Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: password
Advertising
Display: short descriptions | full descriptions
  • Navicat Premium is a database administration tool that allows you to simultaneously connect to MySQL, MariaDB, SQL Server, Oracle, PostgreSQL, and SQLite databases from a single application. It combines functions of other Navicat products and supports most of the features, allow you to transfer the data across different database, provide other advantageous features include an Import or Export Wizard, Query Builder, Report Builder, Data Synchronization, Backup, Job Scheduler etc.One of the most powerful features should be Navicat Cloud, it allows you sync connection settings and queries to the cloud in order to get real-time queries and connections at anytime and anywhere.For the Secure Connection, Navicat allows user to establish secure SSH sessions through SSH Tunneling, ensuring strong authentication and secure encryption between two hosts.The authentication method can use a password or a public/private key pair. Navicat also comes with HTTP Tunneling, allowing you to bypass ISP restrictions on direct datab ...
  • Navicat Premium is a database administration tool that allows you to simultaneously connect to MySQL, MariaDB, SQL Server, Oracle, PostgreSQL, and SQLite databases from a single application. It combines functions of other Navicat products and supports most of the features, allow you to transfer the data across different database, provide other advantageous features include an Import or Export Wizard, Query Builder, Report Builder, Data Synchronization, Backup, Job Scheduler etc. One of the most powerful features should be Navicat Cloud, it allows you sync connection settings and queries to the cloud in order to get real-time queries and connections at anytime and anywhere. For the Secure Connection, Navicat allows user to establish secure SSH sessions through SSH Tunneling, ensuring strong authentication and secure encryption between two hosts. The authentication method can use a password or a public/private key pair. Navicat also comes with HTTP Tunneling, allowing you to bypass ISP restrictions on direct ...
  • Navicat for Oracle suit with Oracle database servers from version 8i or above and supports most of the latest Oracle objects features, including Directory, Tablespace, Synonym, Materialized View, Trigger, Sequence, Type etc. By using the new feature of Navicat Cloud, developers can sync their connection settings and queries to the cloud. For that reason, they can get real-time queries and connections anytime and anywhere and make use of every minute of the day to enhance the working productivity. The major features of Navicat for Oracle are as following.Firstly, secure connection. Navicat allows developers to establish secure SSH sessions through SSH Tunneling, ensuring strong authentication and secure encryption between two hosts. The authentication method can use a password or a public/private key pair. Secondly, object designer. Developer can create, modify, and design database objects using professional object designers, available for all database objects such as Tables, Views, Functions/Procedures, Ind ...
  • Navicat for Oracle suit with Oracle database servers from version 8i or above and supports most of the latest Oracle objects features, including Directory, Tablespace, Synonym, Materialized View, Trigger, Sequence, Type etc. By using the new feature of Navicat Cloud, developers can sync their connection settings and queries to the cloud. For that reason, they can get real-time queries and connections anytime and anywhere and make use of every minute of the day to enhance the working productivity. The major features of Navicat for Oracle are as following.Firstly, secure connection. Navicat allows developers to establish secure SSH sessions through SSH Tunneling, ensuring strong authentication and secure encryption between two hosts. The authentication method can use a password or a public/private key pair. Secondly, object designer. Developer can create, modify, and design database objects using professional object designers, available for all database objects such as Tables, Views, Functions/Procedures, Ind ...
  • Navicat for Oracle suit with Oracle database servers from version 8i or above and supports most of the latest Oracle objects features, including Directory,Tablespace,Synonym, Materialized View,Trigger,Sequence,Type etc.By using the new feature of Navicat Cloud, developers can sync their connection settings and queries to the cloud.For that reason, they can get real-time queries and connections anytime and anywhere and make use of every minute of the day to enhance the working productivity.The major features of Navicat for Oracle are as following.Firstly,secure connection. Navicat allows developers to establish secure SSH sessions through SSH Tunneling,ensuring strong authentication and secure encryption between two hosts.The authentication method can use a password or a public or private key pair. Secondly, object designer. Developer can create, modify, and design database objects using professional object designers, available for all database objects such as Tables, Views, Functions or Procedures, Indexes, T ...
  • Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
  • Secure IT File Encryption Software password protects all your files and folders. Built-in compression to save storage space. Integrated shredder allows permanent file deletion. Secure e-mail module and full command line support. Encrypt and lock folder, any data on any disk drive including removable drives such as USB, flash drive, memory stick, CD/DVD. Works on all 32-bit and 64-bit versions of Windows including Windows 10 & Windows 8.x.
  • The Gantt Chart for Workgroup is extremely easy-in-use project plan system with the additional capability to share data over the network. This system allows you to specify complex tasks sequences - a task or multiple tasks can be required to be completed before other tasks can be started. You can edit task dependencies, create new task connectors and re-schedule individual tasks. The program has data import, export and password protection.
  • Premier Suite of all Kellerman Software applications. Easily add FTP or SFTP operations to your .NET application. Compare databases with AccessDiff. Encrypt credit cards, passwords, and files with the Encryption Library. Log to any target with the Kellerman Logger. Generate Unit Tests from your VB.NET or C# source code. Enhance your Winform application with the Themed Wizard. Object Database and ORM too! Download a free trial today.
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Readers of Visual Studio Magazine named the .NET Encryption Library a winner in the Security and Copy Protection category. Encrypt sensitive information such as passwords, credit cards and social security numbers. Supports Rijndael (AES), DES, TripleDES, RC2, Blowfish, Twofish, Whirlpool, MD2, MD4, MD5, SHA1, SHA2, HAVAL, GOST, Ripend320, FCS16, FCS32, CRC32, Adler32, X509, UUencode, Base64, GZip, and Deflate.
  • Keylogger Spy Software secretly logs Facebook, Skype keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Monitor secretly monitors Facebook, Skype, chats, emails, keystrokes, websites visited, social network activity, passwords and sends reports to your email or ftp. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the truth.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype IMs. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Zip Password is advanced and extremely fast password recovery tool for WinZip archives with a standard Zip 2.0 (.zip) or new AES (.zipx) encryption. Several configurable attacks can be queued: Dictionary, Brute-force and Mixed (combinations of independent parts based on dictionary, brute-force or fixed). Virtually endless number of combinations for mixed attacks. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization.
  • Firefox Password by Thegrideon Software is advanced password recovery and decryption tool for Mozilla Firefox. Firefox Password allows you to recover Master Password as well as logins and passwords saved in Firefox cache (signons.sqlite, logins.json). Several configurable attacks are available for Master Password recovery. Highly optimized code (SSE, AVX) guarantees maximum performance (e.g. more than a million passwords per second on Intel i3).
  • Project Password is advanced and extremely fast password recovery tool for MS Project files (.mpp) and templates (.mpt). All versions are supported. Passwords for MS Project files upto the version 2003 are recoverable instantly. Several configurable password recovery attacks are available for MS Project 2007-2016 files. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • PowerPoint Password is advanced and extremely fast password recovery tool for MS PowerPoint presentations (.ppt, .pptx) and templates (.pot, .potx). All versions (including PowerPoint 2016) are supported. Write-protection passwords are recoverable instantly. Several configurable attacks are available for password to open recovery. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • Passwords in web browsers are hidden behind asterisks. This is for your protection, but what if you need to see what you are typing, or trying to recover or copy a saved password from behind the asterisks? Use ISeePass. It's a tiny bookmarklet that instantly reveals all password on a web page. ISeePass works in web browsers across PCs, tablets and smartphones, running Android, iOS, Linux, Mac OS, Windows, and more.
  • Windows Spy Software secretly logs Facebook, keystrokes, Skype, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Outlook Passwords Recovery and account settings backup is now free with Outlook Password Recovery module offered by our company. Simple download the tool and run the report called Accounts and Passwords. It is absollutely free option which can be used without limits. Backup Outlook passwords and account settings, save them to Excel, move your Outlook accounts to another computer, recover your lost Outlook passwords with this free Outlook Password Decryptor. But not only this, the software provides other usefull options and repors which can be evaluated. The tool allows to export Outlook emails, contacts and other records to separate files on your file system and preserve the Outlook folders structure. Email forensic option provides the wide access to the Outlook message tags and properties so nothing can be hidden from your eyes. But not only this, with the same outlooktransfer.com tool you may extract email addresses for your mail sending database.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
Advertising

Page 7 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware