madlogic encryptor shareware downloads
Search results for «madlogic encryptor»:
MadLogic Encryptor 1.0
… ends. The program, MadLogic Encryptor, need not be installed to decrypt a file.
Now you can email encrypted files to friends without worrying about who might see them. Only those who are privy to the password can access the encrypted file.…
MadLogic ScreenShot 1.5
… d options, the image file will be saved in the same location as the last image, with a number appended to the filename that is incremented each time. For example, your files would be named something like myscreenshot1.bmp, myscreenshot2.bmp, etc.…
PSM Encryptor 1.0
… own video codec: you can encrypt videos which can then be decrypted in real-time as you watch them, with no noticeable loss of performance or quality. An integrated email engine is also provided.
Limitations
One key only.
Banner display.…
Troi Encryptor Plug-in 2.0.1
… he new External Function API of FileMaker Pro 7
the plug-in functions now have a size limit of 1 Gb per parameter (up from the total of 64000 character limit for all parameters in FileMaker 6!)
each function now supports Unicode characters…
ULTRA FILE ENCRYPTOR 1
… word protect it. The only way you can open your documents is by providing the assigned password so the application starts applying the un-encryption algorithm.
Ultra File Encryptor is at promotional price. You can buy it now for only $9.95!…
Stealth Encryptor 6.2
… context menu support, and more. Supports DES and Blowfish encryption. It features an extremely flexible and easy to use interface.
Files and folders can be encrypted, decrypted or shredded right from the Windows Explorer when you right click.…
GetPDF Encryptor Decryptor 3.02
… g, copying, extracting, signing, filling, assembling or merging a PDF file.
With GetPDF Encryptor Decryptor, you will be able to decrypt PDF files as well. GetPDF Encryptor Decryptor is standalone, which does not require Adobe Acrobat.
Limitat…
G-Soft Encryptor 2006 1.1.0
… ns either by "keygenning" it, or "bruteforcing" it.
HSkey is not yet been 100% inprented here, but the encryption methods still works, and are quite usefull against unwanted people to read or access your files.
Requirements
MS VB Runtime files…
File Encryptor 2
… file with sensitive data.
Once the file is encrypted, he cannot be decrypted with any other tool.
You can encrypt one or more files or a directory with all the files contained with just one mouse click.
Limitations
30 days trial
Aby…
I-Cipher AP 2.2.2
… ned documents, or electronic art.
It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form.…
Related: madlogic encryptor madlogic madlogic screenshot madlogic screenshot screen capture encryptor