|
||||||
|
||
|
Home > Encrypting software |
Related keywords: file encrypting |
|
|
101. | Prestwood Ping Server 1.1 (prestwood.com) | ||
The Prestwood Ping Server automates the monitoring of web sites and ftp sites by issuing ping or HTTP requests on regular intervals. It is an ideal application for server farms, large web sites spanning multiple domains, online game servers, download file servers, or any enterprise that spans multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Mike Prestwood | Size: 2119 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
102. | SecEx Secure Shell Client 1.6 (bytefusion.com) | ||
is a network file manager and secure terminal emulator that allows encrypted file transfer between your PC and network servers running Secure Shell. SecEx seamlessly interoperates with either SSH1 or SSH2 servers on both Unix and Windows operating systems. You can transfer files to and from remote servers, view remote files, and execute remote files on your local PC - using strong | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 3610 kb | Demo Go to category: System Utilities > Other Similar programs | |||
103. | SecExMail Gate 1.2 (bytefusion.com) | ||
Gate is an email proxy server which encrypts and decrypts messages on your corporate network in real-time. This proxy server integrates with your existing corporate infrastructure and operates in conjunction with your SMTP/POP3 mail server. SecExMail Gate implements open standard encryption algorithms to create a seamless security framework to protect the privacy of your | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 3024 kb | Demo Go to category: System Utilities > Other Similar programs | |||
104. | Secure Information Courier 1.2 (bytefusion.com) | ||
Secure Information Courier brings secure email encryption to your organization's web site. Visitors to your web site can send secure email to your organization and even convey digital documents securely using industry standard encryption. Secure Information Courier is easy to use and nothing is assumed about | |||
Updated: 9, 2005 | Rating: 0 | Author: Bytefusion Sales | Size: 6309 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
105. | Sinope Summarizer PE Trial 1.2 (carp-technologies.nl) | ||
Sinope Summarizer is the summarizing tool for professionals. It fully automatically generates summaries of arbitrary texts, while retaining images, formatting and page layout. The Sinope Summarizer uses advanced language technologies to determine what the text is about and which information elements are | |||
Updated: 9, 2005 | Rating: 0 | Author: Danny Lie | Size: 7487 kb | Demo Go to category: Network & Internet > Browser Tools Similar programs | |||
106. | Source Encryption 2.00.000 (sourceencryption.triosade.com) | ||
Source Code against un-authorized copying. The software actually encrypts the source code so that others can not view it. The encryption scheme is based on a Java script text encryption that will allow your website to function normally while keeping the source code securly hidden. When a user goes to your encrypted website, they only see what you intend - not the code that | |||
Updated: 3, 2005 | Rating: 0 | Author: Jordan DeLozier | Size: 319 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
107. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and Advanced mode in GUI + Automatic backup of source files + Deployment options + Lock to domain names, IP addresses or LAN hardware + Timeout your scripts at specific dates or days in | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
108. | SpeedOptimizer 2.0 (speedbit.com) | ||
SpeedOptimizer will optimize your Internet-related data transmission including loading of web page elements (text and graphics), downloading, uploading and streaming of content (music, movies, games, clips, etc.), delivery of email messages and attachments (transmission and receipt), and performance of web | |||
Updated: 9, 2005 | Rating: 16 | Author: Speedbit Speedbit | Size: 784 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
109. | STOPzilla 4.3.0.0 (stopzilla.com) | ||
STOPzilla's True Real-Time protection detects, blocks and removes spyware and adware, stops pop-ups, and erases cookies and history. Also offered is FREE 24/7 customer support (for demo users as well as for registered users) via e-mail, live chat, and a toll-free number (1-877-877-9944). Version 4.3 includes | |||
