CryptoStorage is a reliable and easy-to-use system for encrypting private data and controlling
access to it. With CryptoStorage, you can create one or more cryptographic storages and store
files in them. An open storage is a special folder in the root directory of your Pocket PC. You
specify the name of this folder when you create the storage. All data read from or written to this
folder gets transparently encrypted/decrypted on the fly. CryptoStorage for Pocket PC is the most popular private key download.
See also: pocket pc, crypto, secret, disk, storage, volume, card, data, folder, private, secure, password, security, file, encrypt, decrypt, key, strong
DisCryptor PERSONAL protects your privacy! Try the 15 day free DisCryptor PERSONAL edition now! It lets easy encryption of files, folders and e-mail attachments with a single click. It protects whole disks and makes safe virtual disks. Also protects portable flash and USB disks using state of the art encryption methods. It includes many innovative functions such as data shredder for safe data removal, password manager and many more. DisCryptor PERSONAL is the second most popular private key download.
See also: discryptor, security, encryption, shredder, full disk encryption, hard disk encryption, disk encryption, hard disk encryption, steganography, usb token, password manager, key manager, privacy, private key, secret, secret key, protection, public key
Leo Backup is a software designed for Windows and intended for backing up your data in various locations, including secure servers (SFTP and FTP/SSL) and network drives. Interface password and special authorization methods provide you with indispensable safety level. Effective file protection and access verification options also let you keep your network and data intact, and maintain a stable and secure company management. Leo Backup is the third most popular private key download.
See also: backup, security, SFTP, secure FTP, secure backup, scheduled backup, protection, access, service mode, restore, FTP/SSL, servers, Active Directory, encryption, compression, reporting, remote backup, filter, private key, Public Key, authorization, COM
Sign PDF documents using X.509 certificates in PKCS#12 format, which evolved from the PFX (Personal inFormation eXchange) standard and is used to exchange public and private objects in a single file. PKCS#12 usually stores a private key with the appropriate public key certificate. The software features bulk signing that enables you to sign multiple PDF files in batch by selecting input and output directory. Folder-on-watch feature is available.
See also: sign, pdf, signature, signer, signing, digital, certificate, PKCS, x509, PFX, private key, public key, eletronic, stamp
Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
See also: automated file, data, encryption software, encrypt, decrypt, pgp, openpgp, automation, schedule, password, private key, public key, open pgp, openpgp private key
Win Key Genie3.1 Automatically saves all typed text. It can be retrieved with [ALT UP Arrow] or [ALT DOWN Arrow]. Auto Type tries to recognize duplicate words being typed and lets you auto complete the word by hitting the TAB key. [a href="http://www.vsisystems.com"]www.vsisystems.com[/a] - Vsisoftware.com
See also: win, key, genie, doskey, key, logger, keyboard, track, auto, save, vsisystems, szamody
Puffer is a general purpose 256-bit AES encryption utility for protecting your most sensitive data. Use Puffer to securely exchange email with other Puffer users via the 2048-bit Diffie-Hellman key exchange function. Compress and encrypt your data files into zip-style PUF archives. Use steganography to hide data among the pixels of image files. Distribute self-decrypting archives to non-Puffer users. Permanently erase data with wipe functions.
See also: puffer, archive, compression, encryption, security, email, wipe, public key, AES, stego, steganography
With Taskbar Hide you can fully control the taskbar.Hide windows program (hide applications) or close them completely through a hotkey,or minimize them to system tray.Hide some less used icons from system tray.Reorder the windows on taskbar based on your choice.Change the icon and title of any window.Automatically maximize all new windows or only new IE windows.Set any application window always on top or show it's property.
See also: hide windows tool, minimize to tray, stay on top window, hide task, game hide, hide icons, hide windows taskbar, hide applications, hide program, hide window, boss key, hide windows, maximize windows, max ie second window, maximize ie window
AllKeys is keyboard-based macro recording software that offers: 1)Macro Engine. Allows you to turn repetitive tasks into simple shortcut keys. Includes macro recording functions and user-friendly macro editor 2)Keyboard Based Mousing. Using the mouse box, you can do all the major mouse actions with keyboard commands only. 3)Work and Break Timer. Lets you set your own break schedule and tracks work time, key presses, and mouse use.
See also: macro, timer, mouse replacement, keyboard, reduced strain, ergonomic, balanced computing, software, strain, repetitive, RSI, keys, mouseless navigation, breaks, balanced, efficiency, mouse, ergonomic, keyboard-based, key-swapping, key-remapping
Power Mixer is an advanced Windows audio mixer, a complete replacement for the standard Volume Control. This application lets you easily change the sound volume by simply rotating the mouse wheel or using keyboard hot keys. It includes an audio mixer with advanced volume controls support, a scheduler, on-screen display, command line support, the ability to store and recall different unlimited presets via one mouse click or system-wide hot keys.
See also: audio mixer, windows audio mixer, sound mixer, power mixer, volume control, volume control replacement, audio, sound, presets, hot key, bass, treble, OSD, utility, windows
SecurityPlus is a powerful encryption and decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on the fly encryption, decryption. SecurityPlus is very fast and will not take long to encrypt, decrypt even large files including files on CD-ROM. Current passwords (keys) can be quickly cleared and files can be safely deleted (shredded
See also: encryption, decryption, encrypt, decrypt, security, secure, files, thumbnails, CRC, viewer, password, file, JPG, option, shredded, shred, slideshow, slide, show, key, protection, protect, data, confidential, plus, securityplus, softbyte, folder
USB drive recovery utility recovers any deleted file format and folders. Restoration tool retrieve accidentally formatted files folders. Safely restore lost erased data. Software detects and repairs all missing corrupted damaged audio video picture images text doc and database files due to malfunctions virus infection and restore on disk. Supports all USB drive like pen drive flash drive memory stick thumb drive key drive. Compatible with Windows
See also: restore, USB drive, recovery, download, lost, data, software, retrieve, formatted, pen, recover, thumb drive, corrupted, fetch, restoration, retrieval, utility, video, Memory stick, deleted, key, flash drive, mp3, images, mini, audio, photos, picture
HotKey Program, Launch applications, documents, and URLs, and over 80 other actions to hot keys
- Control your Winamp player
- Hide application windows
- Open, Play and close your CD-ROM
- Change the volume, mute
- Logon and Power management
- Open dialup connections
- Empty recycle bin
- Create New Folder
- Lock/Unlock Desktop
- Show/Hide Windows
- Show/Hide Icons from Desktop
- Restart Explorer
- Lock/Unlock Mouse
See also: Hotkey, Manager, Keyboard, macro, utility, Hot, Key, manager, control, CD-ROM, Winamp, Window, shortcut, manager, for, windows
Advanced File Shredder securely erases files or folders on your PC using seven pass US Government standard wiping and cryptographically strong random number key. Files shredded with the help of this software cannot be restored by any data recovery utility. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like business or financial information can be easily recovered.
See also: cleaner, eraser, file, software, shredder, folder, cryptography, strong, random, numbers, key, erase, secure, security, erase file, erase cookies, erase history, erase files, temporary internet files, erase ie cache, ie cache, file eraser, shred
Easy Hide Files lets hiding files and folders from viewing, accessing and searching completely, so that only you know that those files or folders exist. No matter how particular computer (over local network, from internet or directly) is accessed, those folders stay invisible and safe.
See also: stealth mode, hide files, hide taskbar items, hide taskbar, hide windows, boss, key, windows program, hidden, windows, stealth mode, hide files, all folders, password protection, hide folders, sensitive folders, hidden files, best way, hide, folders
MySQL to MSSQL DB converter tool migrate database records of MySQL server into MSSQL server in quick and secure way. Database converter software is fully capable to convert large volume of database or selected particular table, record easily and efficiently. Tool provides full support to MySQL attributes and data types and compatible with all major versions of MySQL and MSSQL DB server. Convertor tool is compatible with all version of windows OS.
See also: Download, free, MySQL server, Microsoft SQL server, database, conversion, tool, converts, tables, records, attributes, rows, columns, primary key, unique key, foreign key, indexes, software, supports, data types, maintain, data integrity, null values
The software allows a user to make a file of frequently used phrases, paragraphs, email addresses, macros, clipboard entries, scripts, etc. and use them in any application just by typing a short abbreviation (text shortcut) or pressing a hotkey. The Perfect Keyboard supports macro recording so that user can simply record macros rather than software them. The Perfect Keyboard scripting language contains 150+ commands.
See also: macro, keyboard, key, keystroke, automation, script, debugger, automate, fast, typing, recorder, clipboard, enhancement
MouseRobot is not only a visual macro script editor, mouse recorder, macro player and keyboard recorder, but also a powerful windows scheduler and automation macro editor. All recorded keyboard and mouse actions can be saved as a macro, bound to hotkeys, extended with custom commands or converted to an executable. MouseRobot automation utility will save you a lot of time on repetitive work.
See also: action, keyboard macro, mouse, keyboard, repeat, visual, play, tasks, automate, key combination, keystroke, backup, autoit, macro, key, actions, excel, start programs, tool, script editor, scheduling, mouse macro, macros, office, scheduler
Use advance USB Drive Restore software to regain all your lost or misplaced files and folders data from different kinds of storage media devices like memory card, USB drive. For more details Software is available at www.restoreusbdrive.com website.
See also: Professional, DDR, recovery, software, salvage, recover, lost, accidentally, deleted, images, snaps, screensavers, songs, mp3, music, restoration, application, regain, missing, erased, audio, video, clips, USB, flash, key, jump, drive, HDD
MAC Digital Picture Recovery utility for Apple Operating system X recall office picture files lost due to rebooting hard disk from floppy disk drive by a easy downloading process from www.recoverfilemac.com
See also: MAC, digital, picture, recovery, tool, recovers, lost, wedding, albums, PDA, recall, regain, return, restore, retrieve, revive, corrupted, deleted, formatted, pictures, photos, images, snapshots, thumbnails, key, chain
MS Access to MySQL database transformation software migrate database tables, rows, columns, indexes from Microsoft Access to MySQL database server. Microsoft Access to MySQL database conversion software translates password protected Microsoft Access database file into MySQL database. Microsoft Access to MySQL database migration tool maintains database integrity and support database attributes like data types, default values, primary key, entities, table constraints etc.
