|
||||||
|
||
|
Home > Key exchange software |
Related keywords: exchange, Exchange, EXCHANGE, stock exchange, exchange rates, link exchange, microsoft exchange, Exchange alternative, Exchange Server, exchange 2000 server |
|
|
71. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is called by your software and is displayed to the user to notify them of the current demo status (e.g. 10 days | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | Pathfinder Download Manager 1.01 (lincolnbeach.com) | ||
potential customers! There are many uses for Pathfinder. If the key for you is to get your products into the hands of users this is the tool for you! Helps software developers, affiliate managers, and others to get their products in front of users while also saving bandwidth. Pathfinder "download | |||
Updated: 9, 2005 | Rating: 0 | Author: Lincoln Beach Software | Size: 2565 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
73. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
package. iOpus SEA uses the Blowfish encryption algorithm with a key length of up to 448 bits. Blowfish encryption is so strong that it has never been cracked yet. In fact, most experts agree that it cannot be cracked with current computer technology and that includes supercomputers! Your time | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
74. | Secura Backup Professional 2.13 (cmfperception.com) | ||
even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
76. | Puffer 4.02 (briggsoft.com) | ||
for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | IRCommand2 3.34 (wdpsoftware.com) | ||
the COM+ interface or printing. By registering, you receive a key and ID that removes all limitations. The registered version will support a virtually unlimited number of device panels and buttons. IRCommand2 currently works with the Actisys IR200L IR control head, which uses a serial port on your PC. Written in C++, IRCommand2 is efficient and, unlike some other similar | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Mattioni | Size: 2324 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | Just Stuff 2.1 (vsisystems.com) | ||
check box, it will not count the blank lines. Email Setup Enter Exchange Server name in text box labeled “Exchange Server”. Enter Exchange Account name in text box labeled “Exchange Account”. Then Enter in Email Subject, Message Find ASCII Value -Enter Character in Text Box on | |||
Updated: 9, 2005 | Rating: 0 | Author: Vic Szamody | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | EzSearch 3.6 (soft9000.com) | ||
EzSearch is a tool on a mission: Besides saving you the trouble of reviewing millions of files, there are some other features that you might be interested in; . EzSearch works in the background: Once you start a file-search, you can flip to another program and continue to work on other projects. You can get | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1763 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
80. | Absurd Terminator 2.9 (nesoft.org) | ||
Main functions:- Shutdown/Restart/Log off Windows with help of hot keys or by one click on system tray icon; - Shutdown/Restart/Log off Windows from command line, using terminator.exe /shutdown /restart /logoff (for .bat-files or shedullers and planers); - Terminate any running program, task or process | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Key exchange software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|