|
||||||
|
||
|
Home > Pieces software |
Related keywords: border pieces, remove pieces |
|
|
71. | Mass File Editor 2.0.9 (MassFileEditor.com) | ||
from it. Files can be modified and renamed using all available data pieces. Allows editing files one by one or going through all of them in a single pass without user's attention required. Full-featured text editor supports all codepages available on your computer including Unicode; text can be viewed and converted between codepages. Supports both Windows and Unix style end of line | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Grebov | Size: 2113 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
72. | Evidence Destructor 2.14 (emailarms.com) | ||
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Evidence Exterminator 2.14 (softstack.com) | ||
Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
74. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
75. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
76. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
77. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
78. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | ClipMate Clipboard Extender 7.0.07 (thornsoft.com) | ||
works alongside the regular Windows clipboard and remembers every piece of data (both text and graphics) that you cut or copy. Once your data is in ClipMate, you can select an item and it is automatically placed back on the clipboard or directly into the application you were using. You can view, print, edit, reformat, convert to upper/lower case, search, rename, and reorder clip | |||
Updated: 2, 2006 | Rating: 16 | Author: Chris Thornton | Size: 4741 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
80. | BlazingTools Smart Type Assistant 1.42 (blazingtools.com) | ||
CApitals, capitalization of names of days, pasting large text pieces with one click, keyboard scoring, extended Clipboard (Clipboard history), system management hotkeys and more! Make your typing faster and more productive - let your keyboard be as smart as you! Features: -Autoreplace (expanding short keywords into full phrases) Examples: BTW -> By the way; withb -> With best | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 384 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Pieces software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|