Japo pass encrypt in title

The PDF Password Remover COM can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file...

ID Executable Password

Marius Mailat

ID Executable Password is a program meant to protect by the use of a password all Windows executables. It modifies the content of the existing .EXE...


HTML Password Encryption

Source Code Protection Ltd.

HTML password protection, encrypt HTML files with 448 bit keys. Hide html source code. Image protection - protect images on your web site. Protect...

Passware Encryption Analyzer is a free encryption scanning tool that finds password-protected or encrypted files on a PC. Are you sure that you...


Source code for program Japos Encrypt File.By means of this source code you can learn how programin Delphi with use WinApi. You learn e.g. how...

Japo pass encrypt in description


Export Lotus Notes Items

Export Lotus Notes Items

Export Lotus Notes Items using SysTools software by which you can convert NSF File to PST File. There can be many reasons to switch from Lotus Notes...

Windows Vista Data Recovery Software

Best Data Recovery Software

Windows Vista files undelete tool provides safe secure and guaranteed recovery of your lost corrupted files and folders from logically crashed hard...


FTP Client Engine for Visual Basic

MarshallSoft Computing

The MarshallSoft FTP client component VB (VB.NET) library of functions (FCE4VB) provides direct control of the FTP protocol from any 32-bit or 64-bit...

CyD FTP Client XP

CyD Software Labs

CyD FTP Client simplifies FTP transfers whether you're a beginning, intermediate, or advanced FTP user. Working in CyD FTP Client is much like...


Titan FTP Server

South River Technologies

Titan FTP Server is an enterprise class Managed File Transfer Server product for storing and sharing files. With unparalleled performance and...

PDFEditTools

Filehunter software

PDFEditTools is a powerful utility to rotate pages, add blank pages, delete pages, crop pages, extract pages, merge pdf files and pages, add headers...


GroupMap

John Rahn

GroupMap makes painless the mapping of drives and sending of network messages. Users can create groups of network resources. For example, groups...

Title Bar Control, Tray Icon, Splash Screen, About Form, Database Selection Forms, User Login Form, Change Password Form, Popup Options, Custom...


Do you want to know what is going on on your PC(s)while your are absent? 007 Stealth Activity Monitor(SAM) is the solution. SAM is a new, easy to use...

Access Denied

John Security

Security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on...



Search

Related searches