|
||||||
|
||
|
Home > Encrypting software |
Related keywords: file encrypting |
|
|
21. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
ABC Amber PowerPoint Converter is an advanced tool which converts your PowerPoint presentations to any document format (PDF, CHM, HTML, RTF, HLP, DOC, MCW, WPS, SAM, RFT, WS4, WS7, WRI, etc.) easily and quickly. The software supports a batch conversion, a command line and more than 50 languages. Important Supports a batch conversion, a command line and more than 50 languages | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
22. | ABC Amber QuattroPro Converter 2.02 (thebeatlesforever.com) | ||
ABC Amber QuattroPro Converter is an advanced utility which helps you convert your WQ1 (Corel QuattroPro) files to any format you wish (XLS, DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 | |||
Updated: 3, 2006 | Rating: 0 | Author: ProcessText Group | Size: 1180 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
23. | ABC Amber Text Converter 3.07 (thebeatlesforever.com) | ||
We all try our best to keep pace with time. The times take us to convert our business content to Adobe PDF. That's why we developed ABC Amber Text Converter - to help ourselves and to help you. Key features of conversion to PDF using ABC Amber Text Converter program include 40/128 bits PDF encryption | |||
Updated: 3, 2006 | Rating: 124 | Author: ProcessText Group | Size: 1355 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
24. | Any Password 1.44 (romanlab.com) | ||
information in a tree form. The program saves this information in encrypted files which can be protected by a password. So, the only thing you need to remember is the password for the file. Any Password can also generate random passwords with specified parameters (length, used characters, etc.). You can find any stored information using the incremental search feature. Any Password is | |||
Updated: 9, 2005 | Rating: 163 | Author: Roman Nikolaev | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
25. | BB DOALL 6.51 (bbsys.com) | ||
fields, concatenate data, etc. -Sensitive data tables (.dbf) can be encrypted on the hard drive, and de-crypted "on the fly" when Doall is started. In addition, there is an option to encrypt other files using Windows Capicom (Crypto API). -Change color/font schemes in any column to highlight specific data. Dynamic font re-sizing in grid for visually handicapped. Partition | |||
Updated: 2, 2006 | Rating: 28 | Author: Bob Bolda | Size: 8789 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
26. | BB EAP 5.38 (bbsys.com) | ||
Client management/Case management - Document, track, follow-up and record actions taken in Employee Assistance Programs. Easier to use than paper case management, with additional reporting and analysis capabilities. Record client demographics, Unlimited notes, Initial and Final assessments (Primary and | |||
Updated: 2, 2006 | Rating: 0 | Author: Bob Bolda | Size: 11718 kb | Shareware Go to category: Business > Other Similar programs | |||
27. | DriveCrypt 3.03a (drivecrypt.com) | ||
When data is written back to the hard disk, it is automatically re-encrypted. The encryption/ decryption process is completely transparent to the user or any application program -the data is caught "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
29. | Secure Notes Organizer 3.0.8 (secureaction.com) | ||
Secure Notes Organizer is an information organizer that allows you to build an outline of your information any way you like. You can use it to store any kind of hierarchical information, such as a to-do list, project notes, personal contacts, and so on. It includes powerful hierarchical diary planner and can | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1500 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
30. | Style Workshop 1.0 (styleworkshop.com) | ||
Think you don't have the time or talent to make your presentations and multimedia projects look as outstanding as they should? Think again! With Style Workshop, you've got everything you need to create amazing reports and presentations that really stand out and impress your audience. Each value-priced volume | |||
Updated: 9, 2005 | Rating: 0 | Author: Indigo Rose | Size: 8579 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > Encrypting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|