|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
201. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
save images to BMP, JPG, GIF formats with several options, saves text content to file, send text content to keyboard to emulate keystrokes (i.e.: saves time when have to enter long codes, etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
202. | Note Wonder 1.51 (forty.com) | ||
Wonder is the world's friendliest PC notes organizer, combining the power of a personal information manager with the ease-of-use of Notepad. It provides an easily accessible place to quickly jot down, store, and retrieve all those little tidbits of information you hate to lose, but never know where to keep. Note Wonder employs a simple intuitive interface, offering the | |||
Updated: 9, 2005 | Rating: 0 | Author: Lee Rautenberg | Size: 1164 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
203. | P.C. Police 2004 (pc-police.nethint.com) | ||
on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police elegantly tracks all keyboard | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
204. | Pad 4.00 (hds-pad.com) | ||
is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular expressions, a block (column) selection mode, line bookmarks and line | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
205. | PageFocus Pro 6.14 (promaxum.com) | ||
It can be used for creating drawing, brochure, graph, pattern, image file, hypertext, PDF files and form. It can also be used to create and manage databases of number, text, drawing, and image. The underlying WYSIWYG graphical user interface lets you create form-based (and database) | |||
Updated: 9, 2005 | Rating: 0 | Author: Creative Stars, Inc. | Size: 6496 kb | Shareware Go to category: Business > Other Similar programs | |||
206. | Painless Schedule 2.0 (uil.net) | ||
one mouse click! - Export your task list to Excel, HTML, XML or text. - Multi-user capabilities mean that your entire team can work together! - Complete help file and PDF manual included! Painless Schedule is a powerful, intuitive program for tracking software schedules. It allows developers | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Sullivan | Size: 4133 kb | Shareware Go to category: Development > Other Similar programs | |||
207. | Parse-O-Matic Power Tool 4.03.00 (members.aol.com) | ||
your file in the wrong format? Don't rekey or delete it - fix it! You can reformat your valuable data with the Parse-O-Matic Power Tool - a programmable file converter. Sample applications: Edit a text file automatically. Copy good data; repair or remove bad data. Restructure a | |||
Updated: 9, 2005 | Rating: 0 | Author: Timothy Canada | Size: 1286 kb | Shareware Similar programs | |||
208. | PassMonster 2.25 (kamatoz.com) | ||
database once and he will know all of your passwords! You can try encrypting the text file (database) containing your passwords. But it takes fairly large amount of time to decrypt it for each use and then encrypt it back again manually! So is this the end? Is there any solution to | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 678 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
209. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
210. | Password Creator Professional 5.41 (hexacom.cc) | ||
generation is extremely fast. Password lists may be saved as encrypted files (256bit TwoFish algorithm.) Password lists can also be exported as plain text, HTML, XML, and others! Full Windows clipboard support too! Password Creator Professional is an extremely valuable tool for anyone who has to assign or generate large numbers of RANDOM passwords. Password Creator | |||
Updated: 9, 2005 | Rating: 82 | Author: Michael Koszenski | Size: 5431 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
211. | Password Saver 2.2.7 (pwdsaver.com) | ||
Office-like scheme where each database is stored in a single file. These files are compact and portable - they can be stored on hard drives, USB flash disks, floppy disks, CD-RW disks, ZIP drives, or any other type of fixed or removable media. You can take your passwords with you wherever you go! Also, since you no longer need to remember your passwords, you can | |||
Updated: 2, 2006 | Rating: 16 | Author: Eugene Olevsky | Size: 2188 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
212. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
213. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
214. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
215. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
216. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
217. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
218. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
219. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
220. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
221. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
222. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
223. | PDF Password Remover 2.5 (verypdf.com) | ||
Password Remover can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g | |||
Updated: 2, 2006 | Rating: 6506 | Author: verypdf verypdf | Size: 521 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
224. | PDF Ripper 2.01 (pdfpdf.com) | ||
Ripper is efficient software to extract image, text, chart, formula, vector drawings from Adobe PDF files. With this program, you can easily collect materials from existing PDF documents, and save them into HTML format, RTF format and plain text format. If you are looking for a converter program to convert PDF to Word, PDF to RTF, PDF to HTML, PDF to Text with a | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Edwards | Size: 969 kb | Shareware Go to category: Business > Other Similar programs | |||