Updated: 2, 2006 | Rating: 79 | Size: 60 kb | Demo Go to category: Network & Internet > Ad Blockers Similar programs | |||
110. | TurboFTP 4.60.438 (turboftp.com) | ||
TurboFTP is a secure FTP client equipped with a wealth of features to offer an easy and reliable way to transfer files over the Internet. Features resumable downloads and uploads, recursive remote directory delete, bookmarks, filtering and transfer of files larger than 4GB. Supports implicit and explicit | |||
Updated: 2, 2006 | Rating: 578 | Author: TurboSoft, Inc. | Size: 3588 kb | Demo Go to category: Network & Internet > FTP Clients Similar programs | |||
111. | Webcrypt Pro 5.0 (moonlight-software.com) | ||
encrypt your HTML Option to encrypt the whole document (including meta tags) or just the body, leaving your meta tags intact (full document encryption functional only in IE browsers) Disable Right-click-save-image (Internet Explorer 4 & higher, Netscape 6 & higher) Built-in graphics splicer gives your graphics instant cache-protection (Version 3.0) Save page to local | |||
Updated: 9, 2005 | Rating: 0 | Author: George Balla | Size: 1056 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
112. | WinCybercafe Internet Cafe Software 4.0 (wincybercafe.com) | ||
Referred to by its code name, WinCC, WinCybercafe Internet Cafe Software is a different breed of cyber cafe and internet cafe management software. Specifis Technologies combines the powerful network functionality of Microsoft Windows operation system with the ease of use of WinCybercafe Internet Cafe | |||
Updated: 3, 2005 | Rating: 77 | Author: Ray Junior | Size: 19865 kb | Demo Go to category: Business > Other Similar programs | |||
113. | WinSyslog 6.0 (winsyslog.com) | ||
messages via UDP, TCP as well as RFC 3195. Adiscon's reliable and encrypted SETP protcol is also supported. WinSyslog's rule engine allows extremely flexible customizing. Runs as a background service or Windows GUI application. Basic features are free to use, enhanced features require a registration | |||
Updated: 9, 2005 | Rating: 31 | Size: 9460 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
114. | WysiPad 2 Browser Based HTML Editor 2.0 (alagad.com) | ||
Alagad WysiPad 2 HTML editor is the only tool you need for browser-based WYSIWYG HTML authoring and editing. Now there is an alternative to text area fields! Simply embed WysiPad 2 wherever you need to provide access to HTML formatted content. The documentation and sample files make it easy to get up and | |||
Updated: 9, 2005 | Rating: 0 | Author: Doug Hughes | Size: 2517 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
115. | Xtreeme SiteXpert Professional Edition 7.1 (xtreeme.com) | ||
With SiteXpert you can create a professional navigation scheme (such as a DHTML drop down menu or site map tree) within a few minutes. No JavaScript knowledge is required. SiteXpert also generates search engines hosted by your own web server / ISP, Intranet, or for CDROM / DVD distributions. All you need to | |||
Updated: 9, 2005 | Rating: 0 | Author: Xtreeme GmbH | Size: 7451 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
116. | Artistic Effects 1.8 (artistic-effects.com) | ||
Computer graphics made a quantum leap while evolving from four colors to color spaces hardly caught by human eye. And as this evolution progressed computer graphics was turning into a major trend. It is impossible to imagine a modern magazine or a web site created without computer graphics. However, the more | |||
Updated: 9, 2005 | Rating: 164 | Author: Neil Sagitov | Size: 981 kb | Demo Go to category: Graphic Apps > Editors Similar programs | |||
117. | Anidragon 1.011 (teknikcorp.com) | ||
Anidragons are virtual pet dragons living as evolving digital creatures in a 3D animated screensaver with day and night cycles, varying weather patterns, exotic wildlife, and panoramic fantasy landscapes. They explore, hunt, eat, play, sleep, and grow to adulthood. Veteran animator Corey Comstock, lead | |||
Updated: 9, 2005 | Rating: 5306 | Size: 42453 kb | Demo Go to category: Desktop > Similar programs | |||
118. | God Our Creator Screen Saver 3.0 (christianscreensavers.com) | ||
Belief in a God who created all that we see and who created us in His image is one of the core foundations of our faith. "In the beginning God created the heavens and the earth....And God created man in His own image,.... (Genesis 1:1, 27a)" This screen saver will remind you of this foundation of your life in | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Johnson | Size: 5891 kb | Demo Go to category: Desktop > Similar programs | |||
