|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
401. | Interlex 2.4 (go-nativ.co.uk) | ||
evaluation of alternative responses; informative feedback using text, colour and sound; powerful editor with Undo, Sort, Find and Print commands; automatic keyboard and font selection; selection of ready-to-use vocabulary files for French, German, Italian, Russian and Spanish; wide range of user preference options; context-sensitive Help and daily tips. Interlex provides a | |||
Updated: 3, 2005 | Rating: 16 | Author: Andrew Quilley | Size: 1304 kb | Freeware Go to category: Education > Languages Similar programs | |||
402. | SQLBoss Developer (Windows) 1.6 (sqlboss.com) | ||
web-enabled databases. More features: supports 8 import/export file formats, dynamically generated data entry layouts, HTML WYSIWYG Editor, database backup server, mySQL Admin. Fastest SQL tool on the market. SQLBoss Developer - The ultimate Database & Content Management Tool for many SQL Databases like mySQL, PostgreSQL, FrontBase, OpenBase, ODBC and many more. Included beta | |||
Updated: 3, 2005 | Rating: 0 | Author: Reinhard R. Blumauer | Size: 6309 kb | Shareware Go to category: Development > Other Similar programs | |||
403. | SourceTree Analyzer 2002 v2.0 (nitrotech.co.uk) | ||
servers in sync. Reports can be generated in either HTML, XML or Text formats to be saved or emailed directly from the application. SourceTree Analyzer can now create compressed distributable executables or 'Updaters' which, when run, update the old source tree to the new one. Perfect for | |||
Updated: 3, 2005 | Rating: 0 | Size: 188 kb | Shareware Go to category: Development > Other Similar programs | |||
404. | EMailing List Pro 3.8 (petor.lab6.com) | ||
search, select, etc. EMailing List Pro can save contact lists to files, and export and import Text and CSV files. It has many options for filtering contacts, e.g. prevent duplicates being added, and prevent contacts with invalid email addresses being added. Has support for Mail Merge, HTML format emails, File attachments, and Advanced scheduling. Simple EMailing | |||
Updated: 3, 2005 | Rating: 0 | Author: Peter Pearson | Size: 485 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
405. | Netemail pack 2.10 (worldcatcher.com) | ||
pack is software designed to Extract e-mail addresses from local text files, web sites , search engines. Just type one or more keywords, Email catcher & sender will query major Search engines: Yahoo, Google, AllTheWeb, Aol, Msn, Looksmart, Dmoz etc and extract e-mail addresses matching your query.By using powerful e-mail and url filters, you can extract only the e-mail | |||
Updated: 3, 2005 | Rating: 42 | Author: liu lijuan | Size: 1018 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
406. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
it is transferred the external module; · It is possible to send the text message to the client; · The program can remind the client how many at him remained minutes up to the end of work (how many he has fulfilled); · Password protection of reports of the program with different levels of access; I hope it that you searched. The program for automation of work of computer clubs | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
407. | Brilliant Database Professional 3.6 (brilliantdatabase.com) | ||
the element set and put it into the form. Here you can use lists, text, image or password storing fields, buttons and a lot more. You can modify such properties as color, font, location, style or type, according to your requirements. 2. The Report Style Editor allows creating any forms of visual representation when making a printout, such as Catalogs, Reports, Envelopes, Labels | |||
Updated: 3, 2005 | Rating: 42 | Author: Mikhail Lishin | Size: 4260 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
408. | SQLWays 3.7 (ispirer.com) | ||
and transfers data including LOB (images, binary data, formatted text) and Spatial (GIS) data. SQLWays converts tables (default values, null and identity properties, check and unique constraints, primary and foreign keys, comments), indexes, views, triggers, stored procedures and functions. Allows you to specify global data type mapping for all tables and local data type mapping for | |||
Updated: 3, 2005 | Rating: 120 | Author: Dmitry Tolpeko | Size: 3650 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
409. | DBF Viewer PRO 4.0.1 (legendsoft.com) | ||
Viewer Pro is a viewer and toolbox for DBF database files. Designed primarily as a tool for Delphi developers who use Vista Software's Apollo database engine, this toolkit will also appeal to any programmer who wants on-the-fly access to DBFs. DBF Viewer Pro not only lets you view, print, and modify the structure and contents of DBFs, but it lets you create them from scratch | |||
Updated: 3, 2005 | Rating: 203 | Author: Kevin Boswell | Size: 4517 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
410. | P.C. Police 2004 (pc-police.nethint.com) | ||
on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more. P.C. Police elegantly tracks all keyboard | |||
Updated: 3, 2005 | Rating: 0 | Author: Roumen Petrov | Size: 2520 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
411. | ArcSoft PhotoStudio 5 (arcsoft.com) | ||
