CryptoStorage is a reliable and easy-to-use system for encrypting private data and controlling
access to it. With CryptoStorage, you can create one or more cryptographic storages and store
files in them. An open storage is a special folder in the root directory of your Pocket PC. You
specify the name of this folder when you create the storage. All data read from or written to this
folder gets transparently encrypted/decrypted on the fly. CryptoStorage for Pocket PC is the most popular private key download.
See also: pocket pc, crypto, secret, disk, storage, volume, card, data, folder, private, secure, password, security, file, encrypt, decrypt, key, strong
DisCryptor PERSONAL protects your privacy! Try the 15 day free DisCryptor PERSONAL edition now! It lets easy encryption of files, folders and e-mail attachments with a single click. It protects whole disks and makes safe virtual disks. Also protects portable flash and USB disks using state of the art encryption methods. It includes many innovative functions such as data shredder for safe data removal, password manager and many more. DisCryptor PERSONAL is the second most popular private key download.
See also: discryptor, security, encryption, shredder, full disk encryption, hard disk encryption, disk encryption, hard disk encryption, steganography, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key
Leo Backup is a software designed for Windows and intended for backing up your data in various locations, including secure servers (SFTP and FTP/SSL) and network drives. Interface password and special authorization methods provide you with indispensable safety level. Effective file protection and access verification options also let you keep your network and data intact, and maintain a stable and secure company management. Leo Backup is the third most popular private key download.
See also: backup, security, SFTP, secure FTP, secure backup, scheduled backup, protection, access, service mode, restore, FTP/SSL, servers, Active Directory, encryption, compression, reporting, remote backup, filter, private key, Public Key, authorization, COM
Sign PDF documents using X.509 certificates in PKCS#12 format, which evolved from the PFX (Personal inFormation eXchange) standard and is used to exchange public and private objects in a single file. PKCS#12 usually stores a private key with the appropriate public key certificate. The software features bulk signing that enables you to sign multiple PDF files in batch by selecting input and output directory. Folder-on-watch feature is available.
See also: sign, pdf, signature, signer, signing, digital, certificate, PKCS, x509, PFX, private key, public key, eletronic, stamp
Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
See also: automated file, data, encryption software, encrypt, decrypt, pgp, openpgp, automation, schedule, password, private key, public key, open pgp, openpgp private key
Cresotech TypeRecorder (T-Rec) is easy to use and convenient utility for recording keystroke sequence while working with word processing programs, games, multimedia applications, etc. Simple way to avoid excessive manual typing by using pre-recorded macros. This is a new software tool that revives an old pianola principle: performed successions of keystrokes are mechanically recorded as individual exercises for further playback.
See also: type, recording, typing, macro, key, keys, command, sequence, recorder, T-Rec, Cresotech, desktop, utility, fun, easy, enjoy, tool, automate, keystroke
Anti-Peeper Key is an easy to use tool for hiding windows and programs in one second in order to prevent uninvited persons from seeing them. If you habitually chat or surf the Web at work against your boss's wishes, this utility will help preserve your nerves. You can run your IM clients, Internet browsers, e-mail program, games on a separate "Private" desktop so if your boss approaches you, you can quickly switch to your 'Work' desktop.
See also: hide, windows, hide windows, programs, applications, screen, boss key, tray, messenger, icq, miranda, IRC, trillian, hide windows, hide, change
Keystroke Converter can customize your keyboard layout, change any key on the keyboard to other keys, replace keyboard shortcuts, execute micro or windows action. Allow you to redefine system keys, such as, Ctrl, Alt, Shift, Table, and Win keys. Disable desired key.
See also: convert keyboard, change keyboard shortcuts, change keyboard layout, change keyboard mapping, change keyboard keys, replace key on keyboard, key exchange, key changer, keyboard keys, keyboard input, mouse and keyboard
Annoy your opponents and win the game!. Multiplayer Online Boardgame. Up to 4 player can play in a network (TCP/IP) against each other, or stand alone against the computer. Funny pixel graphics, sound, a lot of properties, and high play strength. Excitement and fun for young and old. The object of the game is to get around the board and back to your home section. If you land on another player's piece, you send them back to the start.
See also: register, key, lan, ludo, tcpip, online, flizzers, multiplayer, board, activex, mömch, olepro32.dll, mfc42.dll, windows, network, games, spiele, download, fuera, raus, netludo, shareware, getout, software, system
The TRAVELClip Remote Desktop Client enables instant, portable RDP / TSE access from any PC without installation or Administrator Rights. Previously, users were often prevented from accessing their work environment from mobile media such USB key drives, because they lacked elevated security privileges needed to install and use the Windows Terminal Service client.
