|
||||||
|
||
|
Home > Secret key encryption software |
Related keywords: encryption, secret, file encryption, Encryption, encryption software, encryption system, email encryption, data encryption, hard disk encryption, ENCRYPTION |
|
|
21. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
22. | TK8 Safe 2.5 (tk8.com) | ||
using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not only stores your information, but helps you to use it. A fast and easy-to-use | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
23. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | Winvestigator 2.4 (tropsoft.com) | ||
and runs undetectable in Windows capturing keystrokes, URL's, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator's settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface and thorough | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 795 kb | Demo Go to category: System Utilities > Other Similar programs | |||
25. | Plan4ME 4.54.17 (ByronSoftware.org.uk) | ||
send to your document, its that easy and has been accepted by school's inspectorate. All those cross curicular links plus differentiation and expected outcomes, of course you can edit, change or just type in your own plans. Schemes include all those from DfES and/or QCA, includes framework for | |||
Updated: 9, 2005 | Rating: 16 | Author: Neil Thompson | Size: 19295 kb | Shareware Go to category: Education > Teaching & Training Tools Similar programs | |||
26. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files. For | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
27. | CryptIt 1.301 (SinnerComputing.com) | ||
rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | Safe Express Free 3.4 (netsafesoft.com) | ||
configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 927 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
29. | Safe Express Home 4.2 (netsafesoft.com) | ||
configurable, yet easy to use email client. It is also a public key email encryption client that automatically encrypts all your messages and an anti-spam email client that automatically classifies incoming emails as spam or non-spam. This software will also protect your computer from viruses and worms that spread via email. It is also very easy to use software with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1269 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
30. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons in the wrong hands. New added features to this version, The ISB is the Internet Speed Booster feature included to optimize the internet connections, The DLLs | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
|
Home > Secret key encryption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|