|
||||||
|
||
|
Home > Encrypted software |
|
|
1. | !!!Poker Master 2.0.0 (micronet-software.com) | ||
Here is ready for You the new Video Poker with the playoff rounds more amusing than you have ever seen!!!В Poker Master is simple to use. It seems to play against another person!!!. artificial intelligence is very evolved, particularly for the playoff round "Heartbeat."В Poker Master has 3 playoff rounds: Poker Master is simple to use. It seems to play against another person!!!. artificial intelligence is very evolved | |||
Updated: 3, 2006 | Rating: 54 | Size: 11080 kb | Shareware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
2. | 123 Flash Chat Server Software 5.1 (123flashchat.com) | ||
123 Flash Chat Server Software brings you fast, amazing real-time chat solution. *With the 100% Pure Java server, it's a cross-platform application with reliability and high load support. *With the 100% pure flash client, it provides stunning and skinable interface and much faster speed than regular chat | |||
Updated: 2, 2006 | Rating: 165 | Author: Daniel Jiang | Size: 18598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
3. | 1st Atomic Time 2.12 (greenparrots.com) | ||
1st Atomic Time keeps the system time accurate on your computer or any computer in your network. It synchronizes your PC clock with Internet atomic time servers. You can pick the fastest and most reliable servers from the built-in list of more than 150 choices or add your own. All selected servers will be | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 707 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
4. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
We all try our best to keep pace with time. The times take us to convert our business content to Adobe PDF. That's why we developed ABC Amber Text Converter - to help ourselves and to help you. Key features of conversion to PDF using ABC Amber Text Converter program include 40/128 bits PDF encryption | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
5. | Actual Window Guard 3.8 (actualtools.com) | ||
Actual Window Guard is the system enhancement application of Actual Tools Company. Like a real guard or a magic genie, it will protect your computer work by making any application absolutely obedient in your arms. You will be able to do with windows whatever you want! A lot of useful things become accessible | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Tretyakov | Size: 1665 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
6. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
avast! Professional Edition is a complete ICSA certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
7. | Backup4all 3.0 (backup4all.com) | ||
it with any zip compatible utility. Backup4all also allows you to encrypt your backup using AES Encryption (128/192/256-bit). This backup software keeps track of file versions. You can easily restore any version of files or a whole folder. You can filter files to be restored. Backup4all tests the backup files automatically to ensure the backup is safe and correctly executed (uses | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
8. | Backup4all 3.0 (backup4all.com) | ||
it with any zip compatible utility. Backup4all also allows you to encrypt your backup using AES Encryption (128/192/256-bit). This backup software keeps track of file versions. You can easily restore any version of files or a whole folder. You can filter files to be restored. Backup4all tests the backup files automatically to ensure the backup is safe and correctly executed (uses | |||
Updated: 2, 2006 | Rating: 39 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
9. | Backup4all 3.0 (backup4all.com) | ||
it with any zip compatible utility. Backup4all also allows you to encrypt your backup using AES Encryption (128/192/256-bit). This backup software keeps track of file versions. You can easily restore any version of files or a whole folder. You can filter files to be restored. Backup4all tests the backup files automatically to ensure the backup is safe and correctly executed (uses | |||
Updated: 2, 2006 | Rating: 0 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
10. | BB DOALL 6.51 (bbsys.com) | ||
fields, concatenate data, etc. -Sensitive data tables (.dbf) can be encrypted on the hard drive, and de-crypted "on the fly" when Doall is started. In addition, there is an option to encrypt other files using Windows Capicom (Crypto API). -Change color/font schemes in any column to highlight specific data. Dynamic font re-sizing in grid for visually handicapped. Partition | |||
Updated: 2, 2006 | Rating: 28 | Author: Bob Bolda | Size: 8789 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
11. | Dekart Private Disk 2.07 (dekart.com) | ||
reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Flash Decompiler - Eltima SWF to FLA Converter 2.6 (eltima.com) | ||
Flash Decompiler from Eltima.com is a powerful SWF to FLA Converter which decompiles sounds, images, videos, shapes, frames, morphs, fonts, texts, buttons, sprites and ActionScripts from any SWF. This solution from Eltima.com also allows you to get Flash Video in AVI or other playable formats. All you need to | |||
Updated: 2, 2006 | Rating: 520 | Author: Eltima Software | Size: 4121 kb | Shareware Go to category: Web Development > Flash Tools Similar programs | |||
13. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
Automation software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
14. | Internet Download Manager 5.02.07 (internetdownloadmanager.com) | ||
Accelerate downloads by up to 5 times, schedule downloads, recover and resume broken downloads. The program features an adaptive download accelerator, dynamic file segmentation, high speed settings technology, and multipart downloading technology to accelerate the download process. It reuses available | |||
Updated: 3, 2006 | Rating: 16 | Author: Tonec Inc. | Size: 1834 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
15. | Kalimages 2.03 (peccatte.karefil.com) | ||
Easily manage your photo collection and use it as a professional assistant that helps you locating, tagging, categorizing images from your photo folders with preview, thumbnails, search and edit options, templates to standardize embedded IPTC metadata. The software includes support of the Thesaurus for Locate, select images by keywords, author, classification. Use IPTC editor w thesaurus | |||
Updated: 2, 2006 | Rating: 97 | Author: Patrick Peccatte | Size: 4244 kb | Shareware Similar programs | |||
16. | Password Manager XP 2.1.322 (cp-lab.com) | ||
utility. Program's unique features include capability to encrypt stored information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of information are cleared from the computer memory | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
18. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
19. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
20. | Polymap 2.5.0 (polymap.com) | ||
PolyMap is a desktop mapping program that lets you use your own data to customize the maps supplied with the program. Use the built-in spreadsheet to enter data or paste it from other Windows applications. Alternatively, you can use the import feature to bring in data from external spreadsheets, text, or | |||
Updated: 9, 2005 | Rating: 42 | Author: Thomas Erbacher | Size: 15915 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
|
Home > Encrypted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|