|
||||||
|
||
|
Home > Find encrypted software |
Related keywords: find, encrypted, Find, find and replace, FIND, ebay find, auction find, file find, find email, find duplicate files |
|
|
601. | AlarmWiz 2.10 (acrovista.com) | ||
an attactive, easy to use interface which makes functions easy to find and a help file is included with screen shots for quick learning and reference. AlarmWiz also includes a network mode which allows multiple systems to use the same alarm configuration file on a remote server. The evaluation version of AlarmWiz includes a 30 day trial and registration is easy and affordable at | |||
Updated: 9, 2005 | Rating: 16 | Author: Danny Weidig | Size: 1323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
602. | Big Crocodile 3.10 (sowsoft.com) | ||
Storage of all your passwords, logins and hyperlinks in a securely encrypted file. Big Crocodile can automatically insert the passwords into the windows that require them. Password generator with advanced functions, multi file interface, special password folders, backup, search, export and other | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 556 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
603. | Captain Mnemo Pro 1.41 (refog.com) | ||
But even this measure won’t speed up the whole process of finding and utilizing the required password when it is requested. So, is there a way to keep things secure yet fast and seamless? In fact, there is. Presenting Captain Mnemo, the totally innovative password management solution intended to ease your life greatly. Imagine that you could forget about passwords mess once | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
604. | Changes Saver 2.0 (enins.com) | ||
interval. Besides, a user can manually create versions when he/she finds it necessary. Versions storing. There is a possibility to set a number of versions for storing, or a period, for which versions will be saved. This does not mean, however, that after these conditions are reached, versions will no | |||
Updated: 9, 2005 | Rating: 0 | Author: Nikolay Enin | Size: 1330 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
605. | CryptoForge 3.2.5 (cryptoforge.com) | ||
you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
606. | Desktop Scout 4.0 (globalpatrol.net) | ||
logs is restricted by an administrator password, network traffic is encrypted to prevent eavesdropping, and logs are compressed and encrypted before storage. The program runs as a Windows service, which makes it impossible to for users without administrator privileges to disarm or uninstall | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
607. | DeviceLock 5.73 (protect-me.com) | ||
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
608. | Finders Keepers 2.02.2 (yadudigital.com) | ||
Finders Keepers(tm) can search files, replace text, index entire hard drives for instant text retrieval, view or launch any found files, zip found files, and edit the found ASCII text files. Search files 4 ways: plain-text search, regular expressions, approximate, and sound-alike. Find words | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
609. | Ghost Keylogger 3.80 (keylogger.net) | ||
easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
610. | NewName Pro 2.03 (troegersoft.de) | ||
The program NewName Pro makes it possible to rename (number/character ending, replace/insert sign series, change file extension, ...) and sort files, to change the file attributes (date, time, readonly, ...) quickly and easily. It is also possible to make or edit id3 tags of mp3-files and you can create and | |||
Updated: 2, 2006 | Rating: 16 | Author: Ingo Tröger | Size: 1648 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Find encrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|