225. | Photo Pos Pro image editor 1.24 (photopos.com) | ||
to work intuitively. The software features support for many image file types (including transparent GIF files); single- and multiple-image printing, and for scanners and digital cameras; tabbed workspace; advanced image-enhancing and editing tools; computer graphics tools; rich-text tools; special effects; photo frames; layers and masks; color transitions; patterns and | |||
Updated: 2, 2006 | Rating: 129 | Author: Shai Harel | Size: 24333 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
226. | PhotoGift 1.2 (serenesoft.com) | ||
from microphone. Add photos from JPEG, TIFF, BMP, PNG, GIF files, from digital cameras, scanners, TWAIN-devices. Edit, rotate, mirror your photos, adjust brightness, contrast, colors; apply large number of graphic filters. Your computer can speak photo comments using text-to-speech engines installed in your system. Create HTML photo galleries with sound, send | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Birukov | Size: 2152 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
227. | PhotoThumb 3.0 (photothumb.com) | ||
image viewer, EXIF support, FTP uploading, CSS support, overlay text, sharpening, slideshow, batch renaming, file encryption, a familiar Explorer-like interface and lossless rotation of JPEG images, PhotoThumb is a handy tool for image collectors and digital camera owners. Digital photography is becoming increasingly popular. It has never been easier, cheaper or more fun to | |||
Updated: 3, 2005 | Rating: 0 | Author: Jarle Aasland | Size: 1606 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
228. | PIMEX 1.09 (pimexonline.com) | ||
labels, envelopes, or letters. Other features include full text search, multiple notebooks and diaries, custom reports, mail merge, mass-mail personalized letters using Microsoft Word, WordPerfect or Lotus Word Pro, POSTNET bar codes, clip art images, mass e-mail, alarms, data import/export, holiday mailing lists, birthday reminders, phone dialing, password protection, data | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Smirnov | Size: 15000 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
229. | Polymap 2.5.0 (polymap.com) | ||
use the import feature to bring in data from external spreadsheets, text, or database files. The Map Presentation Wizard gives you a step-by-step process to customize your map and the map's legend. Any data in a spreadsheet column may be utilized for labeling. You may use a set of geographic layers in different formats (state and county boundaries, five-digit ZIP codes | |||
Updated: 9, 2005 | Rating: 42 | Author: Thomas Erbacher | Size: 15915 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
230. | PopMessenger 1.61 (leadmind.com) | ||
as a LAN-based instant messaging system allowing for immediate rich text message and files delivery over corporate network. You can communicate with all the users on the network or choose specific user group (e.g. Level 2 managers) or send private messages. Whether you chat on public or private | |||
Updated: 9, 2005 | Rating: 0 | Author: LeadMind Development | Size: 1606 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
231. | PowerGREP 3.2.2 (jgsoft.com) | ||
find information in files and folders across your computer or network, even if you do not know in advance exactly what you are looking for. PowerGREP's rich Perl-compatible regular expression support allows you to search for virtually anything by specifying the form of what you want, and let PowerGREP find the actual text matching that form. PowerGREP's | |||
Updated: 2, 2006 | Rating: 16 | Author: Jan Goyvaerts | Size: 3705 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
232. | Printfil 4.3 (guolo.com) | ||
applications. You can set your application to print to an ascii file, or you can have Printfil capturing a parallel port output, automatically redirecting your print jobs to any printer, even if a printer is phisically connected to the captured port. In addition, it will allows you to: - preview printing - include logos or background images stored in separate files | |||
Updated: 2, 2006 | Rating: 1170 | Author: Davide Guolo | Size: 1007 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
233. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer - right from your Windows Explorer! Passwords manager that stores all your sensitive data in a single, hard-encrypted file - easy-to-use, easy-to-move | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
234. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer - right from your Windows Explorer! Passwords manager that stores all your sensitive data in a single, hard-encrypted file - easy-to-use, easy-to-move | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
235. | ProBot 2.5.0 (nethunter.cc) | ||
maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and configure the software | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | Random Password Generator-PRO 12.1 (hirtlesoftware.com) | ||
Once the passwords have been created you may then save them to a text, MS-Access, HTML and/or CSV file. CSV may be used with spreadsheet applications such as MS-Excel. A built-in MS-Access editor is provided. Therefore, MS-Access itself is not needed to create, view or edit these files. A dictionary check option will check the passwords against a 260,000 word english | |||
Updated: 9, 2005 | Rating: 79 | Author: Tim Hirtle | Size: 7568 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
238. | Real Estate Calculator Suite 4.3 (wheatworks.com) | ||
estate calculators, Real Estate Calculator Suite includes sample text for closing credit accounts, a Documentation List to help you gather your paperwork, a Movers To Do List, a Home Inspection form to help you review potential homes, a Fraction/Decimal Conversion Chart and useful tips for home buyers and sellers. Real Estate Calculator Suite includes 2 Quick Calculators, a popup | |||
