|
||||||
|
||
|
Home > Encrypt text file software |
Related keywords: file, text, encrypt, File, text editor, text to speech, Text, file transfer, file management, file encryption |
|
|
31. | Bottom-side Explorer bar Maker 3 (text-reader.com) | ||
own Explorer bar from any HTML page, picture or Macromedia Flash file. Usually, making Explorer bars includes COM programming, that can be complex and confusing. This work has done for you. Now, making a new bar is so easy as selecting a file. An Explorer bar (band) is a panel like the Favorites, History or Search panels that you see in your Internet Explorer (IE) or | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Ivlev | Size: 322 kb | Shareware Go to category: Development > Other Similar programs | |||
32. | ActionOutline 2.1 (actionoutline.com) | ||
There is not a single major organizer and PIM review source (that's the ones with at least 1000 visitors a day) that does not have ActionOutline listed. John Buckman has been reviewing organizers since 1994; http://john.redmood.com/organizers.html is the oldest Net organizer/note taker/PIM review resource on the Net. After trying hundreds of titles, the reviewers found no reason to | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 978 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
33. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
34. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
35. | CryptoForge 3.2.5 (cryptoforge.com) | ||
security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to four strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | AeroTags TagsLock Pro 2.50 (aerotags.com) | ||
you own a website and need to protect your HTML files with password, encrypt the content of your web pages and hide source code of your HTML and XML documents? There is a solution! Today we are glad to offer an ultimate all-in-one solution for webmasters - AtomPark TagsLock Pro. This program provides the easiest way to protect your web site content with password, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Evgeny Medvednicov | Size: 1045 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
37. | PDF-XChange Pro 3.00 (docu-track.com) | ||
(includes MAPI and SMTP support) Job Management - Batch to temp file(s) before conversion to PDF. Mount multiple source pages to a single PDF page (max 16 pages to 1 PDF page) Acrobat 6 Format Support (1.3.1.4,1.5 PDF Format Support) Set PDF File - page opening | |||
Updated: 9, 2005 | Rating: 16 | Author: John Verbeeten | Size: 5771 kb | Commercial Go to category: Business > Other Similar programs | |||
38. | VLPropertyList 2.0 (viklele.com) | ||
minimal code. Built-in editors supported by the control include text, number, boolean, drop-down list, color picker, font selection, file selection folder selection and date pickers. It even allows you to add your own in-place or dialog based custom value editors. By default the control automatically matches the color scheme as per the desktop settings. On the other hand | |||
Updated: 9, 2005 | Rating: 0 | Author: Viklele Associates | Size: 2032 kb | Shareware Go to category: Development > Active X Similar programs | |||
39. | Chilkat XML Messaging Component 2.0.0 (chilkatsoft.com) | ||
and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or without line-endings translated), Base64, Quoted-Printable, compressed, encrypted, etc. Send and receive raw binary data at the socket level if desired. Makes adding | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 1000 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
40. | Vypress Messenger 4.0 (vypress.com) | ||
Messenger is a program for sending text messages with attachments in real-time, without using any additional servers, from one computer to another or a few others. The program supports several messages transferring protocols, including its own protocol, for guaranteed distribution of direct messages, using a TCP protocol and a multiple-address file distribution, using UDP | |||
Updated: 9, 2005 | Rating: 0 | Author: VyPRESS Research LLC | Size: 1475 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Encrypt text file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|