|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
31. | Internet Explorer Toolbar Maker 3 (text-reader.com) | ||
own Explorer bar from any HTML page, picture or Macromedia Flash file. Usually, making Explorer bars includes COM programming, that can be complex and confusing. This work has done for you. Now, making a new bar is so easy as selecting a file. An Explorer bar (band) is a panel like the Favorites, History or Search panels that you see in your Internet Explorer (IE) or | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Ivlev | Size: 322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | Left-side Explorer bar Maker 3 (text-reader.com) | ||
own Explorer bar from any HTML page, picture or Macromedia Flash file. Usually, making Explorer bars includes COM programming, that can be complex and confusing. This work has done for you. Now, making a new bar is so easy as selecting a file. An Explorer bar (band) is a panel like the Favorites, History or Search panels that you see in your Internet Explorer (IE) or | |||
Updated: 9, 2005 | Rating: 16 | Author: Vadim Ivlev | Size: 322 kb | Shareware Go to category: Development > Other Similar programs | |||
33. | Left-side Explorer bar Maker 3 (text-reader.com) | ||
own Explorer bar from any HTML page, picture or Macromedia Flash file. Usually, making Explorer bars includes COM programming, that can be complex and confusing. This work has done for you. Now, making a new bar is so easy as selecting a file. An Explorer bar (band) is a panel like the Favorites, History or Search panels that you see in your Internet Explorer (IE) or | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Ivlev | Size: 322 kb | Shareware Go to category: Development > Other Similar programs | |||
34. | MagicScore Maestro 4.095 (musicaleditor.com) | ||
to/from MIDI and save data in various formats, including graphic files (BMP, JPEG, GIF, WMF) that are easy to print out. Other helpful features include customized texts orientation options, notes volume and effect play-back calculations, and a capability to stop executing any operation any time. The program has been used extensively by amateur and professional musician and | |||
Updated: 3, 2006 | Rating: 62 | Author: Dmtriy Golovanov | Size: 2363 kb | Shareware Go to category: Audio & Multimedia > Music Composers Similar programs | |||
35. | MailTalkX 3.41 (softbytelabs.com) | ||
can also run MailTalX in multi language interface, all menus, dialog texts and messages. Create your own language by editing the language file directly. You may right click the mailbox icon to bring up the Accounts Commands. Right clicking the message will bring up the Messaging Commands. As an additional feature you may right click any blank area within the window for the | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 1926 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
36. | Pad 4.00 (hds-pad.com) | ||
is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular expressions, a block (column) selection mode, line bookmarks and line | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
37. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
38. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
39. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
40. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
41. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
42. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
43. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
44. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
45. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
46. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
47. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
48. | PopMessenger 1.61 (leadmind.com) | ||
as a LAN-based instant messaging system allowing for immediate rich text message and files delivery over corporate network. You can communicate with all the users on the network or choose specific user group (e.g. Level 2 managers) or send private messages. Whether you chat on public or private | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
49. | Printfil 4.3 (guolo.com) | ||
applications. You can set your application to print to an ascii file, or you can have Printfil capturing a parallel port output, automatically redirecting your print jobs to any printer, even if a printer is phisically connected to the captured port. In addition, it will allows you to: - preview printing - include logos or background images stored in separate files | |||
Updated: 2, 2006 | Rating: 1170 | Author: Davide Guolo | Size: 1007 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
50. | Smart Pix Manager 8.05 (xequte.com) | ||
of all common image, multimedia (AVI, MPEG, MP3, etc), Office, text and web files. Smart Pix allows you to rapidly search and categorize files in your multimedia collection using keywords and descriptions (which can be automatically generated). Smart Pix offers advanced file security including encryption, password protection and even browsing of files in | |||
Updated: 2, 2006 | Rating: 0 | Author: Nigel Cross | Size: 2466 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
51. | TimelyWeb 4.2a (timelyweb.com) | ||
can check keywords in web pages or exclude parts of web page text (like counters or time). It can also highlight all changes in web pages. Both static and dynamically generated resources can be monitored. If the resource is protected, TimelyWeb will login automatically. You can vary check interval from minutes to months, and secify it individually for every page or resource | |||
Updated: 9, 2005 | Rating: 56 | Author: Anton Karpenko | Size: 2162 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
52. | Total Commander 6.54a (ghisler.com) | ||
ZIP-compatible packer. The search function allows to search for files inside archives, even for text. A command line helps starting programs with parameters, and a fully configurable button bar allows to launch programs and inter- nal commands. The built-in viewer can show files in text, hex, binary, image and multimedia format. The 32 bit version | |||
Updated: 3, 2006 | Rating: 0 | Author: Christian Ghisler | Size: 1629 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
53. | VLPropertyList 2.0 (viklele.com) | ||
minimal code. Built-in editors supported by the control include text, number, boolean, drop-down list, color picker, font selection, file selection folder selection and date pickers. It even allows you to add your own in-place or dialog based custom value editors. By default the control automatically matches the color scheme as per the desktop settings. On the other hand | |||
Updated: 9, 2005 | Rating: 0 | Author: Viklele Associates | Size: 2032 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|