|
||||||
|
||
|
Home > Trust software |
|
|
61. | alive 1.0.0.4 (freestone-group.com) | ||
not immortal. You can take him! Excellent! I see that you can be trusted to perform well when called upon. Don't tell me you're losing your nerve? Get you gone, and don't come back 'til you've stiffened your spine! I can't believe my ears! Why did you do it? Why? Well, no matter. Who says being | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Titov | Size: 134 kb | Freeware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
62. | !Date Cracker 2000! 2.0 (e-tech.ca) | ||
software. Software Developers should be aware of such programs (trust me, they are!). They must devise better algorithms so that their software will be protected better. But the fact is, most software developers do not mind their software (Trial versions/ Demo's) being run by such programs....while | |||
Updated: 9, 2005 | Rating: 11400 | Author: Neil Britto | Size: 1500 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
63. | Agent Password 1.8 (agentpassword.com) | ||
Password is your trusted password informer. The program is intended for automatic saving of all logins and passwords entered. It can be used not only as password keeping software but as a password spy, too. The manufacturer is not responsible for any inappropriate use of the program. We simply provide top notch, high quality software applications. It's up to you how to use the | |||
Updated: 8, 2004 | Rating: 251 | Author: Pavel Mikhailov | Size: 902 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
64. | Backup Plus 7.7.1 (avantrix.com) | ||
and see why hundreds of thousands of users and major corporations trust their backup needs to Backup Plus! Backup Plus allows you to easily backup your important data. Features include the ability to backup to just about any device, FTP backups and timed backup operations. This award winning product is all you need to keep your important data | |||
Updated: 9, 2005 | Rating: 16 | Author: AVANTRIX Inc. | Size: 5128 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
65. | Boss Key 1.6 (boss-key.com) | ||
very ... very fast! And certainly your visitor will like that you trust him so much! Reboot your PC? - great decision! Excepting that all your work will be LOST! Or just do nothing? - congratulations! Now you are absolutely free man - you have no secrets! Press F10 (or any other key you assigned) and it will be IMMEDIATELY hidden. After your visitor went out press it again | |||
Updated: 9, 2005 | Rating: 16 | Author: VicMan Software | Size: 298 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
66. | DCPP 2.7 (securstar.com) | ||
users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National Institute of Standards and Technology (NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information. DCPP | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
67. | DriveCryptPlusPack 1.0c (securstar.de) | ||
that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S.Government organizations(and others) to protect sensitive information.DCPP is | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | File Monster 2.6.7 (nstarsolutions.com) | ||
office at night, just who has access to your computer? # Do you trust that neighbor that comes over to your house to use or fix your computer? How about your roommate? # Do you trust the people you give your computer to when something needs installed or fixed? Now maybe these people will just snoop around -- or maybe they'll take the information they collect for their own | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
69. | File Substring Replacement Utility 10.1 (gammadyne.com) | ||
are supported. FSRU is a professional, rock solid program - don't trust your files to anything less! A shareware program that performs search and replace operations on multiple substrings in multiple files. Case-insensitive, "whole word", and wildcard searches are | |||
Updated: 3, 2006 | Rating: 0 | Author: Greg Wittmeyer | Size: 2335 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
70. | Hide Folders XP 2.2 (fspro.net) | ||
day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of being disclosed. Hide Folders XP in innovative file and folder hiding and | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Trust software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|