|
||||||
|
||
|
Home > Dupe software |
Related keywords: dupe remove |
|
|
781. | Easy2Sync for Files 1.11 (itsth.de) | ||
Do you have the same files on notebook and PC? Easy2Sync is the fast and easy method to make sure that the two computers (or FTP servers) are always in sync. Easy2Sync is easy to use and considers many special cases to protect your files when you synchronize the files. Easy2Sync was designed to regard many | |||
Updated: 2, 2006 | Rating: 39 | Author: Thomas Holz | Size: 2198 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
782. | EF File Catalog 0.996 (efsoftware.com) | ||
from CDDB (freedb.org and local) * Fast search/search for dupes functions with wildcards, filtering support * Detailed informations * User interface with multi language support * Exports to text, CSV, HTML Limitations: * 30-day trial * Not all Units are saved to disc * Nag screen Shareware (Free updates) Catalog whole disks or only single directories with familiar | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 955 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
783. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
Manager can analyze even the file content. It indicates then only dupes, which are absolutely identical. The EF Duplicate Files Manager looks if desired in multiple drives or multiple paths for dupes. Beyond that it is able to analyze the contents of archive files. The most usual formats (RAR, ACE, ZIP and much more) are supported as well as in image files (IMG, ISO9660) | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
784. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
785. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
786. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
787. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
788. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
789. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
790. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
The Pro edition of the EndTask family includes tools for blocking pop-up ads, managing tasks, monitoring system performance, monitoring your Internet connection and much more. Unlike other pop-up blockers, ours won't kill pop-up windows you want. Our unique software hides pop-ups and just shows information | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Dupe software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|