|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
211. | Orbital's SQL Decryptor 2.2 (decryptor.orbitaltechnologies.org) | ||
SQL Decryptor is the first product to decrypt SQL triggers, views, user defined functions and stored procedures in an easy to use Enterprise Manager-like graphical interface. It works quickly to decrypt items in Microsoft® SQL Server 6.5, 7.0, 2000 and MSDE. Orbital's SQL Decryptor allows for easy viewing of decrypted code with T-SQL syntax highlighting and multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Orbital Technologies | Size: 684 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
212. | P.C. Police 2004 (pc-police.nethint.com) | ||
on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police elegantly tracks all keyboard | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
213. | Pad 4.00 (hds-pad.com) | ||
is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular expressions, a block (column) selection mode, line bookmarks and line | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
214. | PageFocus Pro 6.14 (promaxum.com) | ||
It can be used for creating drawing, brochure, graph, pattern, image file, hypertext, PDF files and form. It can also be used to create and manage databases of number, text, drawing, and image. The underlying WYSIWYG graphical user interface lets you create form-based (and database) | |||
Updated: 9, 2005 | Rating: 0 | Author: Creative Stars, Inc. | Size: 6496 kb | Shareware Go to category: Business > Other Similar programs | |||
215. | PageFocus Pro 6.71 (pagefocus.com) | ||
It can be used for creating drawing, brochure, graph, image file, hypertext, PDF files and form. It can also be used to create and manage databases of number, text, drawing, and image. The underlying WYSIWYG graphical user interface lets you create form-based (and database) applications with ease. The package supports double-byte languages, including vertical | |||
Updated: 2, 2006 | Rating: 0 | Author: Nungjane Shi | Size: 6685 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
216. | Painless Schedule 2.0 (uil.net) | ||
one mouse click! - Export your task list to Excel, HTML, XML or text. - Multi-user capabilities mean that your entire team can work together! - Complete help file and PDF manual included! Painless Schedule is a powerful, intuitive program for tracking software schedules. It allows developers | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Sullivan | Size: 4133 kb | Shareware Go to category: Development > Other Similar programs | |||
217. | Parse-O-Matic Power Tool 4.03.00 (members.aol.com) | ||
your file in the wrong format? Don't rekey or delete it - fix it! You can reformat your valuable data with the Parse-O-Matic Power Tool - a programmable file converter. Sample applications: Edit a text file automatically. Copy good data; repair or remove bad data. Restructure a | |||
Updated: 9, 2005 | Rating: 0 | Author: Timothy Canada | Size: 1286 kb | Shareware Similar programs | |||
218. | PassMonster 2.25 (kamatoz.com) | ||
database once and he will know all of your passwords! You can try encrypting the text file (database) containing your passwords. But it takes fairly large amount of time to decrypt it for each use and then encrypt it back again manually! So is this the end? Is there any solution to | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 678 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
219. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
220. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 82 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
221. | Password Saver 2.2.7 (pwdsaver.com) | ||
Office-like scheme where each database is stored in a single file. These files are compact and portable - they can be stored on hard drives, USB flash disks, floppy disks, CD-RW disks, ZIP drives, or any other type of fixed or removable media. You can take your passwords with you wherever you go! Also, since you no longer need to remember your passwords, you can | |||
Updated: 2, 2006 | Rating: 16 | Author: Eugene Olevsky | Size: 2188 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
222. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
223. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
224. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
225. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected while monitoring are saved to the encrypted log file located on the user's machine. The monitoring program works | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
226. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Lite supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
227. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
228. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
229. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
230. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
231. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
232. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
233. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
234. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
235. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
236. | PDF Password Remover 2.5 (verypdf.com) | ||
Password Remover can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
237. | PDF Ripper 2.01 (pdfpdf.com) | ||
Ripper is efficient software to extract image, text, chart, formula, vector drawings from Adobe PDF files. With this program, you can easily collect materials from existing PDF documents, and save them into HTML format, RTF format and plain text format. If you are looking for a converter program to convert PDF to Word, PDF to RTF, PDF to HTML, PDF to Text with a | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Edwards | Size: 969 kb | Shareware Go to category: Business > Other Similar programs | |||
238. | Photo Pos Pro image editor 1.24 (photopos.com) | ||
to work intuitively. The software features support for many image file types (including transparent GIF files); single- and multiple-image printing, and for scanners and digital cameras; tabbed workspace; advanced image-enhancing and editing tools; computer graphics tools; rich-text tools; special effects; photo frames; layers and masks; color transitions; patterns and | |||
Updated: 2, 2006 | Rating: 129 | Author: Shai Harel | Size: 24333 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
239. | PhotoGift 1.2 (serenesoft.com) | ||
from microphone. Add photos from JPEG, TIFF, BMP, PNG, GIF files, from digital cameras, scanners, TWAIN-devices. Edit, rotate, mirror your photos, adjust brightness, contrast, colors; apply large number of graphic filters. Your computer can speak photo comments using text-to-speech engines installed in your system. Create HTML photo galleries with sound, send | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Birukov | Size: 2152 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
240. | PhotoThumb 3.0 (photothumb.com) | ||
image viewer, EXIF support, FTP uploading, CSS support, overlay text, sharpening, slideshow, batch renaming, file encryption, a familiar Explorer-like interface and lossless rotation of JPEG images, PhotoThumb is a handy tool for image collectors and digital camera owners. Digital photography is becoming increasingly popular. It has never been easier, cheaper or more fun to | |||
Updated: 3, 2005 | Rating: 0 | Author: Jarle Aasland | Size: 1606 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|