|
||||||
|
||
|
Home > Encrypting software |
Related keywords: file encrypting |
|
|
11. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
13. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
15. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
17. | Dekart Private Disk 2.07 (dekart.com) | ||
reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
ABC Amber Excel Converter was developed to help you convert your XLS (MS Excel) files to any format you wish (DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability Supports a batch conversion, a run from command line and more than 50 languages | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
19. | Softros LAN Messenger 3.6.2 (softros.com) | ||
Is your company starting to experience communication problems? Does it take too much time to call your co-workers to invite them to a group meeting? Hate walking all over the building to solve some trivial issue? Then its time for your company to consider implementing network messaging solution. Softros LAN | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Green | Size: 2128 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
20. | FileMonkey 10.22 (monkeyjob.com) | ||
to file names. Append data to the start or end of file contents. Encrypt and decrypt files. Edit last accessed, created and modified date and time stamps. Increase or decrease date and time stamps. Extract text from within files. Trim (truncate) file and folder names and file contents. Wipe free space and erase files. Filter, sort, list and print by size, dates, and pattern. All | |||
Updated: 2, 2006 | Rating: 61 | Author: monkey job | Size: 2098 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Encrypting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|