Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: E :: encryption
Display: short descriptions | full descriptions
  • Software to administrate remote PC. Main features: providing full access to the resources of the remote computer, monitoring the remote computer in a hidden way, simultaneous monitors up to 256 PCs, launched applications and visited sites monitoring, exchanging files, transferring sound over the network in real time, installing the server side of the program remotely, working with the registry, data encryption and more functions.
  • Free Files Encryption is designed for free protecting files on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • File Encryption is designed for protecting files,folder and drives on your local computer.In factly, it protects but does not encrypt the protected files and folders, so it will never have the chance to destroy your data and nobody can access or destroy your private data without password.
  • PDF Protector,splitter and merger is a multi purpose PDF tool.This tool can protect PDF files using 128-bit encryption, split PDF file using various method and it can merge multiple PDF files into one single PDF.This tool provides you multiple option while encrypting your PDF file and there lots of option while splitting PDF file like you can split all the pages or you can split only Even or Odd Pages
  • Storage Room a Personal Information and Password Manager to protect the privacy while editing and viewing, even if the workstation is already inflicted by a spy and for save data exchange with up to 16384 Bit strong RSA Keys. Stores and protects bookmarks, contacts, notes, appointments, movie libraries and any tabular data like passwords, license keys, credit cards, application-, document- and internet shortcuts in special designed data sheets inside Storage Room. Arrange this data sheets in a folder structures, lock and protect any amount of folders and data sheets with an additional password and password file and decide how long any of them can remain open without user interaction, before Storage Room seals them automatically. The password generator creates high secure passwords and the virtual keyboard hides keyboard input. The Internet Explorer can be automated with an entirely new, innovative and secure way and forced into any desired location. Data like passwords and login details can be transferred ...
  • LockmyDrive FreeLocker is a portable data security software offering a quick, easy in use and reliable solution for your private data protection. The software can secure any sensitive information, photos, videos, important documents protecting your files from unauthorized viewing, copying and deletion. It can be used to secure files and folders on internal and external hard drives, USB Flash drives and all types of memory cards. LockmyDrive FreeLocker (free software version) supports free locking functionality allowing you to lock your device with a password restricting access to its contents. Each user is also provided with 2 Gb of free online file storage for keeping the most valuable files in a secure place and access them whenever needed from any device connected to the Internet. Paid software versions (LockmyDrive Instant and LockmyDrive Strong) offer additional functionality. LockmyDrive Instant enables you to hide all files and folders contained on your device making them invisible and inaccessible to ...
  • Pdf encryption software lock pdf data with strong 128 bit encryption security level protection. Program is responsible for protecting batch pdf documents with open password security and owner password restrictions. Pdf encryption software facilitates to restrict desired function in any pdf file i.e. you can enable or disable pdf printing, copying, form filling, signing, commenting, editing, modifying etc permissions according to requirement. Application is Windows compatible, support RC4 40 bit & 128 bit encryption protection. In fact, you can secure bulk pdf documents only with open (user) password without applying any restrictions. This easy to use and awesome utility has inbuilt user help manual and does not require any extra technical skills for operating. Download free evaluation version of pdf security software, protect your private and confidential data from un-authorized access, prevent piracy & fraudulent. Program prompt for open password once set into the pdf and only intended person ...
  • Make use of word to pdf converter like Kernel for Word to PDF conversion software and successfully meet your need of converting file from word to pdf with utmost ease and accuracy. In fact, while you use this software you donít have to worry about the size of Word file. Perhaps, it is one such efficient software that actually allows you to create PDF files with encryption as well as local restriction for official and web-sharing requirements. What makes it unique and ideal option for performing word to pdf conversion is its ability to impose local restrictions on the resultant PDF and later apply the restrictions. In fact, all that you have to do is just uncheck the options of Print, Copy, Modify and Annotate. Apart from this, the tool also ensures that the data so converted from Word to PDF gets converted accurately with no trouble. The key highlight of this Kernel for Word to PDF conversion software is its ability to convert 0-50 word file(s) in a single Word to PDF conversion cycle. Adding to this, the too ...
  • Kernel Recovery for Access password recovery software effectively restores the passwords and allows you to access your protected database file. Usually, we protect the databases with passwords to limit unauthorized access to the important data. But due to several reasons, we tend to lose or forget the passwords. In situations like this, you can restore your lost access database passwords instantly using Kernel Recovery for Access password recovery software. This is an impeccable MDB password recovery software that is used widely to recover the lost or forgotten passwords from all versions of MS Access password-protected database files (*.mdb). The software recovers all the passwords instantly without any issues of length and complexity of the password. The MDB files store the password using strong encryption algorithms. This strong encryption cannot be easily decrypted. Software scans the password protected database file and generates the actual password instantly. The demo version of the software allows you ...
