|
||||||
|
||
|
Home > Encryption library software |
Related keywords: encryption, library, file encryption, Encryption, Library, encryption software, encryption system, email encryption, ftp library, data encryption |
|
|
781. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor Netв„ў is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
782. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
783. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
784. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
This small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected computer. If it is exist - works alarm and programm issues the message "Name_of_the_computer is exist ". Also alarm works | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
785. | PowerGREP 3.2.2 (jgsoft.com) | ||
do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's documentation includes a detailed regular expression tutorial, with many simple and complex examples | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
786. | PowerKey 2.11.01.22 (elcor.net) | ||
is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
787. | Secure Password Store 0.81 (lmphotonics.com) | ||
by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted. - Print out of database. - Export Database to CSV format in encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
788. | Security Folder 2.0 (security-folder.com) | ||
application combines the ultimate power of industry-standard strong encryption algorithms with unique stealth technologies to protect your data from both unauthorized access and modification/destruction by malicious programs. Unlike other security software, available on the market, Security Folder was | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
789. | Tray Safe 4.3 (fgroupsoft.com) | ||
Tray Safe password manager is a proud holder of the world's most secure password keeper title because of its unique hardware ID feature. Basically, it means that the program works only on a single PC (yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
790. | WinNc.Net 4.1 (dunesmm.nl) | ||
It supports extraction from WAV to MP3 files, ripping audio cd's to MP3 and converting WAV to MP3. A new feature in WinNc.Net is the ability to record files on CDs or DVDs. WinNc.Net is shareware and can be freely downloaded and distributed from the Dunes MultiMedia website. Registering WinNc costs $29,95 for a single user license. WinNc is available in the following languages | |||
Updated: 9, 2005 | Rating: 0 | Author: Kuno Hamers | Size: 7540 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Encryption library software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|