small secured shareware downloads


Search results for «small secured»:

Secured eMail 2.2 Secured eMail 2.2
… f the Send button. You can of course use your existing email account(s). Multi-level Passwords Secured eMail has the ability to encrypt sent & received emails with the private & master password. The master password can then be used by the admini… 

SpyCapture 1.4.5 SpyCapture 1.4.5
… xecuted applications and more. 6. Extremely small and perfectly to run in background. SpyCapture may not be a beautiful looking program but its small, secured and useful program that will does its job as excellent PC Surveillance software.… 

Evidence 9.11.15 Evidence 9.11.15
… VIDENCE also has very powerful searching options. Resulting sub-lists of matching items are summarized, and can be printed out in a professional report. See why EVIDENCE has been a best seller since 1989!… 

Secured Actions 1.0 Secured Actions 1.0
… r security in your program? Use TDS Secured Action List in place of the standard TActionList and application security will be a dream, instead of a nightmare.… 

GroundZero Privacy Protector 1.0 GroundZero Privacy Protector 1.0
… an easy right click your Data will now be secured! Better be save as sorry. Limitations Only small files can be encrypted You can not add a context menu entry You can't change the key which makes the whole encryption pretty much insecure… 

NetDocs 5.0 build 278 NetDocs 5.0 build 278
… ocument history and retrieve any past revision. NetDocs is easy to configure (configuration required for server only), supports secured SSL communications and uses standard protocols. Requirements Server side: IIS Limitations 30 day trial… 

Utility Phone 1.5 Utility Phone 1.5
… red and sent to that contact when they come online. Although this product is FREE to use, subscribers may fix/lock their User I.D. instead of having to re-register every week and receive a new U.I.D., all for a small fee of US$1.50 per month.… 

Secured Drive 1.2 Secured Drive 1.2
… tances. If you forget a password, you will completely lose the ability to access your data. There is no special procedure, secret code, or hidden entry method to fall back on. Low requirements to processor productivity and the size of memory… 

Look 'n' Stop Firewall 2.05 Look 'n' Stop Firewall 2.05
… ction against Internet hacker attacks. It protects you against the "trojan horse" that trys to transmit your personal data to the outside without your agreement. Your permanent Internet connection can be scanned permanently from the outside.… 

NetEasyCRM Small Business 1.0 NetEasyCRM Small Business 1.0
… owerful Searching Works with Outlook Sales Cycle Tracking Integrated Data Archiving Follow Up Alerts Multi User Security Customer Sales Value Tracking Secured Data Transfer Network & Referral Marketing Instant Setup Marketing Campaigns… 


Related: small secured  secured and  secured  Secured Pad  secured drives