Key Password Zip

OutlookEX Recovery

OutlookEX Recovery is a powerful email recovery tool which recovers accidentally deleted, damaged or corrupted MS Outlook Express emails from *.dbx files. This email recovery software will save the recovered emails in the *.eml format which can then be ...

InDisc Recovery

inDisc Recovery is a powerful CD and DVD data recovery software. It is specifically designed to recover any type of deleted, lost or unreadable files, folders, audio and videos from damaged, scratched or defective CD and DVD discs created by Ahead Nero ...

FTP Client Engine for C/C++  v.3.3


- Supports S/KEY password encryption.
Fully compatible with Visual Studio.NET (.NET Framework). Supports most Windows C/C++ compilers (Microsoft (all versions Visual C++. Visual Studio), C++ Builder, MFC, Watcom, LCC-WIN32, Digital Mars and ...

FTP Client Engine for Delphi  v.3.3

- Supports S/KEY password encryption. - Supports many proxy servers. - Supports multiple concurrent FTP sessions. - Specify the FTP or data port. - Display progress bars. - Create FTP programs that run in the background.
Fully compatible with ...

FTP Client Engine for Visual Basic  v.3.3


- Supports S/KEY password encryption.
Fully compatible with Visual Studio.NET (.NET Framework).Supports all versions Visual Basic and VB.NET. Works with PowerBuilder and Visual Basic for Applications (VBA).
Does not depend on support libraries.

FTP Client Engine for FoxPro  v.3.3

- Supports S/KEY password encryption. - Supports many proxy servers. - Supports multiple concurrent FTP sessions. - Specify the FTP or data port. - Display progress bars. - Create FTP programs that run in the background.
Fully compatible with ...

FTP Client Engine for PowerBASIC  v.3.2

Supports S/KEY password encryption. Works with all versions PowerBASIC (PB/CC, PB/DLL and PB/WIN). Does not depend on support libraries. Makes calls to Windows API functions only. The FCE DLLs can also used with VB (Visual Basic .NET, VBA), Visual C/C++, ...

FTP Client Engine for Xbase++  v.3.3

- Supports S/KEY password encryption. - Supports many proxy servers. - Supports multiple concurrent FTP sessions. - Specify the FTP or data port. - Display progress bars. - Create FTP programs that run in the background.
Supports all versions ...

EIMAGE Recovery  v.3.5.9.9

eIMAGE Recover was designed specifically to retrieve lost or damaged image files from digital cameras storage. So, if you accidentally erased images, you will be able to get them back with this simple but powerful application, which has an easy-to-use ...

EDATA Unerase  v.3.3.5.9

eDATA Unerase is a program designed to recover lost or deleted files from hard drives, floppy disks or removable storage media. It comes in two versions: Personal and Professional editions. The Personal edition is free, and only recovers certain type ...

HandyBits Collection 2002  v.5.5.0.32

It allows you to send self-extracting, encrypted and compressed archives to others who can only extract them by using a password. Zip & Go, the compression utility program included in the collection, has a new zip file wizard to quickly enable you to ...

Fast EBook Compiler  v.1 3

Other features include an EBook creation step-by-step wizard, a custom splash screen displayed at the startup of an EBook, a customizable toolbar, adjustable EBook access restrictions (expiration period and/or registration key), password protection, ...

Repair Corrupt MDB Files  v.3 2

Corrupt MDB Repair software works as a recovery tool & restores MS Access objects like tables, Reports, Queries, Pages & forms, key data, structures (auto number, unique key), Password protected MDB Databases. Access File Repair software restores .mdb ...

Command Line Crypter  v.1.0


Passphrase: this is the "password" encryption key.
Delete source: should we delete the source file or not.
Based on that, here is the command line usage:
crp.exe
Flags:
Action flags: -e = encrypt -d = decrypt -? = show info
Delete ...

FTP Desktop  v.4.01

FTP Desktop also supports advanced features like batch transfers, command log viewer, Unix permissions, passive mode, custom commands, proxy connections, MD4, MD5 (S/Key) password encryption, site-to-site file transfers and much more. The software is ...

Pages : < 1 | 2
Newest Reviews