Updated: 2, 2006 | Rating: 39 | Author: Rick Wheat | Size: 1823 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
239. | RedBox Organizer 6.0 (inklineglobal.com) | ||
RedBox Organizer is an award winning, ZDNet and PC World Top Pick that lets you take control of your life with its complete and simple-to-use tools. With it, you can now manage daily activities more efficiently, and have the flexibility and ease to plan, organize and schedule virtually anything. Use the | |||
Updated: 2, 2006 | Rating: 661 | Author: Bok Nan Lo | Size: 7916 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
240. | Resource Tuner 1.97 (heaventools.com) | ||
you to customize your favorite programs by modifying the executable file (EXE, DLL, SYS, MSSTYLES, SCR and more) resources. Resource Tuner makes it a snap to replace them with other images, texts and sounds more to your liking. Now supports large Vista icons. Extract images, edit them, and place | |||
Updated: 2, 2006 | Rating: 124 | Author: Yuri Rai | Size: 2012 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
241. | Restorator 2006 (bome.com) | ||
windows resources of applications and application components (PE files such as .exe and .dll; .dcr, .res, .rc resource files ). Restorator allows modifying, adding, and removing resources such as text, images, icons, sounds, videos, dialogs and menus in almost all applications. Restorator is used for translation, customization, design improvement and development | |||
Updated: 2, 2006 | Rating: 3199 | Author: Florian Bomers | Size: 3176 kb | Shareware Go to category: Development > Other Similar programs | |||
242. | RFFlow Professional Flowcharting 5.02 (rff.com) | ||
charts, and diagrams for education, business, and industry. It's easy to draw and edit charts with RFFlow. Simply drag a shape from a stencil to your chart. Shapes in RFFlow will automatically size around your text. Right-click on a shape or line to edit its properties. RFFlow includes over 1600 shapes that are carefully organized into stencils designed for specific | |||
Updated: 9, 2005 | Rating: 81 | Author: Roger Faaborg | Size: 2862 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
243. | Right Web Monitor 2.0 (right-soft.com) | ||
The program can monitor any web pages (static and dynamical), text and binary files which can be accessed through the HTTP, HTTPS and FTP protocols. The program is able to monitor incoming mail in POP3 mailboxes either. Right Web Monitor constantly polls the specified internet resources and notifies you by adjustable alert methods when any changes occur. Among these there | |||
Updated: 2, 2006 | Rating: 0 | Author: Victor Sklyarov | Size: 3319 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
244. | SafeBox Industry 1.0 (aidsoft.com) | ||
Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting (Auto Executable), Interface Customizable for Self Extraction, Add Signature inside | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
245. | Schematic 3.17 (hypergraphics.co.uk) | ||
is a diagramming tool that allows you to combine text, pictures, shapes and connectors to create clear and informative diagrams. Schematic has a clean and easy to use GUI, including a tree-view for easy object navigation, an object preview window and a zoom/pan window. Schematic also features full undo/redo functionality. One of Schematic's powerful drawing features is | |||
Updated: 9, 2005 | Rating: 1001 | Author: Robert Oldaker | Size: 3614 kb | Shareware Go to category: Audio & Multimedia > Presentation Tools Similar programs | |||
246. | Secure Network Chat 2.6.43 (secureaction.com) | ||
Network Chat (SNC) - is a text chat able to solve all the problems in communication between your company staff members cardinally. SNC is especially designed to work with medium and large local area networks, but it is also convenient for small local networks consisting of two and up to several dozens of computers. Due to SNC, your employees will be able to exchange text | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, Ltd | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
247. | Secure Network Chat 2.10.15 (networkmessengers.com) | ||
Network Chat (SNC) - is a text chat able to solve all the problems in communication between your company staff members cardinally. SNC is especially designed to work with medium and large local area networks, but it is also convenient for small local networks consisting of two and up to several dozens of computers. Due to SNC, your employees will be able to exchange text | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 3340 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
248. | Secure Network Messenger 1.5.5 (networkmessengers.com) | ||
network communication program able to send and receive messages and files from one computer to another without using dedicated servers. All communication is highly secure! All traffic between copies of SNM is encrypted by strong encryption algorithms. The interface is designed to be very easy to use. Anyone familiar with programs (such as AOL Messenger, IRC and ICQ) will | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 598 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
249. | Secure Password Store 0.91 (lmphotonics.com) | ||
hidden from prying eyes. Features: - Multiple databases - Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
250. | Secure Password Store 0.81 (lmphotonics.com) | ||
and keeps this information hidden from prying eyes. Features: - Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 607 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|