|
||||||
|
||
|
Home > Encrypting software |
Related keywords: file encrypting |
|
|
871. | NetChat 2.6 (barefootinc.com) | ||
NetChat is a peer-to-peer local network instant messaging and communications system for Windows which does not require a server to be running for use. It allows you to chat in real-time with other users on a secure and private local network connection. * NetChat may be used as an electronic office in/out | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Metzler | Size: 1162 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
872. | Network Eagle Monitor 4.3 (network-eagle.com) | ||
Network Eagle is a network monitor program. Create categorized task lists on a "set and forget" basis. Network Eagle can ping server, monitor TCP port, check HTTP URL (with HTTP auth), test FTP link, check disk space usage, execute external command check, check databases via ODBC, monitor MS SQL server via | |||
Updated: 9, 2005 | Rating: 0 | Author: Yury Zaitsau | Size: 3042 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
873. | NetWorx 3.2 (softperfect.com) | ||
NetWorx is a simple, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you don't | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
874. | NotesImp 1.5.2 (notesimp.com) | ||
NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption algorithm. NotesImp has embedded reminder, ability to change its appearance using skins and extend its functionality using plugins. You'll also find | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
875. | NovaStor Online Backup 5.1 (novastor.com) | ||
backup data delivered on CD. All transmitted and stored data is encrypted in a format that can be completely private for each user. Backup critical files safely off-site to NovaStor's secure data center. User-friendly interface makes it easy to select files and schedule automatic off-site backups. Try our 15-day Free Trial with up to 250 MB of | |||
Updated: 9, 2005 | Rating: 0 | Author: Mike Dunham | Size: 13057 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
876. | NT Perfect Companion 4.0.06 (easydesksoftware.com) | ||
Perfect Companion is a system utility that will help you maintain the integrity of your Registry. It's especially useful for PCs that have lots of software installed and uninstalled, as it cleans up the garbage left by many uninstallers. Registry scans are thorough and revolve around finding and removing | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3226 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
877. | Omniquad Set Me Up 3.5j (omniquad.com) | ||
Get the most from your Win95/98/ME computer with over 80 runtime enhancements, settings and tools covering system boot, Windows graphics, sound, system maintenance, file encryption, crash protection and recovery, Internet Explorer, new Windows 95/98/ME and general security enhancement User interface and | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Sobstel | Size: 2683 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
878. | GreatCrypt 2.0 (miraxus.com) | ||
It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
879. | Handy Backup Pro 1.1 (handybackup.com) | ||
Handy Backup Pro is an easy-to-use yet powerful backup program designed for Windows 9x/NT/2000/Me/XP. It makes an automatic scheduled backup of your critical data virtually to any type of storage media: hard or network drive, CD-R/W, FTP or LAN. Strong file encryption and multichoice ZIP compression on the | |||
Updated: 9, 2005 | Rating: 16 | Author: Sergey Petrov | Size: 2454 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
880. | Hermetic Stego 5.17 (hermetic.ch) | ||
Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be recovered when you | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
881. | HideInPicture 1.1 (braintwist-studios.com) | ||
enables you to encrypt and hide any type of Files inside of Pictures. This way your files are hidden in plain sight, and in a place that no one would even think to look. HideInPicture's purpose is to hide any data in a way that the viewer does not recognize any difference. Nobody will suspect hidden data inside the image. You also can create complete Web galleries with your | |||
Updated: 9, 2005 | Rating: 0 | Author: Jens Huebner | Size: 979 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
882. | Hider 1.1 (amosoft.net) | ||
is a special steganography application used to encrypt and hide files within image, audio and video files. Files hidden with Hider are not only undetectable, but irretrievable as well. Hider uses advanced technology to protect files including: 256-bit encryption algorithm - Rijindael, advanced compression, and password protection of files. You can secure any file type with Hider | |||
Updated: 9, 2005 | Rating: 79 | Author: AmoSoft Team | Size: 1165 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
883. | HyperClipper XL 2.1 (hyperclipper.com) | ||
Clipboard utility. Enhances standard copy/paste functions of Windows, adds 200 pieces clips stack, preview, full clipboard control. Integrated with Windows Explorer clipboard folder allows manage and preview clipboard's content in any Explorer's window. Unique enhanced selectable paste with preview available | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Popov | Size: 1230 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
884. | IconLover 2.0 (aha-soft.com) | ||
IconLover gives professional and amateur artists the ability to design and edit all the graphics required in the software development cycle, including icons, static and animated cursors, and other interface elements. All these graphics can now be designed in a single application. IconLover offers a variety and create your own unique icons, cursors and other tiny images. Manage icon libraries, and create a unique look and feel to your desktop and folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Aha-soft Team | Size: 940 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
