|
||||||
|
||
|
Home > Encrypt text software |
Related keywords: text, encrypt, text editor, text to speech, Text, text messaging, TEXT, text file, text reader, rich text |
|
|
541. | IECitater 1.04 (newpulses.com) | ||
enhance effectiveness of your Internet browsing. Select fragment of text or pictures and gather selected fragments to Word document. At the end - you have all cites in the one file. All fragments are automatically commented by item names. You can get selection from any program or document. Now | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Mainitchev | Size: 275 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
542. | NCrypt TX 1.6 (ncrypt.altervista.org) | ||
TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 419 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
543. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 82 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
544. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
545. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
546. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
547. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
548. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
549. | PowerGREP 3.2.2 (jgsoft.com) | ||
do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's documentation | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
550. | Quicknote 5.2 (jens.metz-furniere.de) | ||
you do not need an advanced text processor but a virtual scrapbook to write down an occasional thought, a plan for the day or an Internet URL. With a plain text editor, which can be used for this purpose, you have to run the program first, then create a new file, then type a line or two and save the file. Too many things to do in order to simply write down a thought? With | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Mьller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
|
Home > Encrypt text software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|