|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
251. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple files and securely shred files | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
252. | MultiBatcher 2.22 (micro-sys.dk) | ||
a batch that optimizes space utilization in a website, renames files accordingly to a set of rules, replaces text strings in others, and uploads the whole website to multiple ftp servers. All in one automated batch and processed without requiring any user intervention. Included is also a plugin that can call other executables with parameters. This can be useful in situations | |||
Updated: 2, 2006 | Rating: 0 | Author: Thomas Schulz | Size: 1176 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
253. | MusicEase Traditional Songbook for Children and Adults 1.00 (musicease.com) | ||
verses appearing after the song. You can also save the verses as a text file and the melody as a MIDI file for use in other programs. Both 4-shape and 7-shape shaped note systems are supported. Tablature can be for guitar, banjo, mandolin or customized for any stringed instrument. Songs can be loaded using titles or first lines. Songs include traditional | |||
Updated: 9, 2005 | Rating: 0 | Author: Gary Rader | Size: 2160 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
254. | MusShell 3.0.1 (musshell.com) | ||
your music? Audio CDs, MP3 files, WAV files, MIDI files? A lot of everything? MusShell will help you organize it all, together with pictures and text. It's simple, and you don't need to re-burn CDs unless you want to. - “organize it all” - what does that mean? - It means: Enhance audio CDs or music files with shells of information and | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Lipkin | Size: 9104 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
255. | My eDiary 1.62 (yaleisoft.com) | ||
diary, or other personal or business memo. Entries are stored in an encrypted file with optional password protection only known by yourself and can contain formatted text, pictures, sounds and even other documents. Entries can be added, deleted, edited, browsed and managed by day, month | |||
Updated: 9, 2005 | Rating: 0 | Author: Yalei zhou | Size: 1860 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
256. | My Little Spy 2.0.4 (wizard-industries.com) | ||
Little Spy is intended for recording a file of everything that is entered from the keyboard. My Little Spy works with out being seen, and can be recalled by a combination of keys. My Little Spy records all email, chats conversations, instant messengers (ICQ, MSN, Yahoo, AIM ...), usernames and | |||
Updated: 3, 2005 | Rating: 42 | Author: Wizard Industries | Size: 850 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
257. | My Notes Center 1.4.3 (mynotescenter.com) | ||
and adding new notes. After a while you simply don’t know which file contains necessary information and how to manage the data stored. My Notes Center is an e-organizer and personal information manager jam-packed with features like an overstuffed sandwich. It stores personal notes, e-mails, web | |||
Updated: 2, 2006 | Rating: 0 | Author: Dmitry Bobrik | Size: 1873 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
258. | My Personal Diary 8.3.1.0 (camdevelopment.com) | ||
private diary, journal or log for personal or business use, but that's not all... Entries are stored in an encrypted file with optional password protection and can contain formatted text, pictures, sounds and even other documents. Entries can be added, deleted, edited, browsed by day, month, year or entry date, searched, printed, imported, exported and merged | |||
Updated: 9, 2005 | Rating: 163 | Author: CAM Development | Size: 1640 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
259. | MyPadlock 1.4 (pages.prodigy.net) | ||
security? Security you can see, security 'you' control. For text communication and file encryption get MyPadLock. Encryption keys are not random - you choose the keys to lock your information and you can change the keys as often as necessary. Keys are not saved in the secured information. If fact, your keys are not on your computer at all. They're in your head or | |||
Updated: 9, 2005 | Rating: 0 | Author: Don Kreuzberg | Size: 3264 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
260. | NeoBook Professional Multimedia 5.0.3 (neosoftware.com) | ||
sales/promotional materials, custom apps, and more. NeoBook's intuitive drag and drop interface makes it easy for anyone to combine text, pictures, sound, video, Flash animation, HTML content, special effects and other elements to produce sophisticated multimedia applications for Windows. Finished publications can be compiled into stand-alone Windows applications (exe) or | |||
Updated: 9, 2005 | Rating: 243 | Author: Dave Riley | Size: 7275 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
261. | Netemail pack 2.10 (worldcatcher.com) | ||
pack is software designed to Extract e-mail addresses from local text files, web sites , search engines. Just type one or more keywords, Email catcher & sender will query major Search engines: Yahoo, Google, AllTheWeb, Aol, Msn, Looksmart, Dmoz etc and extract e-mail addresses matching your query.By using powerful e-mail and url filters, you can extract only the e-mail | |||
Updated: 3, 2005 | Rating: 42 | Author: liu lijuan | Size: 1018 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
262. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
save images to BMP, JPG, GIF formats with several options, saves text content to file, send text content to keyboard to emulate keystrokes (i.e.: saves time when have to enter long codes, etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
263. | Note Wonder 1.51 (forty.com) | ||
