Password Recovery Console 2.52.050505
The Password Recovery Console is a web-based application that enables the delegation of password recovery privileges. The Password Recovery Console interface can be accessed from any networked system, and can be configured to allow specific users in your enterprise to recover the password of any or all accounts that have been set and stored by User Manager Pro and/or Random Password Manager. The Password Recovery Console offers granular control.
See also: 2000, LANICU, HIPAA, SOX, Security, Management, Pwdump, Passwords, Hash, Migration, SAM, single sign on, forgot password, Common Credentials, Password Reset, Help Desk, 2003, Microsoft
Random Password Manager Enterprise Ed. 1.19.050623
Password randomization of your common accounts on all your systems. Web based interface allows your Help Desk to get the current password in effect for each system. SQL Server based solution.
See also: 2000, LANICU, HIPAA, SOX, Security, Management, Pwdump, Passwords, Hash, Migration, SAM, single sign on, forgot password, Common Credentials, Password Reset, Help Desk, SQL Server, 2003, Microsoft
User Manager Pro 6.02.050712
Rapid mass management of security on servers/workstations. Allows system administrators to report on and make global changes to local user credentials, groups, rights, registry settings, and more across an entire network in a single operation.
See also: 2003, 2000, UMP, LANICU, SMS, Password Recovery, Random Password, Terminal Server, Viruses, VNC, Registry, Common Password, Password, Global Groups, Local Groups, Administrator, WUS, SUS, event log, Shares, WMI, HIPAA, SOX, Security, Management, Microsoft
Encrypt & Decrypt PDF 1.00
Encrypt & Decrypt PDF allows you to Encrypt and Decrypt protected Adobe Acrobat PDF files in batch mode. With this software, you may freely secure your PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged, and you also may remove the password of your PDF files, if you already know the owner or user password. All versions of Adobe Acrobat are supported.
See also: remove password pdf, PDF pasword failure, pdf password remover rc4, PDF password failure, pdf password recovery, pdf password remove, pasword pdf, pasword killer, password killer, password pdf, decrypt secure pdf, Decrypt PDF, acrobat password, pdf pasword remover, PDF Secure, pdf Encrypt, pdf Decrypt, pdf pasword recovery, pdf password remover, Encrypt PDF, PDF Encryption, pdf print security remover, Document password retriever, PDF Security, recovery pasword pdf, recovery password pdf, remove pasword pdf, batch PDF, encrypt acrobat
Allows character based apps (DOS-Windows-Unix-Linux) to print to ANY Windows printer, including USB, network printers, faxmodems and PDF writers. It can also capture LPT out and redirect the jobs, even if a printer is phisically connected to the port.
Once configured, it will allows you to preview printing, include logos and background images, send the jobs via fax, use special fonts, colorize the text, export in PDF format and much more.
See also: ms-dos, secure, password, wmf, bmp, pdf, download, shareware, settings, transparent, transparent-print, emulator, terminal, Terminal Emulator, barcodes, all-in-one, GDI, USB, usb, fax, network, preview, images, dosprn, background, prn2file, printfil, PRINTFIL, Linux, Unix, Dos, printers, applications, encryption
Public Access Desktop 2.7
Make a foolproof public access workstation, protect the critical files, and manage applications to be run. You can create an Internet Kiosk for cybercafe, library information terminal, in-store terminal or restrict children activities on home PC, etc. Set the proper type of access to a locked desktop such as user-name and password authentication, time-locked code (that allows users to access PC for a given period only) or a combination of both.
See also: lock, privacy, protect, password, restrict, safely, security, administrator, control, workstation, foolproof, desktop, access, public, screen
Passwords is a database that allows you to store and encrypt all of your passwords and account numbers in an easy to retrieve format. Additional data for credit cards,investments, insurance, lease, loans. Modifiable categories and entries give much needed flexibility.
See also: Insurance, Mortgages, College Loans, Investments, Credit Cards, Lines, Password
Digital PhotoRescue Professional 4.3
Recover lost data from a host of multimedia devices ranging from digital cameras, PDAs and mobile phones to PC Hard Drives. The program supports recovery from CompactFlash cards (type I/II), IBM Microdrives, SmartMedia cards, MultiMedia cards (MMCs), Secure Digital (SD) cards, Memory Sticks and CD/DVD disks and can recover a wide range of file formats: JPEG, GIF, BMP, CRW, etc.
See also: PhotoCamera, camera, flash memory, MMC, USB drive, MiniDisk, floppy, hard drive, HDD, DVD, Memory Stick, Cards LinearFlash, Secure Digital, Multimedia, MicroDrive, IBM, CompactFlash, SmartMedia, password recovery, data recovery, card, flash, undelete, recovery, rescue, photography, photo, image, picture, digital, handheld PC, Palm, GSM phone, camera, FlashBack, return
Calendarscope is a full-featured calendar program for planning, managing, and scheduling appointments, important dates, and tasks. It allows you to view all your events in standard calendar views and supports to-do lists. Reminder windows have customizable colors, fonts, and may contain web URLs. The program supports color-coded item types, various printing styles, alarms, Web calendars. Synchronization with Pocket PC and Palm OS handhelds.