See also: Access, tool, MySQL, database, convertor, table, row, columns, primary, key, data, types, attributes, indexes, entities, default, null, values, files, folders, utility, software, records, transform, password, protected, constraints, server
Database conversion software capable to convert entire or selected database records into MySQL database formats. MSSQL to MySQL data base conversion software support all version of MSSQL and MySQL server with highly user interactive GUI interface. Database migration application maintains database consistency and integrity with multi byte Unicode architecture character sets. Software easily use with all windows OS like Vista, XP etc.
See also: Database, records, files, convertor, software, transform, selected, MSSQL, MySQL, server, table, foreign key, null, indexes, triggers, constraints, windows, primary key, migration, program, normalize, versions, conversion, synchronizer, application
Easily available PenDrive Data Recovery software at company website www.pendrivedatarecovery.org empowers user to retrieve all misplaced or lost data from commonly used pen drive eve if common system generated message like disk not found, invalid directory etc display on user screen.
See also: Application, regain, delete, audio, video, clips, picture, document, file, folder, damage, sabotage, pen, thumb, key, flash, drive, software, recover, undelete, formatted, snaps, wallpaper, USB, device, utility, scan, search, retrieve, erased, data
USB Drive Files Recovery software provides interactive user friendly graphical interface and does not require any tech training or support to regain deleted data. Innovative image recovery software downloads from www.usbdrivedatarecovery.com to restore formatted significant files. Effective formatted video file retrieval application provides quick solution regains data, photograph and image from any physically damage removable storage device.
See also: File, restoration, software, recovers, missing, lost, data, folders, pen, key, drive, wallpaper, recovery, application, restore, revive, photographs, images, regain, utility, damage, destroy, USB, device, audio, video, free, download, program
PassCryptor keeps your passwords safe with strong encryption using the Twofish Cypher. You don't have to remember all your passwords anymore with this easy to use management tool. Includes one-click link and copy password to clipboard features. Free 30 day trial version. Twofish is a block cipher by Counterpane Labs. It was one of the five Advanced Encryption Standard (AES) finalists.
See also: passwords, personal, software, program, database, pim, encode, code, private, privacy, Blowfish, Twofish, save, decrypt, encrypt, encrypted, encryption, management, cypher, password
FEP is a Triple product for users to make private data secure,be consisted of FProtector,Exemonitor,private firewall.Fprotector can lock or hide any number files and folders,exe monitor do complete control of programs that to be ran,private firewall control program access network and show you the info of ports mapping to its process.
See also: security, system, firewall, private, protector, protect, hide, lock, files, flie, privacy, exe, monitor
It helps mobile end users to hide and manage incoming short messages (SMS) and phone call logs, It can defend the private informations very well, It can take control your Phonecall(BlackList Filter, Personalized call rejections for each of the members, Records Phonecall).Enjoy your privacy and right, Private Call&Sms Guard?ACM + NumSMS + CallRecorder + BlackList + AutoLock + File security
See also: Protect private informations, Encrypt sms, Secret sms, Protect call, Hide Sms, Hide Call, Reject Call, Private, Call, Sms, Advanced, Blaclist, Strong function
This product combines 16 Windows cleaning and optimization tools to keep your system running quick and secure. Hard Drive Washer deletes unnecessary data, Surf Trail Washer deletes your internet trail, Registry Washer cleans up your Registry. Startup Booster lets you to configure your Windows startup, File Washer erases data completely and File Encrypter can hide it. With Settings Organizer you configure or tune up your system ... and much more!
See also: cleaning, washing, clean, wash, security, privacy, speed, secure, private, unnecessary, orphaned, entry, entries, data, file, files, keys, help, value, logs, trail, temporary, history, installed, speed, log, logfiles, bak, $$$, tmp, cookies, typed, urls, address, bar, backup, analyze
This software organizes all your personal contact data quick and easily. It starts directly without annoying splash screens and anything you enter is saved automatically. Access can be protected with a password and you decide where the data is located. Search for single entries using wild cards in each part of it. Get a result table with all entries matching your search. You can also sort the whole list or the filtered data with just one click!
See also: personal, address, addresses, name, first, last, street, p.o.box, telephone, phone, mobile, handy, fax, e-mail, website, homepage, sort, protect, password, sqlite, database, organize, order, alphabetical, contact, contacts, business, private, manager, management, secure, easy, use
All bar-coded products are in present market ranging from tiny to large industries and if you want to speed-up, your business rather than wasting time in managing data entry process manually, download and install Bar code Label Maker tool available on www.employeesalarysoftware.com website.
See also: Professional, card, generating, software, utility, develop, security, guard, travel, agent, proof, label, producer, application, uses, size, shape, color, line, text, ellipse, arc, objects, creating, customized, badge, private, company