See also: USB thin-client, thinclient, thin client, web access, microsoft TSE, USB drive, USB key, cyber cafe, terminal service, virtualized client, mobile user, access anywhere, remote desktop, remote access, RDP, TSE, USB
Make and Play Karaoke on your computer. Rip & Burn CD+G Karaoke CDs. DART DeVocal - Suppress the Main Vocal from Stereo Recordings. DART Karaoke Author - Import, edit and synchronize lyrics to the music you hear. Customize the graphics with the CD+G track generator. DART Karaoke Wizard - The onscreen guide will assist you step by step to custom Karaoke songs. Sing-Along and Record your Performance. Play CD+G tracks with full audio and graphics.
See also: DART Karaoke Studio, CD+G, karaoke software, DeVocal, De-vocal, vocal remover, vocal eliminator, Suppress Vocal, key change, Reverb, pitch change, pitch shift, create karaoke, author karaoke, play karaoke, CD+G rip & burn, lyrics, trial software
Easy Install Maker is a professional installation development tool that lets you create compact setup applications for your software. In just about five minutes, you can create a single-file multilingual installer with a small installer size. The installer can be completed with custom logos, uninstallation, registry/INI editing, custom shortcuts, license agreements in RTF or TXT, ReadMe files, restart-after-installation functionality, and more.
See also: setup builder, setup generator, installer, software install, extract file, create shortcut, import registry key, create uninstall
ID USB Lock Key is a security program meant to protect your computer from unauthorized users. It denies access, by providing a security block-screen which can be unblocked with the USB stick where you have the key generated by the program. Main features includes: generating protection-key for each USB stick, blocking PC by simply pressing CTR+L, activating a block-screen after locking the PC, denies access to unauthorized users.
See also: usb, stick, usb lock, usb block, block-screen, usb stick, usb lock key, id usb lock key, protect, privacy, internet, clean, erase, shield, spyware, antispyware, security suite
This application is a container to most programs in your computer system to its shell by means of dynamically created tabs. iHide then hides instantly the opened programs currently running on its tabs with a set of hot keys (or rather secret keys). The hidden programs do not show their identities on the taskbar or anywhere on your desktop.
See also: secret, privacy, security, hide, unhide, bosskey, anti-boss, key, secretweb, Opera, firefox,
Minimize, hide any application to system tray, you can use it like boss key. Hide them all! You can minimize application by shortcut key. You may choose applications which will be always minimized to tray, it's really easy to use. Minimize them all now! You can hide them too! It does not require any additional configuration. Minimize To Tray supports Windows Vista. Minimize To Tray hiding all windows applications. Free support after buy included.
See also: minimize, hide, boss key, minimize application, minimize outlook, minimize to tray, hide window, minimize program, hide application, system tray
Funny Typing is a cute small program that certainly makes typing a more fun activity. It helps you hear a distinctive sound each time you pressed your keyboard and mouse. Built-in 12 sound schemes for choose?Typewriter sounds, Fighting sounds as Hollywood films, Gun sounds as war games, Abe, Mix, each scheme assigned to all key events.When you press the keys, you will hear a fancy sound which is made by the Funny Typing.
See also: funny type, keyboard assign sounds, keyboard speak, assign sounds to keyboard key, associate sounds to keyboard keys, keyboard sounds effect program
Tagg is a file tool which helps you organise your files through the use of tags. Use it to catalog your personal files as well as your media assets such as clip art,sound files or video clips.
See also: tag file, file tags, file manager, clutter, your files, organise files, organize files, find files fast, tags, Tag, Tagging, Tagged Files, Catalog, Keyword, Metadata, Keywords, File Search, Desktop Search, Personal Files, Digital Media Assets, Keyword Association, Catalog CDROM, Catalog DVD, Digital Asset Management, Windows XP tool, Windows Vista tool, tag editor, id tags, key tags, label tags
Crimson512 is the ultimate file encryption system. It is fast, easy-to-use and completely secure even from brute-force attacks. Protect your files from prying eyes with confidence. Crimson512 uses single license system that lets any number of installations using the same license key. With its hardware key support, encrypting with extremely complex passwords has never been easier.
See also: privacy, security, file encryption, fast encryption, hardware key, password manager
Inexpensive and affordable DB transformation tool is time saving and money saving utility that does not require any expertise knowledge to operate software to migrate database file from MSSQL to MySQL easily without any tech support. Highly interactive Database Migration Software has easy to handle GUI environment and is offered at www.db-convert.info to get familiar with software functionality to make conversion process quicker and simpler.
See also: Database, table, conversion, software, transform, Microsoft, SQL, MySQL, record, maintain, integrity, data, types, attributes, null, default, value, key, constraint, foreign, primary, unique, migration, utility, translate, file, Window,
INI-Edit is a great utility when you work with INI files or when you need to organise and save your passwords. INI-Edit can show you the sections, names, values and comments in an orderly fashion, so you don't have to think about the ini file syntax and you can encrypted the file when you save it, so nobody can read your passwords. NI-Edit can also hide all the comment's so it is easier to find values. There is of course also a search function.