See also: backup, encrypt, password, security, pim, web, week, handheld, PDA, pocket pc, month, day, schedule, planner, time, pilot, visor, handheld, palm, event, task, organizer, reminder, appointment, alarm, calendarscope, calendar, memo
QuickHash Library 3.0
Fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, streaming data. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB), C, C++.
See also: digital, authentication, sum, checking, check, bit, 128, encrypt, encryption, basic, visual, component, .TLB, .LIB, .DLL, CRC16, CRC32, SHA2, SHA1, password, key, memory, block, data, string, file, algorithm, hmac, crc, checksum, digest, message, hash, signature
Program Selector Pro 98/ME 4.3
Program Selector Pro provides access control and usage management. Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor level password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.
See also: password protection, access control, computer security
1 Cool Password Tool 1.0.1
1 Cool Password Tool is the most fully-featured application available for adding password protection to your web-site. With its powerful template-driven interface, you can create multiple passwords for any page on your web site, without any programming knowledge at all. You can easily customize the design of the password-entry page to suit the rest of your site.
See also: password protection, secured page, password page, security, page, password, flash password, java password
Advanced Encryption Package 2006 4.4.11
AEP2006's most noteworthy feature may be its flexibility and military grade encryption: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run witthout needing AEP2006. The program includes a file shredder that wipes the contents of your original files. Complete support for .zip archives. Skinnable interface (+12 skins)! Complete Command Line Interface support.
See also: des, cast, rijndael, winzip, pkzip, unzip, blowfish.zip, shred, ecnrypted, extracted, blowfish, protect, password, encryptor, encrypt, blowfish
FaceCode v - 2.0
Ideal for your home and office PC, FaceCode is a user friendly face recognition PC logon software. FaceCode is the only product using advance face recognition technology to control the access to your computer. Faceode verify the identity of the user and logs them on to their personal account. FaceCode support logon both to Windows and Domain accounts.
See also: user, security, biometrics, log on, access control, Logon, Face recognition, password, protection
PDF-Recover can be used to decrypt protected PDF files, which have "owner" password set. PDF-Recover will allow to reset decrypted files and provide without any restrictions. pdf-Recover creates a 1:1 copy of your PDF-file without any password limitations, that means you can edit, copy and print texts and images of this document.
See also: password recovery, recovery, decrypted, recover, password, pdf, decrypt
A powerful shareware encryption utility that allows you to create a virtual encrypted drive on your PC. Has an intuitive and easy-to-use interface. Hide & encrypt your important files and folders using strong 448 bit encryption! You can protect all types of files - be it email, databases, spreadsheets, text, graphics, audio or even video on your hard drives, CDs, DVDs, or USB devices.
See also: hide pix, hide files, hide folders, blowfish encryption, hide folder, folder encryption, encrypt files, encrypt hard drive, secure email, protect file, lock file, password protect file, hide pictures, hide file, encryption software, strong encryption, AES, 128 bit encryption, encryption program, email encryption, data encryption, file encryption, encryption, encrypt file, encrypt, encryption software, hide pics, hide any file, folder lock, file lock software, password protect files, folder protect, blowfish, data encryption software, file encryption software
Password Generator 2005 Professional 1.5.1756
Password Generator 2005 Professional is a professional random password and username generator, designed for system administrators and IT professionals. It features character selection & density controls; advanced masks & password templates; words and custom strings in passwords; full database support, including export and import capabilities; pronounceable password generator; user-friendly interface; many usability features including undo/redo.
See also: dictionary, characters, masked, masks, keygen, username, string, keycode, generator, password, random
Folder Guard Professional 7.5
Folder Guard Professional for Windows XP/2000/Me/98 - Powerful security and access control utility that lets you hide or password-protect files and folders, restrict access to Control Panel, and more. Makes folders invisible to any application, including Explorer, Office, command prompt. Highly customizable and user friendly. For personal systems or corporate networks. Evaluation version is fully functional. http://www.winability.com/
See also: access control, password protection, computer security, restrict access, hide folder
Zeus Internet Marketing Robot 3.1.2
Zeus is an easy-to-use Intelligent, Internet Robot, that creates traffic to your web site. Generate thousands of link trades by finding web sites and automating 95% of the work in Link Marketing. The original and only robotic, link trading tool. Zeus walks the web using keywords to find 100-150 quality ThemeSites daily. 1-click Themed Link Directory update, to your web site (Zeus exclusive). The Internet's most widely used Link Trading tool.
See also: exchange links, link trade, link promotions, reciprocal links, Zeus, Internet marketing, link exchange, web site marketing, link popularity, web site traffic, trade links, search engine marketing, seo, optimization, optimize, common sense marketing
mcm MCD 1.0.0
gcd and lcm for any type and amount of numbers. Two are the aspects that distinguish this small software from others of its genre: the amount of numbers to be analyzed and the type of numbers to analyze. There are no limits on the amount of numbers on which to calculate lcm and gcd. A walkthrough will guide you through data entry, following four well-defined phases.
See also: utilities, least common multiple, greatest common divisor, lcm, gcd, lcm mcd, mathematics, downloads, free