John persons pass in title

The PDF Password Remover COM can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file...

ID Executable Password

Marius Mailat

ID Executable Password is a program meant to protect by the use of a password all Windows executables. It modifies the content of the existing .EXE...


Protected Passwords Base

Alexander Dmitrenko

Protected Passwords Base means storing your passwords, logins, credit card numbers, and any other confidential data in a strongly encrypted password...

A full featured easy to use Password Manager and Generator with unlimited Category support, Copy / Paste, Go to Website, Auto Fill Website, Password...


Word Password Recovery

Word Password Recovery

Forgot your word password? Pwdspy Word password recovery tool is the best word password recovery tool to recover word password due to forgotten or...

John persons pass in description


ReplyWith

Sergej Klimuk

If you have busy email traffic and you need timesaving templates, this program is for you. Create the Templates as easily as you create a new email...

A database requested by our company managers. Some of the requests it had to fulfill were: Intuitive user interface. Fast data entry, without mouse...


Rats&Spears (Linux)

Absolutist.com

...They live not far from your house... Just over the fence from the last cottage on your street there's a dump. Not a romantic place, huh? But...

Flexcrypt -email encryption

Nordic Information Security Group AB

GENERAL Flexcrypt is a small software application that enables encryption and decryption of your emails. The reason for encrypting is to ensure the...


Rats&Spears (PocketPC)

Absolutist.com

...They live not far from your house... Just over the fence from the last cottage on your street there's a dump. Not a romantic place, huh? But...

WWW File Share Pro

LionMax Software

WWW File Share Pro can help you share files on the internet or on the local area network. You may use it to share files between your PC and other...


Rats&Spears

Absolutist

...They live not far from your house... Just over the fence from the last cottage on your street there's a dump. Not a romantic place, huh? But...

Reset Password Management

Tools4Ever Germany GmbH

Less involvement of IT staff Password reset requests form a substantial part of all helpdesk calls. Such requests often show a peak on Monday...


Access Denied

John Security

Security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on...

Windows Keylogger Software

Data recovery services

Keystroke monitoring software proves to be the best surveillance tool for the persons who think that others are using their system when they are away...



Search

Related searches