119. | God's Grace Screen Saver 3.0 (christianscreensavers.com) | ||
Colossians 1:3-7 teaches us that growth in our Christian life begins when we hear of and understand God's grace in all its truth. This screen saver will serve to facilitate this process as it continually brings to your mind the truth of God's grace and encourages you in your Christian walk. Each scene | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Johnson | Size: 5887 kb | Demo Go to category: Desktop > Similar programs | |||
120. | God's Mercy Screen Saver 3.0 (christianscreensavers.com) | ||
God's justice and holiness are balanced in Scripture by His great mercy. While His justice and holiness demand the ultimate punishment for our sin, His mercy has long ago accepted the death of His Son Jesus as that punishment. And so, we are accepted in the Beloved (Ephesians 1:6). The God's Mercy Screen | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Johnson | Size: 5097 kb | Demo Go to category: Desktop > Similar programs | |||
121. | Names of Christ Screen Saver 3.0 (christianscreensavers.com) | ||
Students of the Bible have long turned to the various names used by the Scriptures to refer to Jesus Christ as clues to His character and actions. This screen saver will remind you of several names used in the Scriptures to refer to Christ: the Bright and Morning Star, the Blessed and only Sovereign, the King | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Johnson | Size: 6688 kb | Demo Go to category: Desktop > Similar programs | |||
122. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
Acronis Privacy Expert Suite provides you with proactive, real time protection against malware; including spyware parasites, rootkits, adware, keyloggers, hidden dialers, browser hijackers, and other malicious programs. Our latest version, 9.0, adds key new features to ensure that your PC is not infected with | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
123. | Advanced Zip Repair 1.7 (repairfile.com) | ||
to 4G. 4. Support to repair spanned Zip files, split Zip files and encrypted Zip files. 5. Support to repair Zip files on corrupted medias, such as floppy disks, Zip disks, CDROMs, etc. 6. Support to repair a batch of files. 7. Support to find and select the Zip files to be repaired on the client | |||
Updated: 3, 2006 | Rating: 1718 | Author: Alan Chen | Size: 769 kb | Demo Go to category: System Utilities > File Compression Similar programs | |||
124. | Anasil 3.2 (anasil.net) | ||
Anasil is a software network analyzer and protocol decoder for distributed Ethernet networks. System architecture is based on a remote Agent modules what enables IT managers to remotely monitor and manage a multi-segment networks from one central console. Anasil consists of three modules: network discovery | |||
Updated: 2, 2006 | Rating: 98 | Author: A plus C A plus C | Size: 39924 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
125. | ABCSpell for Outlook Express 7.1.3.2 (spellchecker.com) | ||
Isota ABCSpell for Outlook Express instantly adds spell checking to Outlook Express! You get: - a Spelling button on your Outlook Express toolbar, - a Spelling option in your Tools menu - a Thesaurus so you can access synonyms, antonyms and related words - an Online Merriam-Webster Word Lookup Easy to Use | |||
Updated: 2, 2006 | Rating: 39 | Author: Isota | Size: 4710 kb | Demo Go to category: Communications > Other E-Mail Tools Similar programs | |||
126. | Clone 2.1.0 (newtonsoftware.co.uk) | ||
Clone allows you to backup your files. Clone can be run as either a screen saver or as a standard windows utility. Run as a screensave, clone backups up the data that is important to you while you take a break from your computer. This ensures you have a copy of your most important files backed up. Clone | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Newton | Size: 3847 kb | Demo Go to category: System Utilities > Other Similar programs | |||
127. | ComfortAir HVAC Software 4.0 (comfortair-software.com) | ||
ComfortAir HVAC software is designed to be used by engineers, architects, contractors and energy auditors to calculate and analyse heating and air conditioning loads in all types of buildings. Input and output units can be set independently to English or Metric units. The program contains weather and other | |||
