|
||||||
|
||
|
Home > Copies software |
Related keywords: Create backup copies of documents |
|
|
791. | Easypass 2.0 (andresensoft.de) | ||
passwords Convenient use through: - Stay on top function. - Copy-to-clipboard function. - Small-window-mode. No more problems with "unreadable" passwords like this: "aIl1IO". Easypass comes with a preconfigured list of characters which will be easy to read. You can change this list or | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulrik Andresen | Size: 2927 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
792. | ECBackup 2.0 (softcomplete.com) | ||
line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc. ECBackup has a good degree of compression of your information - on the average in 1,5-2 times better than widely widespread archivers. The applied technology of open keys allows safely to store a public key on the disk and guarantees | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
793. | ECSync 1.0 (EUROCOMP.info) | ||
for configuration. Tasks can be stored in profiles for individual copying processes. Can be automated with Windows Task Scheduler for periodic tasks. Runs with and without user intervention. Creates log files. Very fast! A must for every notebook owner! ECSync! works on the same drive, on another drive or across a network. Works in both directions to ensure that all files are up to | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Osthege | Size: 5007 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
794. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
795. | Email Spy Pro 4.5 (email-spy.biz) | ||
available today. Once installed on monitored computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured via Email Spy | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
796. | Emsa PC FlexInfo 1.0.57 (e-systems.ro) | ||
load. The system information data is presented as text so it can be copied and pasted into documents. This program was designed with simplicity in mind, but usefulness for the user. The system information provides various informations about the local system ,like Operating System name and version, system folders, Service packs, cpu information, keyboard, mouse, environment variables | |||
Updated: 9, 2005 | Rating: 0 | Author: Emsa Systems | Size: 353 kb | Freeware Go to category: System Utilities > Benchmarking Similar programs | |||
797. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
798. | Find Protected 2.0 (aks-labs.com) | ||
size. Once you have found password protected files, these can be copied to a separate folder for further examination that may include recovering the password. If you need to find a password to an encrypted file, then this program will provide you with up-to-date information about the best password recovery techniques. You can download the evaluation Find Protected from | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
799. | Evolution Interface 1.1 (evolution-interface.com) | ||
as Evolution itself. Included is a built-in CD Ripper that lets you copy music from audio CDs in MP3 format. Playlists and Session Lists make it easy to select, schedule, and play your favorite music. Evolution also comes packaged with a mesmerizing screen saver you just have to see to believe! Plus sticky notes, easy-to-use volume slide control, and a clock with customizable fonts | |||
Updated: 9, 2005 | Rating: 0 | Author: CodeName: MANA LLC | Size: 8470 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
800. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
The same concerns the purchase of various USB equipment in several copies when it is possible to use one copy through the TCP/IP network. Our product allows to use any USB equipment located far away through the TCP/IP network. There is a number of the equipment controlled through a serial port from a PC or a | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Copies software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|