XorIt 1.1 XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted for maximum security.
CryptIt 1.4 CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. CryptIt also has a ability to use removable media (USB drives, CDs, floppies) as a key code book.
DecryptSQL, Conquer Encrypted Queries Remember the plot of any blockbuster or spy movie you watched recently? A good guy pursues a bad but clever secret agent, almost captures him, but Suddenly, the bad guys traces disappear, and the good guy has little or no clue of where the trace would continue. Dealing with someone elses code is a lot similar. As soon as you decide youve figured it out, you may stumble upon a trick you
File Security Manager - full control over file and folder access permissions (even in Windows XP Home) Being an overall excellent operating system, Windows XP does have some versions that limit users control capabilities to a bare minimum. For instance, Windows XP Home offers a great set of multimedia and general features, but lacks the degree of flexibility that many advanced users would definitely appreciate. For instance, the Home version will not allow you to set file and folder access right, which is a common method