885. | Identity Knight 1.3 (fspro.net) | ||
Modern computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception data. Your credit card numbers, SSN, driver license and e-mails can be stolen easily! Download Identity Knight, the unique credentials protection software, today | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
886. | IECitater 1.04 (newpulses.com) | ||
IECitater is usable for scholars and reviewers. This simple program enhance effectiveness of your Internet browsing. Select fragment of text or pictures and gather selected fragments to Word document. At the end - you have all cites in the one file. All fragments are automatically commented by item names. gather selected fragments to Word document | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Mainitchev | Size: 275 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
887. | Innovative System Optimizer Platinum Edition 2.10 (innovative.fileburst.com) | ||
This powerful yet safe tool optimizes your registry, cleans your computer of useless data, and backs up your important system files. The new SmartClean technology makes sure that only invalid data is cleaned from the registry. Innovative System Optimizer adapts its scanning process to your version of Windows | |||
Updated: 9, 2005 | Rating: 16 | Author: Daniel STATESCU | Size: 3669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
888. | Internet Explorer Toolbar Maker 3 (text-reader.com) | ||
You don't have to be a programmer to create your own Explorer bar. Explorer Bar (Band) Maker is a Windows tool (one-step wizard) that lets you create your own Explorer bar from any HTML page, picture or Macromedia Flash file. Usually, making Explorer bars includes COM programming, that can be complex Explorer Bar (Band) Maker is a Windows tool (one-step wizard) that lets you create your own Explorer bar from any HTML page, picture or Macromedia Flash file | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Ivlev | Size: 322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
889. | IntraChat 2.0 (intrachat.com) | ||
Each client is independent of each other. All messages are encrypted with the US Government approved algorithm to make sure that your messages can't be intercepted and read by a third party. There are three different types of channels (user groups) - main, public and private. Main channel displays messages for everybody in the network (if they have IntraChat installed) | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Haidukov | Size: 676 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
890. | IntraMail 2003.01.20 (dplanet.ch) | ||
protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
891. | Invisible CHAOS 5.1 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
892. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
The newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
893. | Just Wallpaper 3.5 (lincolnbeach.com) | ||
Just Wallpaper is a fantastic tool that lets you manage and display all of your Windows' wallpaper. You set up your own themes and add all the wallpaper images you desire. Using the many options available to you, you can randomly display any image in a theme at a specified time interval as well as: Overlay a | |||
Updated: 9, 2005 | Rating: 0 | Author: Harold Holmes | Size: 3453 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
894. | JvCrypt 1.0 (vandaveer.com) | ||
encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
895. | LanHunter 1.50 (waterfallsoft.com) | ||
LanHunter makes it easy to search for files on your local network (LAN). When you use LanHunter, you can specify several search criteria. For example, you can search for files by name, date, size and text in a file. With a big number of details you will find everything you want on your network! LanHunter | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vdovin | Size: 1017 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
896. | LetUknow 2.03 (mhsoftware.co.uk) | ||
LetUknow provides a "peace of mind" method of monitoring your LAN and resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals - you choose how often. If a test fails, the appropriate individuals are notified immediately, resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
897. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
LinkFerret-Remote is an efficient, easy to use, low cost, high performance Ethernet/802.11B/G monitoring tool. Network admins may use it in scripts to periodically sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
898. | LockTheFile 1.8 (okosoft.com) | ||
is a tool that encrypts files with strong encryption alghorytm. You may protect any information - text files, pictures, video and audio files from other eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy user interface; Ability to send locked files to your friends by email; Ability | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
899. | DVD to AVI AC3 Ripper 1.0.0.0 (222dvd.com) | ||
DVD to AVI AC3 Ripper can convert DVD movie files to AVI, DIVX, MPEG4 with AC3 audio. It is a powerful and easy-to-use DVD ripping, converting and backup tool. Main features include: convert DVD to AVI and DivX with AC3, the highest quality of video and 6-channel audio, choose DVD caption and audio language | |||
Updated: 9, 2005 | Rating: 585 | Author: Bill Bush | Size: 1373 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
900. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Encrypting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|