See also: ini, edit, editor, create, password, organize, password saver, encrypt, fast, syntax, key, search, find, value, comment, open, read, write, save, file
Powerful launcher and scheduler that provides fast access to your favorite applications, folders, websites, and documents. Input new shortcuts by drag-n-drop, launch shortcuts using hotkeys, schedule shortcuts to run one or many times, group shortcuts, automatically insert commonly typed text, display reminders, and automate system shutdown and restart. SuperLauncher is an extremely easy to use productivity booster.
See also: launcher, launch, run, start, group, manager, inserter, fast, quick, tool, utility, desktop, program, file, files, application, document, folder, favorite, website, item, items, text, shell, desktop, shortcut, key, hotkeys, hotkey, hot key, keystroke
Perform computer actions in one click! Stop typing the same text over and over again! Now you don't need to go through numerous menus to find the necessary software or web page. With this new generation hotkey manager you can leave your mouse alone and configure hotkeys for all of your actions - just like actual pro's do. Download it free now.
See also: comfort, fast, hotkey, shortcut, hot, key, manager, keyboard, on-screen, automate, repeat, block, change, press, action, run, desktop
Memory Drive Undelete recovery software developed for recovering corrupted file, folder including digital media and music files. Download USB Drive Undelete software from www.drpu.org retrieves documents and data from memory stick data storage media.
See also: USB, Drive, Undeleted, software, tool, download, restore, recovery, regain, application, data, file, folder, audio, video, picture, images, retrieve, lost, memory, flash, key, stick, storage, media, tool, missing, device, memory, system
Comprehensive Card Picture Recovery application has facility to retrieve accidently deleted images, snapshots or still photos in an affordable cost. Use image recovery software for recovering inaccessible photographs from different types of storage device without any tech skills. Useful Card Picture Recovery tool is widely used to repair logically corrupted or virus infected image files in an effective manner.
See also: card, digital, recovery, image, software, recovers, missing, lost, pictures, snapshots, camera, memory, card, rescues, deleted, photographs, restore, corrupted photos, usb, storage, device, backup, repair, infected, disk, drives, file, key, drive
CoupleBox is a fun way to protect and play your personal stuff. It provides 256 bit encryption to keep your personal photos and videos private. The CB integrated media player comes with a range of exciting skins. CoupleBox makes it easy to organize your stuff using Albums, Photo Series plus two separate Collection areas. You can mark items as Faves and back-up your entire collection (encrypted) at the press of a button.
See also: Private, Encryption, Secure, Player, Viewer, Hide, Encrypt, Photos, Videos, Images
BlueAuditor is a easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network. It can discover and track any Bluetooth device and display key information about each device being detected as well as the services device provided. BlueAuditor will enable network administrators to effectively audit their wireless networks against security vulnerabilities associated with the use of Bluetooth devices.
See also: Bluetooth, device, wireless, network, private area network, PAN, services, detecting, monitoring, security, vulnerabilities, discover, track, technology, administrator
Data Shredder Software wipe hard drive files from storage disk. Wiper permanently erase temporary internet files, typed URLs, history, cache, cookies and activity traces of application and system files. Utility remove critical private records securely. Tool cleanup network folders, most frequently used programs, start menu links and icons, Favorite Web pages, Control Panel items, Internet Explorer buttons, windows event, built-in firewalls logs
See also: Drive, data, eraser, software, erase, wiper, wipe, personal, records, private, confidential, files, disk, cleaner, cleanup, critical, information, permanent, erasure, tool, remove, delete, internet, cache, utility, eliminate, recent, documents
Award-winning software to restrict access to your Computer and private data. Allows you to block access to Internet, web sites, files, folders, disks, applications, desktop and more. Block files download, software installations and uninstalls. Prevent users from plugging and using USB Flash devices, memory cards, external HDDs, DVDs and Blu-ray recorders. Multi-user and multi-profile support. Built-in scheduler. Event logging. Stealth-mode support.
See also: privacy, security, access, lock, restrict, administrate, block, private, secure, drivelock, usblock, site content filter
In-Out Board is the cross-platform staff in/out tracking utility for your office. Users can easily set their status as well as leave notes (i.e. how they can be reached, when they'll be back). In-Out Board's status classes are fully customizable. In-Out Board uses our proven peer-to-peer networking engine. It requires no server and can be configured to connect remote offices over the Internet.
See also: in-out, in out, staff, employee, tracking, status, cross-platform, peer-to-peer, network, private, software, LAN, in out board/in-out board, staff
Master resell rights private label software! Customize the company name, software name, website and graphics! Give your customers the ability to find their internal and external IP addresses quickly and easily, and have it delivered to them remotely. Ideal for remote desktop, remote help, or just connecting to a home FTP server from abroad.
See also: Internet Protocol, Network, Private Label, Rebrand, Master Rights, Resell Rights