|
||||||
|
||
|
Home > Encrypting software |
Related keywords: file encrypting |
|
|
1. | ! - Image Editor & Screen Capture By M8 Software 5.20.002 (winm8.com) | ||
ImageM8 is a complete, self contained, image management system for Windows. It combines an image catalog system with screen capture, graphics multi clipboard, image editor and image mixer. For the web page developer, ImageM8 lets you capture screen shots or select clipart, add text captions and save as JPEG | |||
Updated: 3, 2005 | Rating: 16 | Author: John Turnbull | Size: 3916 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
2. | ! - ImageM8 5.20.002 (winm8.com) | ||
ImageM8 is a complete, self contained, image management system for Windows. It combines an image catalog system with screen capture, graphics multi clipboard, image editor and image mixer. For the web page developer, ImageM8 lets you capture screen shots or select clipart, add text captions and save as JPEG | |||
Updated: 3, 2005 | Rating: 0 | Author: John Turnbull | Size: 3916 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
3. | ! Chilkat SMTP / POP3 Components 4.4.1 (emailcomponent.com) | ||
full S/MIME capability for sending and receiving signed and encrypted email, MHTML for sending HTML email with embedded images and style sheets, multipart/alternative, multipart/related, attachments, advanced AES encryption, automated international character encoding conversion, Outlook integration, progress monitoring, Outlook Express EML import, XML import and export | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
4. | ! Custom Addressbook 4.5 (freebyte.com) | ||
Custom Addressbook is an intuitive, powerful, small, and extremely flexible Address Management program for Windows 95/98/ME/NT/2000/XP. Custom Addressbook is unique, among the many apparently similar programs, in that this program enables you to define your own addressbook fields and categories. An | |||
Updated: 2, 2006 | Rating: 42 | Author: Henk Hagedoorn | Size: 900 kb | Shareware Go to category: Business > Other Similar programs | |||
5. | !!!Poker Master 2.0.0 (micronet-software.com) | ||
Here is ready for You the new Video Poker with the playoff rounds more amusing than you have ever seen!!! Poker Master is simple to use. It seems to play against another person!!!. artificial intelligence is very evolved, particularly for the playoff round "Heartbeat." Poker Master has 3 playoff rounds: Poker Master is simple to use. It seems to play against another person!!!. artificial intelligence is very evolved | |||
Updated: 3, 2006 | Rating: 54 | Size: 11080 kb | Shareware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
6. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
abort any zip or unzip operation while in progress. AES Encryption Encrypt your data using up to 256-bit AES encryption. Also supports Blowfish and Twofish encryption algorithms. Embed ZIPs into EXEs Embed ZIP files directly into EXEs, and access them from your program. The ZIP is embedded as a named resource, and any number of ZIPs can be embedded in a single EXE. Create | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
7. | !Remove Access Passwords! 2.0 (e-tech.ca) | ||
Do you have a password protected Access Data file (MDB)? Is your system administrator unavailable, and you need access to your data. Do you need to modify your MS Access program code, and the programmer isn’t available? Do you like to hack? Do you have a database with user-level security? Want it | |||
Updated: 9, 2005 | Rating: 0 | Author: Neil Britto | Size: 1515 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | #Remove Access Security 3.0 (e-tech.ca) | ||
etc. This is the first software ever developed which works with encrypted databases as well.In simpler terms, any user can run the software over a database, thereby gaining total control over the data contained therein. The user can then add, delete and modify data, which means that records can be permanently destroyed or changed without anyone's knowledge. 'Remove Access Security' | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | #Remove Access Security 3.0 (e-tech.ca) | ||
etc. This is the first software ever developed which works with encrypted databases as well.In simpler terms, any user can run the software over a database, thereby gaining total control over the data contained therein. The user can then add, delete and modify data, which means that records can be permanently destroyed or changed without anyone's knowledge. 'Remove Access Security' | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
10. | 007 Spy Software 3.01 (e-spy-software.com) | ||
007 Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Encrypting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|