|
||||||
|
||
|
Home > Plan software |
Related keywords: business plan, room plan, lesson plan, Business Plan, business plan template, cashflow plan, investment plan, cutting plan, 401k plan, retirement plan |
|
|
611. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
612. | EDXOR 1.64 (members.ozemail.com.au) | ||
EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 35 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
613. | EldoS PKI Tools 1.2 (eldos.org) | ||
EldoS PKI Tools is set of programs designed for encryption and signing of files using X.509 certificates and for management of these certificates. 1. File Processor allows you to pack, unpack, sign, encrypt, verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
614. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
if you are really concerned about privacy of your data, there's nothing to stop you from protecting your archives with password and encrypting them. Please be aware that many implementations of encryption algorithms exist on the market. While they all employ the same ideas they don't necessarily have to be binary compatible. Therefore, it may happen that files encrypted by | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
615. | Evidence Destructor 2.14 (emailarms.com) | ||
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
616. | Evidence Exterminator 2.14 (softstack.com) | ||
Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
617. | EXEsafe 2 (members.aol.com) | ||
EXEsafe allows you to put a lock on almost any program file, such as a game, or your office software. It uses the highly secure blowfish encryption algorithm for extra security. The lock is totally customisable - you can lock using a password, timing system, username, or a combination of all three. When | |||
Updated: 9, 2005 | Rating: 0 | Author: Tobias Constantine-Cort | Size: 960 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
618. | EzCrypt+ 2.01 (kmgi.com) | ||
Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress. “Encrypt and e-mail” option allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
619. | File Tutelary 1.12 (siskinsoft.com) | ||
many features such as step by step to make it easier to use. What's FileTutelary ? -------------------------------------------------------------------------------- FileTutelary is a shareware to encrypt and decrypt your files by your own password in a while.Protect your files not easy to be readed.If others get your files which have not be encrypted, from files he can read what you | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
620. | FileMonkey 10.22 (monkeyjob.com) | ||
The FileMonkey file operations package automates common file management tasks. Main features include: Perform search and replace on multiple file contents, names or folder names using wildcards such as asterisk. Rename files or folders to match a sequence or crop names. Copy or move files. Split, join, or | |||
Updated: 2, 2006 | Rating: 61 | Author: monkey job | Size: 2098 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Plan software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|