encrypted list shareware downloads


Search results for «encrypted list»:

Easy Email Encryption 6.39 Easy Email Encryption 6.39
… nding and receiving encrypted email (optionally with attached files), and is designed to be easy to use. It works with any email program, including Outlook Express. Easy Email Encryption uses a symmetric key method, and keys are maintained in an encrypted list of keys for easy access. When a… 

Paragon Encrypted Disk 3.02 Paragon Encrypted Disk 3.02
… side on a hard drive, on a network drive, on removable media such as CD/DVD, a USB flash memory drive etc. Once an encrypted disk image is created it can be mounted as a virtual drive anytime and anywhere later. The disk image can be mounted only… 

Encrypted Magic Folders 06.09.1 Encrypted Magic Folders 06.09.1
… s. EMF is so fast and transparent you'll soon forget you're using encrypted files. Laptop users find Encrypted Magic Folders invaluable for protecting any business or personal data they wouldn't want a thief to have should their laptop be stolen.… 

ID Data Encrypt 1.2 ID Data Encrypt 1.2
… ver your deleted files. ID Data Encrypt provides a list of logging files in order to keep a better history of files that have been encrypted or decrypted. You can review the history in search for files or folders that have been encrypted/ decrypted.… 

MY ENCRYPTED DISK 1.10 MY ENCRYPTED DISK 1.10
… malicious delete. virtual encrypted partition can be formatted to the file system which operating system supports (FAT, FAT32, NTFS); full plug and play,max 4 scsi removeable disk can use at one time. you can simple stop device when logout.… 

Encrypted Briefcase Personal 2.6 Encrypted Briefcase Personal 2.6
… out the leaking of sensitive business data if the computer is stolen. This file and folder encryption software runs under Windows 2000/XP/Server 2003 and supports FAT/FAT32/NTFS. It still works under Windows Safe Mode. Limitations 20 days… 

CryptArchiver Lite 3.1.0.0 CryptArchiver Lite 3.1.0.0
…  are accessible and visible only to you! Secure your important files and folders - get CryptArchiver today! Limitations Nagscreen after 15 days, 20 MB Encrypted drive size.… 

JvCrypt 1.0 JvCrypt 1.0
… se passwords can be used when running JvCrypt from the command line or during normal interactive mode. You can even setup JvCrypt to require a password when starting! This will prevent anybody else from accessing your stored password database.… 

Encrypted Content Management System (CMS) 2004-07-18 Encrypted Content Management System (CMS) 2004-07-18
… Encrypted Content Management System (CMS/Database - HTTP/SSL Server) with built-in Search-engine, E-Mai… 

MDBRecovery 4.0 MDBRecovery 4.0
… ypted as well as non-encrypted databases. Simple and easy-to-use Objects recovered: Tables, Forms, Relationships, Queries, Macros, Modules & Reports. Improved recovery engine - works with Access MDB versions 95, 97, 2000, 2002 & 2003… 


Related: encrypted list  Click to List Grocery Shopping List  non encrypted  encrypted and  been encrypted