|
||||||
|
||
|
Home > Command line encrypt software |
Related keywords: encrypt, line, command, command line, on line, off line reader, Encrypt, Line, file encrypt, encrypt file |
|
|
81. | EasyConsole 1.2 (peccatte.karefil.com) | ||
you navigate in drives and through folders using Windows issuing DOS commands on a slave MSDOS console, saving command-line instructions for future use. Last 20 commands are memorized and you will be able to store 10 long most used or favorite command lines on 10 buttons to be launched with a click instead of typing again and avoiding fastidious | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 1476 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
82. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
83. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
84. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
85. | CryptoForge 3.2.5 (cryptoforge.com) | ||
you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | CSDiff 5.0 (componentsoftware.com) | ||
reject or manually edit any modifications. · Change detection by line, by word or by character. · Smart white-space difference analysis option. · Analysis of MS-Word documents. (MS-Word required) · Sophisticated folder difference analysis sorted by any key. · Support of compressed folders (ZIP files) for comparison between archived folders and regular folders. · Enhanced | |||
Updated: 9, 2005 | Rating: 97 | Author: David Matyas | Size: 1332 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
87. | Delete 2.10 (eBible.org) | ||
application means that it runs in a Windows 98, ME, 2000, or XP command prompt. It is an improvment over the DEL or ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
88. | Dirlot 0.9 (soft.km.ua) | ||
on parent directory and how space is distributed among the directory's elements. You can also: - change parent directory - view files' meta-data (creation date etc) - select sort order (by size and name) - select linear, logarithmic and root scale of diagram columns - view size in bytes, Kbytes and Mbytes. The utility uses color coding to present size information, so bigger | |||
Updated: 9, 2005 | Rating: 0 | Author: Olexandr Lykho | Size: 11 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
89. | DLOCK2 2.01 (eBible.org) | ||
is a simple command line file encryption/decryption utility program that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2 | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
90. | BackUp32 2.0 (soft-one.com) | ||
configuration groups, configurations execution once in N days, OS commands execution before and after archiving, support for command line execution, archiving to removable media, archives password protection, .BAK files creation, support for commentaries and descriptions, lists of 'included', 'excluded' and 'excluded from compression' files, fast compression speed, nice | |||
Updated: 9, 2005 | Rating: 0 | Author: Vsevolod Vasilyev | Size: 2663 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Command line encrypt software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|