Wonder is the world's friendliest PC notes organizer, combining the power of a personal information manager with the ease-of-use of Notepad. It provides an easily accessible place to quickly jot down, store, and retrieve all those little tidbits of information you hate to lose, but never know where to keep. Note Wonder employs a simple intuitive interface, offering the | |||
Updated: 9, 2005 | Rating: 0 | Author: Lee Rautenberg | Size: 1164 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
264. | ONEView 1.0 (gnostice.com) | ||
ONEView supports viewing and printing of HTML, XHTML, RTF, picture files (such as BMP, JPEG, EMF and WMF) and files of popular Delphi™ reporting tools such as RAF (ReportBuilder), QRP (QuickReport), FRP (FastReport), NDR (Rave) and ACE (AceReporter). ONEView supports exporting (or saving) of these files to over 20 formats, including PDF, RTF, HTML, XHTML, EXCEL | |||
Updated: 9, 2005 | Rating: 210 | Author: Girish Patil | Size: 4494 kb | Commercial Go to category: Business > Other Similar programs | |||
265. | Orbital's SQL Decryptor 2.2 (decryptor.orbitaltechnologies.org) | ||
SQL Decryptor is the first product to decrypt SQL triggers, views, user defined functions and stored procedures in an easy to use Enterprise Manager-like graphical interface. It works quickly to decrypt items in Microsoft® SQL Server 6.5, 7.0, 2000 and MSDE. Orbital's SQL Decryptor allows for easy viewing of decrypted code with T-SQL syntax highlighting and multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Orbital Technologies | Size: 684 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
266. | P.C. Police 2004 (pc-police.nethint.com) | ||
on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police elegantly tracks all keyboard | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
267. | Pad 4.00 (hds-pad.com) | ||
is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular expressions, a block (column) selection mode, line bookmarks and line | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
268. | PageFocus Pro 6.14 (promaxum.com) | ||
It can be used for creating drawing, brochure, graph, pattern, image file, hypertext, PDF files and form. It can also be used to create and manage databases of number, text, drawing, and image. The underlying WYSIWYG graphical user interface lets you create form-based (and database) | |||
Updated: 9, 2005 | Rating: 0 | Author: Creative Stars, Inc. | Size: 6496 kb | Shareware Go to category: Business > Other Similar programs | |||
269. | PageFocus Pro 6.71 (pagefocus.com) | ||
It can be used for creating drawing, brochure, graph, image file, hypertext, PDF files and form. It can also be used to create and manage databases of number, text, drawing, and image. The underlying WYSIWYG graphical user interface lets you create form-based (and database) applications with ease. The package supports double-byte languages, including vertical | |||
Updated: 2, 2006 | Rating: 0 | Author: Nungjane Shi | Size: 6685 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
270. | Painless Schedule 2.0 (uil.net) | ||
one mouse click! - Export your task list to Excel, HTML, XML or text. - Multi-user capabilities mean that your entire team can work together! - Complete help file and PDF manual included! Painless Schedule is a powerful, intuitive program for tracking software schedules. It allows developers | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Sullivan | Size: 4133 kb | Shareware Go to category: Development > Other Similar programs | |||
271. | Paragon Last Minute Gebot 1.69 (pad.paragon.ag) | ||
products on this list. Easy administration of the pictures and the text for all stored pages of products. Serial Letter Module: Simplifies the whole correspondence, inquiries, purchase requests and acknowledgements. All important parameters: Bidding start, intervals of the bids, steps, intervals | |||
Updated: 9, 2005 | Rating: 48 | Size: 1894 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
272. | Parse-O-Matic Power Tool 4.03.00 (members.aol.com) | ||
your file in the wrong format? Don't rekey or delete it - fix it! You can reformat your valuable data with the Parse-O-Matic Power Tool - a programmable file converter. Sample applications: Edit a text file automatically. Copy good data; repair or remove bad data. Restructure a | |||
Updated: 9, 2005 | Rating: 0 | Author: Timothy Canada | Size: 1286 kb | Shareware Similar programs | |||
273. | PassMonster 2.25 (kamatoz.com) | ||
database once and he will know all of your passwords! You can try encrypting the text file (database) containing your passwords. But it takes fairly large amount of time to decrypt it for each use and then encrypt it back again manually! So is this the end? Is there any solution to | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 678 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
274. | Password Agent Lite 2.3.1 (moonsoftware.com) | ||
similar to Windows Explorer. Other features include unlimited-length text fields, password generator, sorting, printing, import/export, 256-bit U.S. government approved encryption, auto-lock & auto-close features for enhanced security, drag'n'drop, automatic backup, file history etc. Password Agent is resource friendly and efficient, its database files are very | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahto Tanner | Size: 1305 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
275. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
276. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 82 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
277. | Password Saver 2.2.7 (pwdsaver.com) | ||