allows multiple images to be "stacked" and stored in one single file. By layering images, you can effectively blend several images together, hide or display each separate layer, modify groups of layers without affecting those that do not need editing, and create multiple, fully editable text strings. Layers can even be modified with a "soft edge" or drop shadow. Broad range | |||
Updated: 3, 2005 | Rating: 2595 | Author: Don David | Size: 212992 kb | Demo Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
412. | EzBrowser 3.0 (ietoolbox.com) | ||
tabbed browser, Passwords & Notes keeper, Form Filler, File Viewer, Favorites Viewer/Searcher, and QuickLinks toolbar. EzBrowser features: - Well-behaved: NO ADWARE, NO SPYWARE - Unobtrusive: no annoying "in your face" popup windows - Secure: your passwords and notes are encrypted with strong encryption Now your passwords will always be "right there" for you in | |||
Updated: 3, 2005 | Rating: 0 | Author: Brett Goodman | Size: 2045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
413. | PrivacyAssistant 1.8 (productsfoundry.com) | ||
data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer - right from your Windows Explorer! Passwords manager that stores all your sensitive data in a single, hard-encrypted file - easy-to-use, easy-to-move | |||
Updated: 8, 2004 | Rating: 42 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
414. | PrivacyAssistant Professional 1.8 (productsfoundry.com) | ||
data is safe! PrivacyAssistant Professional also lets you crypt any file in your computer - right from your Windows Explorer! Passwords manager that stores all your sensitive data in a single, hard-encrypted file - easy-to-use, easy-to-move | |||
Updated: 8, 2004 | Rating: 0 | Author: Candin Jurca | Size: 1940 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
415. | urlcool 6.0 (urlcool.com) | ||
drag, validation and serch capabilities. It can export backup in text, HTML, xml and database files formats into your computer and server. Urlcool v6.0 is a very useful bookmark tool. Fill form function, images drag download, encryption function, embeded IE browser, IE toolbar. Note, validation, search capabilities. It can export backup in text, HTML, xml and database | |||
Updated: 8, 2004 | Rating: 42 | Author: hui chen | Size: 2437 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
416. | Advanced HTMLCoder 3.0 (raysion.com) | ||
interface. If your page is intended for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
417. | hCrypt 3.0 (raysion.com) | ||
is a friendly and easy-to-use program that helps you encrypt and password-protect Web pages that are not intended for public access. The program features clear wizard-style interface that enables you to process multiple files at a time and configure various advanced protection settings in a few simple steps. For strong protection you can use powerful Blowfish (448 bit | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
418. | Ghost Keylogger 3.80 (keylogger.net) | ||
easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
419. | Quemix Utilities 2.0c (quemix.com) | ||
system from slowing down with this valuable tool. Protector Encrypt and protect your important information with this program. Hide your information from intruders. Nobody except you will be able to visualize your documents. Protect any type of file, texts, spreadsheets, databases, photographs, Quemix Utilities helps keep your computer running at top efficiency and | |||
Updated: 8, 2004 | Rating: 42 | Size: 4667 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
420. | SupportMonkey 2002 v1.0 (nitrotech.co.uk) | ||
the information and return it to you via email in either XML or Text format. Written entirely in 32bit assembly language in order to achieve maximum speed and compactness, a fully featured Monkey executable is no larger than 22kb, compressible to just over 10kb, small enough to be downloaded in only a few seconds on even the slowest dialup connection. A fully featured plugin | |||
Updated: 8, 2004 | Rating: 0 | Size: 358 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
421. | InfoLock 1.51 (whimsysoft.com) | ||
1.5 InfoLock is a software that can help you to encrypt your information. InfoLock can encrypt file or text(which entered by yourself or copy from clipboard). InfoLock use some very safe arithmetic to encrypt your information.Such as DES, which was put out by IBM and NSA. And InfoLock use special arithmetic to encrypt your | |||
Updated: 8, 2004 | Rating: 101 | Author: Wei Zhang | Size: 692 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
422. | ShyFile - 6144bit Email and File Encryption 5.13 (shyfile.de) | ||
generates highly secured HTML files carrying your encoded text or encoded Webpage to be attached to an email or to be uploaded to your website. Any encrypted plain text or HTML file are self-decrypting and therefore can be decoded using an Internet browser alone. Any encrypted binary file, i.e. a file containing pictures, MS Word | |||
Updated: 8, 2004 | Rating: 0 | Author: Dr. Bootz GmbH | Shareware Go to category: Security & Privacy > Other Similar programs | |||
423. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Lite supports | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
424. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for the user, on the level of OS kernel. PC Acme Standard | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|