|
||||||
|
||
|
Home > Secure file software |
Related keywords: file, secure, File, file transfer, file management, file encryption, file manager, file sharing, Secure, file backup |
|
|
31. | Secure Information Courier 1.2 (bytefusion.com) | ||
Secure Information Courier brings secure email encryption to your organization's web site. Visitors to your web site can send secure email to your organization and even convey digital documents securely using industry standard encryption. Secure Information Courier is | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 6309 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
32. | Express Communicator 2.01 (files.acdsystems.com) | ||
essentials of an instant messenger. It creates fast, reliable and secure instant messaging connections between network associates on local and wide area networks (LAN and WAN). Your messages are automatically private and secure as they are protected by industry-standard 64-bit encryption and are transferred directly to the receiver without sitting on a server during transport | |||
Updated: 9, 2005 | Rating: 0 | Author: David Hooper | Size: 4966 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
33. | HTML Password Encryption 4.20.02 (htmlguardian.org) | ||
password protection, encrypt HTML files with 448 bit keys. Hide html source code. Image protection - protect images on your web site. Protect web page or entire website with a password. Encryption algorithm used is much stronger than the 128 bit cipher used in todays browsers and considered secure enough for online credit card payments. Option to enter the password only once | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Crain | Size: 3348 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
34. | Clever Internet Suite 33 3.3 (aidsoft.com) | ||
The set of e-mail components can connect to mail servers via Secure Socket Layer (SSL) channel, send emails with MIME encoded bodies and multiple file attachments.Features:- Multipart Multitreading Downloading- Connect through a secure channel (HTTPS) using SSL- Ability of resuming broken or stopped downloads from where they left off on both HTTP/HTTPS and FTP | |||
Updated: 9, 2005 | Rating: 0 | Author: Clever Components | Size: 1259 kb | Demo Go to category: Network & Internet > Download Managers Similar programs | |||
35. | MileMate 3.0 (milemate.com) | ||
your reports in a Microsoft Excel spreadsheet or an Adobe Acrobat file formats. MileMate uses sophisticated algorithms for such calculations as your total cost analyses, odometer readings, fuel consumption and scheduled maintenance reminders. For example, you can enter partial Fill Ups and the | |||
Updated: 9, 2005 | Rating: 0 | Size: 21000 kb | Demo Go to category: Home & Hobby > Personal Finance Similar programs | |||
36. | Copysafe Pro 2.0 (artistscope.com) | ||
several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than 3,000 images at a time. The most important area that image encryption will protect is the downloading of graphics using spiders and site grabbers. Encrypted images are safe because the image | |||
Updated: 9, 2005 | Rating: 42 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
37. | FastSend 2.1.1 (fileflow.com) | ||
provides the fastest, easiest and most secure way of sending your files. Through an intuitive interface, the user can send files to any email address. FastSend solves the well-known file transfer problems of email attachment size limitations, security and usability problems with FTP and the inconvenience of burning a CD and sending it by courier. FastSend can | |||
Updated: 9, 2005 | Rating: 0 | Author: FileFlow Technologies | Size: 2320 kb | Demo Go to category: System Utilities > File Compression Similar programs | |||
38. | Cryptocx v5 5.1.6 (easybyte.com) | ||
compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Why use Cryptocx? Use Cryptocx to encrypt your data, totally securing it. EasyByte Cryptocx v5 builds upon the previous releases of | |||
Updated: 9, 2005 | Rating: 39 | Author: EasyByte Software | Size: 4099 kb | Demo Go to category: Development > Active X Similar programs | |||
39. | axsStrongBox 2.1 (morello.co.uk) | ||
is a COM component which provides strong, secure data encryption (public and private key). It can be easily integrated into Visual Basic, Visual C++, Delphi and VBScript applications. StrongBox uses industry standard, public domain algorithms - choose between Rijndael (AES), Twofish, Blowfish, DES and Triple DES (private key) or RSA (public key). ECB and CBC modes are | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
40. | Code-Lock 2.35 (chosenbytes.com) | ||
using your obsolete software protections. Code-Lock, an advanced, secure software protection system, will stop crackers in their tracks. Code-Lock, featuring CodeSecure Technology for Visual Basic, C#, VB.NET and Delphi applications, has never been cracked. It is time to keep crackers awake while you | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
41. | The Patentstein Browser 1.3.0.1 (patent.info) | ||
reports. · Encrypt sensitive material. · Post your results on a secure server, accessible by clients using Internet Explorer. · Interruptions? No problem - resume where you left off! The Patentstein Browser transforms otherwise transient search results into reusable knowledge! A must for innovators and patent info pros, the Patentstein Browser provides powerful tools to | |||
Updated: 9, 2005 | Rating: 0 | Author: John Moetteli | Size: 3358 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
42. | JD Punch Clock 2.63 (employeepunchclock.com) | ||
know that your information in safe from missed indexes, deleted text files, and prying eyes. JD Punch Clock is designed with you and your business in mind so whether you have 5 or 5,000,000 employee's we have a solution to fit YOUR needs. Unlike other applications JD Punch Clock understands that | |||
Updated: 9, 2005 | Rating: 82 | Author: John Spiker | Size: 4370 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
43. | Active ERASER 4.01 (active-eraser.com) | ||
DoD 5220.22-M, to even more sophisticated methods such as Gutmann's. You can erase files, folders, CD-RW discs, logical drives, and entire physical drives. The program also wipes out deleted files, which Windows just renders invisible, from your disk. It cleans the tracks of your Internet and local activities, such as cookies and temporary files. The log lets you | |||
Updated: 9, 2005 | Rating: 489 | Author: Data Security | Size: 1030 kb | Demo Go to category: System Utilities > Other Similar programs | |||
44. | pornOUT 1.0 (pornout.com) | ||
your kids, clients, and employees are surfing. Pornout™ is extremely secure by offering the latest in browser-workstation technology. Pornout™ uses two separate lists to control web browsing. By using the block list, you can stop the loading of unwanted sites. By using the bypass list, you can enable | |||
Updated: 3, 2005 | Rating: 227 | Author: Silvio Kuczynski | Size: 516 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
45. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
46. | EzBrowser 3.0 (ietoolbox.com) | ||
tabbed browser, Passwords & Notes keeper, Form Filler, File Viewer, Favorites Viewer/Searcher, and QuickLinks toolbar. EzBrowser features: - Well-behaved: NO ADWARE, NO SPYWARE - Unobtrusive: no annoying "in your face" popup windows - Secure: your passwords and notes are encrypted with strong encryption Now your passwords will always be "right there" for you in | |||
Updated: 3, 2005 | Rating: 0 | Author: Brett Goodman | Size: 2045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
47. | Paragon Hard Disk Manager 5.5 (paragon.ru) | ||
affords everything you may need for managing hard disks; it’s suitable for both everyday and rare needs, for either inexperienced user or advanced professional. Repartitioning of hard disk. At any time you can easily and safely change partitioning of your hard disk, change parameters of partitions. All modern and usually used file systems and operating systems are | |||
Updated: 8, 2004 | Rating: 0 | Size: 8045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Secure file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|