|
||||||
|
||
|
Home > Encrypting software |
Related keywords: file encrypting |
|
|
181. | Maxus 3.05 (neurobridge.com) | ||
Maxus is a progressive multi-functional tool designed to improve your Windows and Internet experience. It actually comprises several utilities listed below. The first is a flexible scheduler with customizable visual and sound alarms and ability to launch certain applications or open documents at the specified | |||
Updated: 8, 2004 | Rating: 0 | Author: NeuroBridge | Size: 1366 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
182. | Maxus SE 3.05 (neurobridge.com) | ||
Maxus SE is a progressive multi-functional tool designed to improve your Windows and Internet experience. It actually comprises several utilities listed below. The first is a powerful built-in dial-up connections manager that lets you establish Internet connections using any account existing in your system | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
183. | NovaNet-WEB 6.2 (novastor.com) | ||
NovaNet-WEB is comprehensive Remote and Online Backup software for Windows 2003/XP/2000/NT/Me/98, including both client and server components. NovaNet-WEB gives businesses the ability to setup a cost-effective and highly efficient backup solution. The NovaNet-WEB Client software can be automatically | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Dunham | Size: 22242 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
184. | NovaStor Online Backup 5.1 (novastor.com) | ||
backup data delivered on CD. All transmitted and stored data is encrypted in a format that can be completely private for each user. Backup critical files safely off-site to NovaStor's secure data center. User-friendly interface makes it easy to select files and schedule automatic off-site backups. Try our 15-day Free Trial with up to 250 MB of | |||
Updated: 9, 2005 | Rating: 0 | Author: Mike Dunham | Size: 13057 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
185. | Optimumcut-1D LITE 1.00 (optimumcut.com) | ||
Optimumcut-1D is a Stand-Alone (1 Dimension) Cutting List Generator and Linear Material Optimization Software Tool which calculates and displays exactly how to obtain the best yield from stock lengths of profile. Subsequently leading to significant savings in materials cost when estimating and ordering | |||
Updated: 2, 2006 | Rating: 90 | Author: Stephen Martin | Size: 2 kb | Shareware Go to category: Business > Other Similar programs | |||
186. | Outlook Express Backup Genie 1.6 (amicutilities.com) | ||
Outlook Express Backup Genie is an utility designed to easily create a backup or archive file of your email data from your favorite Email Client, which may easily be restored when necessary. It supports the top 9 Mail Clients: Outlook Express ( 5.x and 6.0 ), Microsoft Outlook, Eudora ( Pro and Light ) | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1290 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
187. | Pad 4.00 (hds-pad.com) | ||
Pad is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
188. | PageFocus Pro 6.14 (promaxum.com) | ||
PageFocus Pro merges desktop publishing with hypertext-enabled database management and application development. It can be used for creating drawing, brochure, graph, pattern, image file, hypertext, PDF files and form. It can also be used to create and manage databases of number, text, drawing, and image | |||
Updated: 9, 2005 | Rating: 0 | Author: Creative Stars, Inc. | Size: 6496 kb | Shareware Go to category: Business > Other Similar programs | |||
189. | Paragon Hard Disk Manager 5.5 (paragon.ru) | ||
in the case of hard disk failure or system crash. Create special encrypted drive to store sensitive data on it; any application and even operating system have transparent access to this encrypted drive, but only if you have supplied correct password or key. You can completely erase deleted files | |||
Updated: 8, 2004 | Rating: 0 | Size: 8045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
190. | Password Manager XP 2.1.322 (cp-lab.com) | ||
utility. Program's unique features include capability to encrypt stored information with several encryption algorithms simultaneously (Blowfish, 3DES, Rijndael, Tea, Cast128, RC4, Serpent, Twofish). Importantly, no temporary files are ever created, guaranteeing the encrypted data will never be intercepted. The blocks of information are cleared from the computer memory | |||
Updated: 2, 2006 | Rating: 45 | Author: CP Lab | Size: 948 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
191. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
192. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
193. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
194. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The program runs completely hidden in the background so you can monitor whenever you want. Stealth technology ensures that PC Activity Monitor Net™ is completely hidden from everyone except you. Only you can | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
195. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
196. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
197. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
198. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
199. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
200. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Encrypting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|