transparently with free software


Search results for tag «transparently with»:

Encrypted Magic Folders 06.09.1 Encrypted Magic Folders 06.09.1
… s. EMF is so fast and transparent you'll soon forget you're using encrypted files. Laptop users find Encrypted Magic Folders invaluable for protecting any business or personal data they wouldn't want a thief to have should their laptop be stolen.… 

DVD Subtitle Player 1.0 DVD Subtitle Player 1.0
… DVD Subtitle Player - play subtitles over your favorite DVDDivX player transparently. DVD Subtitle Player is a tool that helps you to play subtitles.… 

DESlock+ 3.2.5 DESlock+ 3.2.5
… ccepts a software Key-File. Limitations 60 days trial Requirements Registration for a 60 day licence is required.… 

StartupMonitor 1.02 StartupMonitor 1.02
… stry. StartupMonitor has been tested on Windows 98, Windows 98SE, Windows ME, Windows NT 4.0, Windows 2, and Windows XP; unfortunately, it does not function correctly under Windows 95 because of some unimplemented routines in the operating system.… 

Feebe SecureDisk 2.1 Feebe SecureDisk 2.1
… use Simulate hard disk operation to keep your habit Access data transparent Very fast, you will not feel a time delay Store data anywhere No administrator permission needed Limitations You must register to create disk more than 32Mb… 

OmniAudit 1.12 OmniAudit 1.12
… a gets changed by any particular function of the software. Find unintentional side-effects faster and easier. Quality Assurance functions can validate data altering features more quickly and with greater accuracy. Limitations Limited to 30 days.… 

CryptNote 1.01 CryptNote 1.01
…  with the AES/Rijndael algorithm. All you have to do is type a password when prompted and use it like the Notepad. CryptNote is totally self-contained, dependency-free, needs no installation and does not add or alter any file or registry settings.… 

TeleDesktop 5.01 TeleDesktop 5.01
… choice for telecommuting and remote computer administrating. It allows a Windows computer to be operated by another Windows computer from anywhere just like sitting in front of the remote computer. It can penetrate firewall and proxy server, work transparently with dynamic IP addresses, transfer… 

Encrypted Briefcase Personal 2.6 Encrypted Briefcase Personal 2.6
… out the leaking of sensitive business data if the computer is stolen. This file and folder encryption software runs under Windows 2000/XP/Server 2003 and supports FAT/FAT32/NTFS. It still works under Windows Safe Mode. Limitations 20 days… 

Number to Text 1.6.2 Number to Text 1.6.2
…  left of the decimal and 119 to the right). If you are a software developer who would like to include Number to Text's functionality transparently in your program, please contact the producer. Requirements Microsoft Visual Basic Run-time Files… 


Related: