encryption, proxy server, passive mode), backup to CD/DVD, or other removable media (such as USB drives). Backup4all can backup open/locked | |||
Updated: 2, 2006 | Rating: 0 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
502. | Big Crocodile 3.10 (sowsoft.com) | ||
Crocodile is a powerful, secure password manager. Storage of all your passwords, logins and hyperlinks in a securely encrypted file. Big Crocodile can automatically insert the passwords into the windows that require them. Password generator with advanced functions, multi file interface, special password folders, backup, search, export and other features | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 556 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
503. | Captain Mnemo Pro 1.41 (refog.com) | ||
ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption. However, as a drawback we get the situation when an average computer user has dozens or even hundreds of complex | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
504. | CD-DVD Lock 2.01 (softheap.com) | ||
them. You can gain access to your devices back by entering a valid password that only you know. Your data on your media are not going to be encrypted or altered in any way, therefore if you forget your password, you'll never lose your data stored on the protected media. Moreover, it works more faster than any other software using cryptooperation mechanisms. The main purpose of | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
505. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
506. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
507. | CryptoForge 3.2.5 (cryptoforge.com) | ||
is encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later, the | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
508. | Desktop Scout 4.0 (globalpatrol.net) | ||
deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
509. | Finders Keepers 2.02.2 (yadudigital.com) | ||
You can replace by regular expressions. You can use a password to disable replace functions for risky users, such as kids or new users. Index selected files or your entire hard drive to find a word with split-second text retrieval. Immediately see the list of files the word is in, and view or launch those files 6 ways. You can find misspelled words in the index easily | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
510. | Ghost Keylogger 3.80 (keylogger.net) | ||
Would you like to know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
|
Home > Password encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|