|
||||||
|
||
|
Home > Boot keys software |
Related keywords: boot, keys, boot manager, hot keys, network boot, remote boot, Boot ROMs, Boot Services, multi boot, boot agent |
|
|
911. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
for Windows 98/ME/NT/2K/XP using the AES algorithm with 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted files have a '.AXX' extension added to their names, and are shown with a new icon. To encrypt a file, right-click it in Windows Explorer and select 'AxCrypt | Encrypt'. To edit or view an encrypted file | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
912. | Axessh Windows SSH Client 3.2 (labf.com) | ||
Axessh is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
913. | Back4WinXP 5040 (back4win.com) | ||
for scheduled unattended backups. Instant Backup by macro key. Does not have 4Gb and 65535 file limit of other ZIP backup programs. Different ways of viewing and finding your data makes location very easy. Logical, easy to use functions without annoying pop-up windows. Easy and fast ways of doing your backups. Catalog files allows define and reuse previous settings. ZIP | |||
Updated: 9, 2005 | Rating: 86 | Author: Alistair George | Size: 1246 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
914. | Backup Wolf 3.13 (lonewolf-software.com) | ||
lose another critical byte of data: Speed and precision are the keys to Backup Wolf's power. The ability to perform backups in seconds means you'll no longer avoid or procrastinate backing up your files. Nothing is easier to use: Backup Wolf smashes the "learning curve". Install the software and you'll be creating your backup profiles in minutes. Click on each window tab in | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Davis | Size: 5311 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
915. | BestCrypt 7.20.2 (jetico.com) | ||
Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options. The wiping utility is included allowing you to wipe files, free space, swap file and file slacks that nobody can restore your files later. This version includes support for Windows XP, swap file encryption, and a "hidden" container feature. BestCrypt is professionally developed product which keeps your | |||
Updated: 9, 2005 | Rating: 55 | Author: Jetico Inc. | Size: 5004 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
916. | BKS 3.2.4.30 (backup2001.com) | ||
any change, or rename it. A very nice tool if you own an USB memory key. BKS synchronizes computers, disks and folders. Files can be copied, compressed or encrypted With the Incrmental mode synchronization is done at the light speed. With File Access Manager you now copy any file in use including SQL | |||
Updated: 2, 2006 | Rating: 16 | Author: RD Technologies | Size: 4664 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
917. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
Do you want to know what your buddy or colleague is typing? May be you want to control your family members - what are they doing on your computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
918. | BlowFish 2000 2.8 (gregorybraun.com) | ||
protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured to optionally place its program icon in the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 1007 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
919. | Bonodi XML Editor 2.12 (zero.ad.jp) | ||
plain text files that contain software programs. Keyboard shortcut keys can be customized. Bonodi's search feature facilitates searching XML document(s) by XPath pattern and other search methods available in Bonodi. Bonodi's search feature can be applied to an opened XML document, or all opened XML | |||
Updated: 9, 2005 | Rating: 39 | Author: Yuji Ichikawa | Size: 3788 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
920. | BootLocker 7.85.11 (bootlocker.com) | ||
BootLocker is a desktop security program that protects your computer from Windows startup. It does not allow intruders to access anything without a username and password. There is system tray support, password recovery, and locking screen saver. All in an easy to use interface. BootLocker is a desktop | |||
Updated: 9, 2005 | Rating: 0 | Author: Steven Eppler | Size: 3148 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Boot keys software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|