- 1,251 categories
- 40,829 scripts
- encryption, encrypt password, encrypt file, password decrypt, encrypt decrypt, how to decrypt, md5
- Flexcrypt is a software that encrypts/decrypts your emails . Flexcrypt is easy to install and use; 1. Enter the receivers address, 2. Make up a password, 3. Send the email in your regular email application. Inform the receiver of the password in a sa...
- Flexcrypt folder encrypts your files and folders with a password. It is not neccesary to have Flexcrypt Folder installed in order to decrypt a file, only double-click on the file and enter the correct password.
- Click to Encrypt HTML is a fantastic new encryption software to protect your HTML web pages and prevent others from viewing and reusing your webpage source code. The Click to Encrypt is easy enough for the beginner level web designer to use.
Th...
- Click to Encrypt PHP was designed to help secure your web page source code from prying eyes, providing you with a 64 bit Encryption!
Imagine now being able to secure your PHP and providing your customers with demos of your products(s), or just ...
- HTML Password Protector is a JavaScript tool to protect whole HTML page, or only part of it. It will encode HTML using your password, and will add password box. Incorrect password will result in incorrectly decoded HTML. Password is not stored, so it...
- SiteLock enables to create password protected areas on your website or take total control of your website''s users. With SiteLock you can password protect directories, create/edit new members, automatically approve new registrations, suspend me...
- SQL Injection Scanner tool was designed to check if a webpage is vulnerable to SQL injection. It modifies URL to simulate SQL injection. Scanner will help to evaluate quality of the bought scripts (check if script programmer implemented at least basi...
- Secure MySQL data transmissions to your PC. Connect to MySQL servers that block remote connections. This program is a fantastically simple way to connect to MySQL using SSH encrypted tunnels. It has a built in SSH client and connection manager. The...
- Every time you make a move on your computer, you leave little &"footprints&" behind that can be retrieved at a later time by anyone who wants to see what you''ve been up to. Allow Privacy Control''s cutting-edge technology...
Page: