|
||||||
|
||
|
Home > Encrypt from command line software |
Related keywords: encrypt, line, command, command line, on line, off line reader, Encrypt, Line, file encrypt, encrypt file |
|
|
51. | TSE Pro 4.4 (semware.com) | ||
editor. Load as many files (long filenames supported) as Window's virtual memory will allow. Files may be loaded in normal text mode or in binary mode (great for editing/viewing non-ASCII files), and additionally offers a HEX mode view, which can be toggled on/off for each file. Use the editor's video macro to adjust the size of the editor's display on the Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Sammy Mitchell | Size: 1348 kb | Shareware Go to category: Development > Other Similar programs | |||
52. | Power File Gold 1.0 (canyonsw.com) | ||
one toolbar and drive bar Integrated FTP. Start an FTP session from Power File. Drag and drop files between FTP and local drives Display Tree Sizes View the contents of files in the preview window Display graphics thumbnails Compare Files Encrypt files Filter files by date, name, and size Synchronize Directories DOS Command line Powerful filemanger | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Baumbach | Size: 5686 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
53. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
54. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | JvCrypt 1.0 (vandaveer.com) | ||
encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
56. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
57. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
58. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
59. | CryptoForge 3.2.5 (cryptoforge.com) | ||
you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
60. | BackUp32 2.0 (soft-one.com) | ||
configuration groups, configurations execution once in N days, OS commands execution before and after archiving, support for command line execution, archiving to removable media, archives password protection, .BAK files creation, support for commentaries and descriptions, lists of | |||
Updated: 9, 2005 | Rating: 0 | Author: Vsevolod Vasilyev | Size: 2663 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Encrypt from command line software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|