|
||||||
|
||
|
Home > In store software |
Related keywords: store, e store, online store, Store, store passwords, store builder, video store, online store constructor, store web pages, store numbers |
|
|
791. | EldoS PKI Tools 1.2 (eldos.org) | ||
and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you can pack files into ZIP archive, sign the archive and send it by e-mail by selecting one command in Explorer context menu. 2. Certificate Generator is a wizard-like application that lets you | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
792. | Emsa DiskCheck 1.0.75 (e-systems.ro) | ||
progress statistics etc. It was designed with simplicity in mind, but usefulness for the user. You can use it to do a full check of the surface of any disks, for example if you have just scratched a disk and want to see if it is still readable, or if you want to check all your cd library for time or usage related faults. You can also use it for drive benchmarking, easily | |||
Updated: 9, 2005 | Rating: 4036 | Author: Emsa Systems | Size: 185 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
793. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
to allow to print it. The button to print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing the user to read it only if he know the correct password. Note, The source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
794. | Find Protected 2.0 (aks-labs.com) | ||
documents, including Word, Excel and Access files. 3) Secure file stores, such as PGP disk. Use Find Protected to inspect local or remote computers for password protected files. After selecting the types of protected files that you want to find and the location to search in, you run the scan. The result of the inspection is a list of discovered password protected files | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
795. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
from a PC or a terminal. Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has the like solution: it is a product for the remote control of | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
796. | EZ Password Secure 1.2 (esmarttools.com) | ||
your passwords and usernames, as well as the URLs and descriptions, in different groups. Further more, EZ Password Secure can store all other personal information, e.g. bank accounts. Built-in Password Generator provides custom passwords. With the 1-Click function, you can paste the username&password to the clipboard, and also launch the associated web site. Key | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
797. | f2xml 1.0 (boulderwall.com) | ||
are provided. f2xml provides detailed information on what is stored on your disk(s) and allowing a wide variety of disk based tasks and reports, such as: Finding zero length (empty) files Listing duplicate files Sorting files and folders to find the largest files. Keep track of all files stored on CD's, or floppy disks such that they can be accessed without re-loading | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
798. | File Monster 2.6.7 (nstarsolutions.com) | ||
files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased. As a result, anyone | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
799. | File Recover 4.15d (filerecover.com) | ||
have accidentally deleted an important document or data file. Gone in a flash can be months or years of work, accounting records, documents, data files, and especially those files planned for tomorrows back up. No doubt, you are wondering, why buy a program when Microsoft Windows already has a | |||
Updated: 9, 2005 | Rating: 83 | Author: Nils Rognerud | Size: 669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
800. | FileSpy 3.0 (ic.net) | ||
the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have administrative rights you can even clear their connection. Use FileSpy to monitor files and see the date and time a user accessed a file and the date and time the user released the file (stored in a log | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > In store software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|