  • This software is optimized for small businesses and was designed to work fully automatic. You simply specify what you want backed up and when and then the software takes care of the rest. The software offers a lots of great features for small businesses: "Versioning": it keeps old versions of your files if you want it to, and can restore them with just a few clicks. "Automatic Pausing": it will automatically pause the backup process when you need the full power of your computer. "Remote Monitoring" allows you to monitor all backups in the office from one PC Ocster Backup Business 6 also offers a "1:1 File Copy" mode: your files are simply copied to the backup medium and are not put into archives. If you want direct access to your data then this option is for you. The software also includes convenient options for backing up these programs: - Outlook 2003 or higher: emails and calendars - Thunderbird: emails, contacts, calendars, settings - Firefox ...
  • Axommsoft Pdf encryption software is fastest and easiest way of protecting your digital portable pdf documents. Program is easy to operate, protects batch pdf files with open password security and owner guarding. Once pdf file is protected with user password, it ensures users you that only authenticated users can open and view pdf document content. Thus tool helps to secure document from being unauthorized access. Pdf encryption also provides another type of security along with pdf user password which is known as pdf master or owner password. This is the password which is used to add pdf user level restrictions like disabled print option, denied content copy and disallowed pdf edit etc. Once this pdf permissions password is enabled by you into the document, no one can copy, print, edit, form fill, comment, sign, modify, split, merge or extract pdf files. Administrator can also set selected restrictions only by selecting appropriate options. Program supports RC4 40 bit/128 bit and AES 128 bit/256 bit encryptio ...
  • Ninja Database Pro is a compact and lighting fast .NET database for Windows Phone 7, Silverlight, and desktop applications. It is ACID compliant. It is the only database available that supports object database mode and relational database mode for child objects. Other features include, transactions, LINQ, indexes, caching, import XML, export XML, export schema, dynamic schema evolution, encryption, compression, constraints. Try it today.
  • Secure Image Pro is recommended image protection for photographers and advertising professionals. Pro supports Mac as well as PC visitors. Options include Domain Lock, targeted hyperlink on the image, and several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains. Pro will encrypt 1,000's of images on a single click.
  • CE-Secure Free Express enables you to create up to four 128MB encrypted vaults using AES-256 bit encryption. There is no time-out on our express edition, you can continue to use the product to access these vaults once created, or use this edition to secure files you may be providing to someone via email or on a portable storage device. We also offer CE-Secure Pro, which enables you to create an unlimited number of encrypted vaults up to 2TB.
  • Extract 40 and save 8 formats, full Unicode support and better compression ratio through new file format "EGG", convert broken language files into original language, make self extractors (SFX, EXE), file encryption with AES-256, command line, easy enough for kids, powerful enough for IT pros.
  • Kingsoft Spreadsheet Free 2012 is a compact yet powerful spreadsheet application that is fully compatible with Microsoft Excel (97/2000/2003/2007/2010). You?re not only allowed to open, edit and save .xls, .xlsx and .et file formats, but you're also able to import .txt, .xml, .dbf, and .csv file types, among others. Furthermore, you can convert your spreadsheet documents into PDF or HTML files, in order to more easily share them via the Internet. The interface of Kingsoft Spreadsheet is highly similar to the 2003 version of Excel meaning you can easily transfer between the two suites without further training. Kingsoft Spreadsheet 2012 also comes packed with a number of useful features that can help you organize your data within seconds including a powerful data calculation feature to help users analyse and calculate data efficiently, an RC4 encryption function utilising a special long password to protect your data, and a formula library with a wide variety of formulas, such as ADD, MINUS, AVERAGE, ...
  • DEKSI Shield allows you to hide and password protect your folders and set access rights using an encryption tool and protection wizard. DEKSI Shield is the most advanced, powerful and feature rich protection program for your computer system: hide files, folders, and drives, and set access rules using flexible security combinations for your most valuable data. A unique feature of DEKSI Shield is the combination of data hiding and encrypting. Features include: 1. Ability to hide files, folders, or drives from all other users (including the administrator). 2. Encrypts files and folders. 3. A mask that allows you to hide file groups (for example, c:*.doc). 4. Ability to set permissions (Read, Write, Visibility, Delete) for any files, folders, and drives. For example, you can make your files Read Only and make it impossible to delete them. 5. An access lock on your private folders and settings (My Documents, Favorites, Control Panel, Internet History, etc. 6. A protection wizard. 7. Password prote ...
  • PeaZip is a free archiver for Windows 64 bit, features encryption, secure deletion and file split. Create: 7Z, BZip2, GZip, *PAQ, PEA, QUAD/BALZ, split .001, sfx, TAR, WIM, XZ, ZIP. Open: ARJ, CAB, DEB, DMG, ISO, JAR, LHA, LZH, MSI, NSIS, RAR, UDF, ZIPX and more (134 types). Allows to browse archives, apply multiple inclusion and exclusion filters, save archive's layout, export job definition as command line, work on multiple archives at once.
  • Outlook Backup Assistant allows you to easily backup all your Outlook data and settings with just a few clicks. Complete backups: only Outlook Backup Assistant backups over 30 categories of Outlook related data (inc. Emails, Contacts, Calendar, Tasks, Notes, Exchange Data, Settings, etc). Automatic backups can be scheduled. Backups are stored in a single compressed file with optional encryption. Easy restoration and backup archive viewing.
