|
||||||
|
||
|
Home > Protected software |
Related keywords: password protected, Copy Protected WMA, copy protected, find protected, find password protected, search protected, search password protected |
|
|
741. | CryptEnCrypt 1.10 (inetprom.com) | ||
CryptEnCrypt allows you to choose several encryption algorithms to protect your data. These are AES, Triple-DES, GOST, RC2, RC4 and Data Protection API based algorithms. Strong encryption ensures that your information would not be easily stolen from your computer by hackers, government, or global | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
742. | Cryptgine Archiver 1.05 (infolocks.com) | ||
the internet or storing sensitive files that are used infrequently, protect them with unbreakable and customizable security. The first in the Cryptgine application series, the Cryptgine Archiver creates file archives that are both compressed and/or encrypted. The encryption method used to secure the | |||
Updated: 9, 2005 | Rating: 0 | Author: Info Locks | Size: 94264 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
743. | Crypto 2000 4.2 (gregorybraun.com) | ||
utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in the taskbar notification tray. Crypto is a small, easy to use, file encryption utility. Simply drag and drop | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
744. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
745. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
746. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
747. | CryptoForge 3.2.5 (cryptoforge.com) | ||
software for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later, the information can be | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
748. | CryptoMite 2.00 (baxbex.com) | ||
CryptoMite also includes some non-encryption security functions: Protects any exe-file with a password, hides folder and hides whole drives. CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with zip compression. Functions to build self-extracting encrypted zip files and eMail capabilities are also | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
749. | CSJami Minicom Pro 5.4.0.0 (csjami.netfirms.com) | ||
*TimeCenter *Wake On Lan WOL *>128 bit security Password protected and optimised for easy use. TCP-IP and IPX enabled, 4,8, 16 bit color selection and multithreaded. Transit routing. Easily take control of remote PCs with Minicom over LAN dial-up or Internet connections. Screen file manager and finder Time Center audio and video routers shutdown internet connect clipboard | |||
Updated: 2, 2006 | Rating: 42 | Author: CSJami CSJami | Size: 5006 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
750. | CSS Quick Backup 2.21 (css-software.com) | ||
to create backup jobs, define the execution schedule and password protect the archive files as required. Restorations are performed using the integrated Restore Wizard. Both wizards integrate seamlessly into Windows Explorer. Select the files and folders you want to add to a backup job, select backup from the menu, and Quick Backup does the rest for you. If you want to restore a | |||
Updated: 3, 2005 | Rating: 0 | Author: Kevin Whynot | Size: 4809 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|