Updated: 2, 2006 | Rating: 79 | Author: Claon Rowe | Size: 1580 kb | Demo Go to category: System Utilities > Other Similar programs | |||
128. | DataLock 1.0 (unicorntech.net) | ||
Most people store their information on their computer and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
129. | DeviceLock 5.73 (ntutility.com) | ||
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
130. | fsMechanic 1.1 (freewebs.com) | ||
like regular disks. Compressed files support (NTFS). Encrypted files support (NTFS). Access rights ignoring (NTFS). Recognises localised names. Long names support (FAT 12, FAT 16, FAT 32) . Recovers folder structure. Two algorithms of data recover (FAT 12, FAT 16, FAT 32). Correct data recover under Windows® NT, 2000, XP, 2003 Server using FAT32 | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
131. | Ghost Keylogger 3.80 (keylogger.net) | ||
easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
132. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
133. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
134. | Keyring 1.0.1 (morello.co.uk) | ||
such as username/account number and web page in a single securely encrypted file. For convenience, a single click will jump you to the account's web page and copy your password or username to the clipboard ready to paste into the login window. So, now that you don't need to remember your passwords, you can use different, secure "random" passwords for all your accounts | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Duncan | Size: 178 kb | Demo Go to category: System Utilities > Other Similar programs | |||
135. | lock and go 1.0 (aidsoft.com) | ||
lockngo (lock-and-go) is the perfect removable media protection software. lockngo protects the data you store in your Flash Drivers USB keys/pens, USB hard drives, SmartMedia, Zip, Jaz and other types of removable media. Anyone using removable storage media is at risk of losing the media and is exposed to | |||
Updated: 9, 2005 | Rating: 39 | Author: Theodore Fattaleh | Size: 318 kb | Demo Go to category: System Utilities > Other Similar programs | |||
136. | Bomb3D 1.04.2 (i2d.com.au) | ||
Hidden somewhere in that stack of cargo crates are several Bombs. Your job is to remove all of the empty crates without setting off any of the bombs! Similar to good ol' Minesweeper, Bomb3D takes the adventure further than ever before and will really test your concentration while also improving your Featuring awesome 3D graphics, music and sound as well as various levels of difficulty, custom games and maximum replayability, you'll be hooked in minutes | |||
Updated: 9, 2005 | Rating: 0 | Author: Ben Mann | Size: 1786 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
137. | Paragon Hard Disk Manager 5.5 (paragon.ru) | ||
in the case of hard disk failure or system crash. Create special encrypted drive to store sensitive data on it; any application and even operating system have transparent access to this encrypted drive, but only if you have supplied correct password or key. You can completely erase deleted files | |||
Updated: 8, 2004 | Rating: 0 | Size: 8045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
138. | PDF-Security 1.0 (cadkas.de) | ||
PDF files against unauthorized access and encrypt them! The program limits the access to PDF documents. You decide if a PDF file can be printed in th Acrobat Reader or if somebody may copy or edit the text. You can deside if the user have to enter a password in order to view the file. It is also possible to decrypt PDF files. If they are protected by a password you have to know the | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian A.D. Kassler | Size: 387 kb | Demo Go to category: System Utilities > Other Similar programs | |||
139. | PEERNET File Conversion Center 2.6 (peernet.com) | ||
The File Conversion Center is a Microsoft Windows application that enables you to quickly and easily convert office documents, spreadsheets, web pages, PostScript files, and more into image or PDF files. You can also use File Conversion Center to convert files from one image type to another. These files can | |||
Updated: 9, 2005 | Rating: 0 | Author: PEERNET Support | Size: 9364 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
140. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently altered. PlexCrypt can create self-decrypting files, which can be transfered to other users and can be | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
141. | R-Undelete 2.0 (r-tt.com) | ||
failure; removed when Recycle Bin has been emptied. Recovering encrypted files, compressed files and alternative data streams. R-Undelete recognizes localized names and supports Dynamic Disks. New R-Undelete 2.0 is integrated into Windows Explorer shell and all undelete and file recovery functions are accessible from Windows Explorer. R-Undelete Demo version can be | |||
Updated: 9, 2005 | Rating: 477 | Size: 942 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
142. | SignStation 2.00 (com-and.com) | ||
signature to a file, verify the digital signature on a signed file, encrypt and decrypt files and manage certificates, among other functionalities like email, hash, and file management. Using a two-ways approach interface, SignStation take care of office productivity with its classic mode -based on | |||
Updated: 8, 2004 | Rating: 0 | Size: 5956 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
143. | Private Encryptor 6.2 (tropsoft.com) | ||
extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an encrypted email message does not have to buy the | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
144. | Surf Spy 2.10 (bysoft.se) | ||
of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible with | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
145. | Texturizer 1.92 (texturizer.net) | ||
Texturizer is a powerful, yet simple to use text editor for anyone who finds Notepad too simple and other text editors to complicated. It includes lots of time-saving features, such as Macro support (including saving, loading and editing of saved macro files), fully configurable Syntax Highlighting, including | |||
Updated: 9, 2005 | Rating: 42 | Author: David Tenser | Size: 3591 kb | Demo Go to category: System Utilities > Other Similar programs | |||
146. | WinClean 2.0 (batl.com) | ||
WinClean is a smart power application that gives windows a power boost. WinClean gives its users the power and easy to control windows. WinClean Provides file cleanup(include cookies, History, index.dat etc.), Registry scan, Auto start control and Shortcut check. It is recommended to regularly use it | |||
Updated: 9, 2005 | Rating: 0 | Author: Amos Fine | Size: 1183 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
147. | Winvestigator 2.4 (tropsoft.com) | ||
keystrokes, URL's, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator's settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface and thorough help make this powerful tool simple to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 795 kb | Demo Go to category: System Utilities > Other Similar programs | |||
148. | AutoSpell Dictionary Expander 6.0 (spellchecker.com) | ||
Enhance the spell-checking capabilities of Microsoft Office by adding multiple languages, plus medical and legal terms. AutoSpell™ Dictionary Expander integrates into Office products such as Word, Excel, Front Page, Outlook, Works, Outlook Express, Mail and News, Exchange, and Windows Messaging so well that | |||
Updated: 8, 2004 | Rating: 144 | Author: Jing Zhao | Size: 241664 kb | Demo Go to category: System Utilities > Other Similar programs | |||
149. | Xceed SmartUI for .NET 3.3 (xceedsoft.com) | ||
Xceed SmartUI for .NET provides the visual controls you need to create user-friendly, state-of-the-art Windows Forms applications quickly and easily. It supports real themed or simulated Windows XP, Office XP, Office 2003 and classic Windows styles. Xceed SmartUI for .NET offers an incredible amount of | |||
Updated: 9, 2005 | Rating: 39 | Author: Charles Duncan | Size: 36259 kb | Demo Go to category: System Utilities > Other Similar programs | |||
150. | Xceed Zip Compression Library 6.0 (xceedsoft.com) | ||
This high-performance Zip and Unzip data compression library lets your applications create and manipulate 100% PKZip-compatible Zip files as well as compress/uncompress data directly in memory. It's designed to offer the ultimate in flexibility while being the easiest to use product of its kind. It includes a | |||
Updated: 9, 2005 | Rating: 272 | Author: Charles Duncan | Size: 36259 kb | Demo Go to category: Development > Active X Similar programs | |||
|
Home > Encrypting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|