  • PeaZip is a free archiver for Windows and Linux, features encryption, secure deletion and file split. Create: 7Z, BZip2, GZip, *PAQ, PEA, QUAD/BALZ, split .001, sfx, TAR, WIM, XZ, ZIP. Open: ARJ, CAB, DEB, DMG, ISO, JAR, LHA, LZH, MSI, NSIS, RAR, UDF, ZIPX and more (134 types). Allows to browse archives, apply multiple inclusion and exclusion filters, save archive's layout, export job definition as command line, work on multiple archives at once.
  • Capture images from all the TWAIN compliant scanner and webcam devices and save to BMP, GIF, JPEG, JPEG 2000, PCX, PNG, TIF, TGA, PGX, RAS, PNM files. Support JPEG compression with TIFF file. Support securing a PDF document using 40 bit, 128 bit RC4 encryption and owner, user password. Support adjust standard PDF permissions: Printing, High Quality Printing, Changing the document, Content copying or extraction, Filling of form fields, Content extraction for accessibility, Document assembly. Has ability to adjust the scanner image resolution (DPI). Has ability to adjust the scanner pixel type, True color, B/W Color, Gray color. Has ability to enable/disable ADF feeder. Has ability to enable/disable duplex scanning. Perform Barcode Recognition processes an entire page or only specific areas in a page and Automatic barcode type detection, Read multiple barcodes at any orientation. Perform OCR processes an entire page or only specific areas in a page and allow select fast, normal, exc ...
  • Support read Kodak / Wang Annotation tag within a TIFF file and display it. Perform Barcode Recognition processes an entire page or only specific areas in a page and Supported Codabar, Code 11 Code 3 of 9, Industrial 2 from 5, Interleave 2 from 5, Matrix 2 from 5, Code 128, EAN 8, EAN 13, UPC-A, UPC-E Barcode Type. Rotate mulitpage TIFF PDF. OCR to searchable pdf. Convert PDF to text. Render password protected PDF document. securing a PDF document using 40 bit, 128 bit RC4 encryption and owner, user password. Support save as single or multi-page PDF/A. Convert images from any color resolution to 1 bit, 4 bit, 8 bit, 8 bit grayscale, 16 bit, 24 bit, 32 bit. Zoom in, zoom out, panning, auto zoom and auto scrolling when drawing selection rectangle. Split Merge, Swap, Delete Add page of multi-page TIFF File with a single function call at a specified location without displaying or decoding any of the images. Support Lightness, Brightness, Contrast, Diffuse, Emboss, FocalBW, G ...
  • This OST to PST 2010 conversion tool has the capability to recover or salvage emails, appointments, complete attachments, journals, notes, as well as contacts from the damaged and corrupt OST files and that too in an easy and efficient manner. This OST to PST 2010 conversion tool recovers or salvages emails from HTML, RTF, as well as Plain Text format. This OST to PST 2010 conversion tool recovers event the encrypted or password protected OST files. This OST to PST 2010 conversion tool lends support for both high encryption as well as compressed encryption. This OST to PST 2010 conversion tool saves the recovered results in .PST, .EML, as well as .MSG file formats which can later be accessed with the MS Outlook, Outlook Express, as well as other emails clients. This OST to PST 2010 conversion tool comes with a Live update feature which is responsible for constantly updating the software with the latest version. This OST to PST conversion tool comes with an intuitive, interactive as well as ...
  • This efficient Doc PDF Converter has got the exceptional ability to conduct the fast and impeccable Doc to PDF conversion. With the help of this doc to PDF converter software you can carryout the routine official task of converting doc to PDF in a most hassle-free manner. The software permits you to create pdf files and configure encryption as well as local restrictions without any difficulty. What?s more, this Doc PDF converter has got an exceptional ability to retain the data structure, format and properties in the converted PDF files. The software provides the complete support to Unicode Character Conversion. Not only this, doc to PDF converter has got the ability to recover data, hyperlinks, images, OLE objects and other information from Word files. Another great feature of Kernel for Word to PDF converter is that using this software you can even impose encryption and local restrictions on newly-created PDF. And, in addition to all these the doc to PDF converter is very much compatible with all versions o ...
  • About CompTIA(r) Security+ Certification: Exam topics include security fundamentals, encryption schemes, computer network protection from various threats, authentication schemes, and management and training for securing computers and computer networks. SimulationExams.com practice tests for CompTIA Security+ certification conforms to the latest objectives of the exam. The package contains 3 tests and most questions carry detailed explanations. The questions types include multiple choice, true/false, and exhibit based questions. Two modes are available 1. Test mode, and 2. Review mode. Test mode is timed and the candidate is expected to complete the test within specified time. The review mode allows a candidate to quickly review the correct questions, and answers. At the end of the test, one can analyze the wrongly answered questions against the correct questions. Also, please note that SimulationExams.com may change the test format at any time so that the simulation exams follow the improvements being made ...

Page 9 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware