|
||||||
|
||
|
Home > Bitmap software |
Related keywords: capture bitmap, Bitmap Show, Bitmap font, bitmap menu |
|
|
911. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
912. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
Cryptosystem ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
913. | CSSS 2.2 (sarbash.com) | ||
Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
914. | Cuevision Network Monitor Professional 2.2.2 (cuevision.com) | ||
Monitor your network devices including servers, and websites. Track performance metrics such as website load time, content, and response codes, cpu, memory and disk usage. Visualize your network with the map window. Get notified with alerting. Recover automatically from failures. Know your devices with | |||
Updated: 9, 2005 | Rating: 0 | Author: J Pavlovcak | Size: 2916 kb | Commercial Go to category: Network & Internet > Network Monitoring Similar programs | |||
915. | CyArc - File Archive and Recovery 1.1 (cywarp.com) | ||
CyArc takes copies of files as you create and change them. Multiple versions of files are kept reflecting the history of file changes. When you use CyArc on a set of folders you are in the position to go back to any version of a file. You can use it to keep copies of digital photos as you work on them or to | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hall | Size: 2256 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
916. | CyberSoft PhileSplitter 2003 4.0.1 (cybersoftcentral.com) | ||
theory!) or split groups of files and folders. PhileSplitter has it's own built in CAB compression and encryption if you wish to use them to save time switching between programs. Other features include cancelling operations part way to resume later, improved progress bars with estimated time remaining | |||
Updated: 9, 2005 | Rating: 0 | Author: David Parker | Size: 2842 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
917. | D_back 1.60.3 (backupforall.com) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
918. | Data Destroyer 1.5 (braintwist-studios.com) | ||
But deleting files with Windows merely removes the file system's pointer to the file, all the data remains on your hard drive or floppy disk. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
919. | Data Stash 1.5 (skyjuicesoftware.com) | ||
you to hide sensitive data files within other files. Select a large bitmap or database file (or any file you'd like to use) as a receptacle, then add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains fully functional. Password protection is also | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
920. | DCPP 2.7 (securstar.com) | ||
transparent data protection. DCPP allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Bitmap software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|