Office-like scheme where each database is stored in a single file. These files are compact and portable - they can be stored on hard drives, USB flash disks, floppy disks, CD-RW disks, ZIP drives, or any other type of fixed or removable media. You can take your passwords with you wherever you go! Also, since you no longer need to remember your passwords, you can | |||
Updated: 2, 2006 | Rating: 16 | Author: Eugene Olevsky | Size: 2188 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
278. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
279. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
280. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
281. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected while monitoring are saved to the encrypted log file located on the user's machine. The monitoring program works | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
282. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Lite supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
283. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
284. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
285. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
286. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
287. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
288. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
289. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
290. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
291. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
292. | PDF 2 HTML 1.4 (cadkas.de) | ||
can't simply open PDF files in Word and edit them... Wrong! PDF 2 HTML can open PDF files. It recognizes the texts, the layout and many graphics. Then you can save this as HTML, RTF or TXT file. You can open these files in Word or Frontpage etc. So you are ready to upload your documents to the internet. And anybody can view HTML files instandly | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian A.D. Kassler | Size: 771 kb | Demo Go to category: Business > Other Similar programs | |||
293. | PDF Creator Pilot 2.70 (colorpilot.com) | ||
library for creating PDF files from Visual Basic, ASP, Delphi, Visual C++ and VBScript. PDF Creator Pilot includes detailed documentation together with the step-by-step tutorials. Key features: Extended set of methods and properties for easy PDF-file generation; Ability to create | |||
Updated: 2, 2006 | Rating: 16 | Author: Rais Garifoulline | Size: 1963 kb | Demo Go to category: Development > Active X Similar programs | |||
294. | PDF Editor 2.4 (cadkas.de) | ||
PDF files now! You can write annotations, add text, change the text (correct spelling errors) or delete words completely. Now you can also add or delete pictures and vector graphics and add text in any font you want! With the 11 new tools you can move and zoom the text and pictures and you can edit text blocks, insert empty lines or change the line | |||
Updated: 2, 2006 | Rating: 42 | Author: Christian A.D. Kassler | Size: 1875 kb | Demo Go to category: Business > Other Similar programs | |||
295. | PDF Password Remover 2.5 (verypdf.com) | ||
Password Remover can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
296. | PDF Ripper 2.01 (pdfpdf.com) | ||
Ripper is efficient software to extract image, text, chart, formula, vector drawings from Adobe PDF files. With this program, you can easily collect materials from existing PDF documents, and save them into HTML format, RTF format and plain text format. If you are looking for a converter program to convert PDF to Word, PDF to RTF, PDF to HTML, PDF to Text with a | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Edwards | Size: 969 kb | Shareware Go to category: Business > Other Similar programs | |||
297. | PDF-Analyzer 2.5 (is-soft.de) | ||
PDF-Analyzer is an informationstool specially for pdf files. You can use it from the explorer contextmenu and "stand alone" as a "PDF Browser", too. You can see all attributes/properties of a selected pdf file. That reaches from the document informations e.g. titles, topic affiliation and page layout or also pagecount of a file over security-relevant things such as data | |||
Updated: 9, 2005 | Rating: 0 | Author: Ingo Schmoekel | Size: 1076 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
298. | PDF-Security 1.0 (cadkas.de) | ||
PDF files against unauthorized access and encrypt them! The program limits the access to PDF documents. You decide if a PDF file can be printed in th Acrobat Reader or if somebody may copy or edit the text. You can deside if the user have to enter a password in order to view the file. It is also possible to decrypt PDF files. If they are protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian A.D. Kassler | Size: 387 kb | Demo Go to category: System Utilities > Other Similar programs | |||
299. | PDF-XChange Pro 3.1065b (docu-track.com) | ||
(includes MAPI and SMTP support) Job Management - Batch to temp file(s) before conversion to PDF. Mount multiple source pages to a single PDF page (max 16 pages to 1 PDF page) Acrobat 6 Format Support (1.3.1.4,1.5 PDF Format Support) Set PDF File - page opening | |||
Updated: 9, 2005 | Rating: 16 | Author: John Verbeeten | Size: 6342 kb | Commercial Go to category: Business > Other Similar programs | |||
300. | PDF-XChange Pro 3.50961 (docu-track.co.uk) | ||
(includes MAPI and SMTP support) Job Management - Batch to temp file(s) before conversion to PDF. Mount multiple source pages to a single PDF page (max 16 pages to 1 PDF page) Acrobat 6 Format Support (1.3.1.4,1.5 PDF Format Support) Set PDF File - page opening characteristics. Enhanced down sampling options for Internet PDF downloading. Multiple Bookmarks per page max | |||
Updated: 2, 2006 | Rating: 65 | Author: John Verbeeten | Size: 7643 kb | Commercial Go to category: Business > Other Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|