|
||||||
|
||
|
Home > Encrypted folder software |
Related keywords: folder, encrypted, Folder, hide folder, lock folder, protect folder, folder guard, password protect folder, security folder, folder size |
|
|
51. | TracHound 3.0.6 (gracesoftwaresolutions.com) | ||
Multi purpose project tracking application. Used to track a variety of project related issues, such as tasks, bug reports, change request, work request, action items or any other project, business, or technical related issue that you need to track and or manage. TracHound has an intuitive interface that makes | |||
Updated: 3, 2005 | Rating: 0 | Author: Joey McCoy | Size: 5609 kb | Shareware Go to category: Business > Project Management Similar programs | |||
52. | Web Cache Illuminator 4.8.2 (nstarsolutions.com) | ||
makes the task much easier. Just point and click to the web cache folder and it will create a meaningful list that not only displays all the file names in the cache; but, more importantly, displays the title given by the web page's creator. It conveniently searches the computer system for usual web | |||
Updated: 2, 2006 | Rating: 0 | Author: Jeff Camino | Size: 491 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
53. | Absolute Database 5.04 (componentace.com) | ||
Absolute Database - Delphi database system. This BDE alternative is free for personal use. Key Features: No BDE; no DLLs; SQL'92 (DDL & DML) support; Single-user and mutli-user mode (file-server); Single database file; Unmatched ease-of-use; 100% compatibility with standard DB-aware controls; Strong | |||
Updated: 2, 2006 | Rating: 226 | Author: ComponentAce LTD | Size: 24106 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
54. | Aurigma Image Uploader 3.5 (aurigma.com) | ||
ColdFusion, JSP, etc. Features: * Easy navigation through the folders on your computer. Several view modes: thumbnails (for JPEG, TIFF, etc), details, list, and icons; * Supports non-images too. * Memory friendly even for huge number of uploaded files; * Auto-recovery upon connection | |||
Updated: 2, 2006 | Rating: 1677 | Author: Fedor Skvortsov | Size: 2593 kb | Shareware Go to category: Development > Active X Similar programs | |||
55. | Cryptocx v5 5.1.6 (easybyte.com) | ||
designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
56. | Cryptocx v6 6.1.3 (easybyte.com) | ||
designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use Cryptocx to encrypt your | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
57. | FolderView ActiveX control 3.2 (icxr.com) | ||
identical to the tree pane in Explorer. It displays a list of folders (and files) and allows browsing of the shell's entire namespace. Though it exposes and returns many properties and methods similar to that of the familiar TreeView control, it provides many other unique features: - The background of the control can be set to any color or a tiled graphic. The graphic may | |||
Updated: 9, 2005 | Rating: 16 | Author: Panos Koutsoukeras | Size: 243 kb | Demo Go to category: Development > Active X Similar programs | |||
58. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
By hiding the LASsie tables, and/or linking to them in an external, encrypted database, you could minimize the possibility of such potential breaches, but you should understand that we do not guarantee that such a breach will never occur. That being said, LASsie can serve quite well as an application | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
59. | MacNames 1.1m (peccatte.karefil.com) | ||
MacServerIP or Intergraph ExtremeZ-IP. Option to include sub-folders in renaming process, mapping of illegal characters ( /, \, , ?, *, etc.) that can be easily modified, correspondance table Signatures (Type/Creator) / Extensions easily editable. Used also to truncate filenames longer than 31 characters, allowing to view these files from Macintosh more friendly than DOS | |||
Updated: 2, 2006 | Rating: 285 | Author: Patrick Peccatte | Size: 2191 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
60. | Quest 1.0 (e-dition.net) | ||
A thousand years ago, on a world many light years away, two factions came to war. Their society was technologically advanced, and in danger of destroying itself and the planet. One faction desired to continue their advanced ways, the other advocated a return to a more simple life. There were those, however | |||
Updated: 9, 2005 | Rating: 0 | Author: John K. Peterson | Size: 6494 kb | Shareware Go to category: Games & Entertainment > Other Similar programs | |||
|
Home > Encrypted folder software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|