|
||||||
|
||
|
Home > Key exchange software |
Related keywords: exchange, Exchange, EXCHANGE, stock exchange, exchange rates, link exchange, microsoft exchange, Exchange alternative, Exchange Server, exchange 2000 server |
|
|
71. | IRCommand2 3.34 (wdpsoftware.com) | ||
the COM+ interface or printing. By registering, you receive a key and ID that removes all limitations. The registered version will support a virtually unlimited number of device panels and buttons. IRCommand2 currently works with the Actisys IR200L IR control head, which uses a serial port on your PC. Written in C++, IRCommand2 is efficient and, unlike some other similar | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Mattioni | Size: 2324 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | Just Stuff 2.1 (vsisystems.com) | ||
check box, it will not count the blank lines. Email Setup Enter Exchange Server name in text box labeled “Exchange Server”. Enter Exchange Account name in text box labeled “Exchange Account”. Then Enter in Email Subject, Message Find ASCII Value -Enter Character in Text Box on | |||
Updated: 9, 2005 | Rating: 0 | Author: Vic Szamody | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Key Transformation 5.289 (softboy.net) | ||
Key Transformation can customize your keyboard layout, change any key on the keyboard to other keys. Its on-screen-keyboard ( soft keyboard ) is very easy to use. Want the F1 key to type B? Want the D key to type f? Want the Shift+Enter key to press Table? Want | |||
Updated: 3, 2006 | Rating: 570 | Author: Zhang Yan | Size: 767 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | KGB Spy 3.93 (refog.com) | ||
Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
75. | Puffer 4.02 (briggsoft.com) | ||
for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with | |||
Updated: 9, 2005 | Rating: 0 | Author: Kent Briggs | Size: 1056 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | RegVac Registry Cleaner 4.02.12 (superwin.com) | ||
section. This tool searches through the Software section and finds keys that may be left over from long deleted programs. Tool #5 - Bad Link Vac Tool #6 - Add/Remove Editor Tool #7 - System Configuration Utility Tool #8 - OpenWith Editor Tool #9 - AutoComplete Editor Tool #10 - Junk Key Editor Bonus Tools - Automation, Undo, Registry Backup, Registry Pack, and | |||
Updated: 2, 2006 | Rating: 42 | Author: Ray Geide | Size: 1183 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
77. | RPN Engineering Calculator 6.3.2 (j-a-associates.com) | ||
the number in x-reg and Drops the number in y-reg into x-reg; xy, exchanges the values in the x-reg and y-reg; xВІ; square root of x; 1/x; and 8 constants involving pi are on all but the Binary keypad. Standard, Engineering and Trig keypads also have a function to convert between polar and rectangular | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Allen | Size: 1466 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
78. | Secura Backup Professional 2.13 (cmfperception.com) | ||
even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
80. | iOpus Secure Email Attachments - Encrypted and Self-extracting 1.0 (iopus.com) | ||
package. iOpus SEA uses the Blowfish encryption algorithm with a key length of up to 448 bits. Blowfish encryption is so strong that it has never been cracked yet. In fact, most experts agree that it cannot be cracked with current computer technology and that includes supercomputers! Your time | |||
Updated: 9, 2005 | Rating: 0 | Author: iOpus GmbH | Size: 998 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Key exchange software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|